last executing test programs: 3.619808157s ago: executing program 1 (id=6948): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001140)) write$midi(r0, 0x0, 0x0) 3.012289348s ago: executing program 1 (id=6950): r0 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) 2.464422915s ago: executing program 1 (id=6952): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) write$P9_RFLUSH(r0, 0x0, 0x0) 1.947714772s ago: executing program 1 (id=6954): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) 1.819880418s ago: executing program 0 (id=6955): r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) ioctl$IOMMU_HWPT_GET_DIRTY_BITMAP(r0, 0x3b8c, 0x0) 1.516689703s ago: executing program 1 (id=6956): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240), 0x8001, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000040)={0x7}) 1.436559988s ago: executing program 0 (id=6957): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$BINDER_GET_EXTENDED_ERROR(r2, 0x5421, &(0x7f0000000040)) 1.146792052s ago: executing program 1 (id=6958): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x10008095, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x10000, 0x0, 0x0) 1.033050518s ago: executing program 0 (id=6959): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x88c4}, 0x4048040) 598.15724ms ago: executing program 0 (id=6960): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup3(r0, r1, 0x0) sendmmsg$inet6(r1, 0x0, 0x0, 0x2000809c) 322.343613ms ago: executing program 0 (id=6961): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) setsockopt$packet_fanout_data(r0, 0x29, 0x46, 0x0, 0x0) 0s ago: executing program 0 (id=6962): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000100)={0x48, r1, 0x1, 0x1, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:48866' (ED25519) to the list of known hosts. [ 238.421912][ T30] audit: type=1400 audit(237.790:46): avc: denied { name_bind } for pid=3313 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 239.099296][ T30] audit: type=1400 audit(238.470:47): avc: denied { execute } for pid=3314 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 239.108599][ T30] audit: type=1400 audit(238.480:48): avc: denied { execute_no_trans } for pid=3314 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 247.499034][ T30] audit: type=1400 audit(246.870:49): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 247.518999][ T30] audit: type=1400 audit(246.880:50): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 247.577289][ T3314] cgroup: Unknown subsys name 'net' [ 247.610437][ T30] audit: type=1400 audit(246.980:51): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 247.904546][ T3314] cgroup: Unknown subsys name 'cpuset' [ 247.961680][ T3314] cgroup: Unknown subsys name 'rlimit' [ 248.265362][ T30] audit: type=1400 audit(247.640:52): avc: denied { setattr } for pid=3314 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 248.270882][ T30] audit: type=1400 audit(247.640:53): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 248.281569][ T30] audit: type=1400 audit(247.640:54): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 248.997886][ T3316] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 249.010166][ T30] audit: type=1400 audit(248.380:55): avc: denied { relabelto } for pid=3316 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.018079][ T30] audit: type=1400 audit(248.390:56): avc: denied { write } for pid=3316 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 249.176613][ T30] audit: type=1400 audit(248.550:57): avc: denied { read } for pid=3314 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.191432][ T30] audit: type=1400 audit(248.550:58): avc: denied { open } for pid=3314 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 249.230587][ T3314] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 287.947557][ T30] audit: type=1400 audit(287.320:59): avc: denied { execmem } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 288.072755][ T30] audit: type=1400 audit(287.440:60): avc: denied { read } for pid=3319 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 288.087682][ T30] audit: type=1400 audit(287.450:61): avc: denied { open } for pid=3319 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 288.115695][ T30] audit: type=1400 audit(287.480:62): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 288.198666][ T30] audit: type=1400 audit(287.570:63): avc: denied { module_request } for pid=3319 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 288.534429][ T30] audit: type=1400 audit(287.900:64): avc: denied { sys_module } for pid=3319 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 296.736362][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 296.755183][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 297.357852][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 297.389042][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 300.133674][ T3319] hsr_slave_0: entered promiscuous mode [ 300.156931][ T3319] hsr_slave_1: entered promiscuous mode [ 301.512921][ T3320] hsr_slave_0: entered promiscuous mode [ 301.519463][ T3320] hsr_slave_1: entered promiscuous mode [ 301.531680][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 301.535477][ T3320] Cannot create hsr debugfs directory [ 303.294243][ T30] audit: type=1400 audit(302.660:65): avc: denied { create } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.318408][ T30] audit: type=1400 audit(302.690:66): avc: denied { write } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.339220][ T30] audit: type=1400 audit(302.710:67): avc: denied { read } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 303.390159][ T3319] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 303.507026][ T3319] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 303.711656][ T3319] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 303.824677][ T3319] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 304.800542][ T3320] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 304.860728][ T3320] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 304.915855][ T3320] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 304.979656][ T3320] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 308.567097][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.033598][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.296331][ T3319] veth0_vlan: entered promiscuous mode [ 321.370587][ T3319] veth1_vlan: entered promiscuous mode [ 321.729184][ T3319] veth0_macvtap: entered promiscuous mode [ 321.808418][ T3319] veth1_macvtap: entered promiscuous mode [ 322.325256][ T53] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.328163][ T53] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.497038][ T53] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.540728][ T53] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.981386][ T30] audit: type=1400 audit(322.350:68): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 322.998552][ T3320] veth0_vlan: entered promiscuous mode [ 323.038705][ T30] audit: type=1400 audit(322.410:69): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzkaller.cKln8S/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 323.093718][ T30] audit: type=1400 audit(322.460:70): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 323.143830][ T30] audit: type=1400 audit(322.510:71): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzkaller.cKln8S/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 323.168175][ T30] audit: type=1400 audit(322.530:72): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzkaller.cKln8S/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4340 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 323.236288][ T30] audit: type=1400 audit(322.610:73): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 323.240214][ T3320] veth1_vlan: entered promiscuous mode [ 323.283602][ T30] audit: type=1400 audit(322.650:74): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 323.308332][ T30] audit: type=1400 audit(322.680:75): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="gadgetfs" ino=4341 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 323.365519][ T30] audit: type=1400 audit(322.730:76): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 323.385913][ T30] audit: type=1400 audit(322.750:77): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 323.644538][ T3320] veth0_macvtap: entered promiscuous mode [ 323.698505][ T3320] veth1_macvtap: entered promiscuous mode [ 323.778205][ T3319] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 324.532036][ T53] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.535056][ T53] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.535896][ T53] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.536368][ T53] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 328.476933][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 328.477696][ T30] audit: type=1400 audit(327.830:84): avc: denied { write } for pid=3475 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 331.123760][ T30] audit: type=1400 audit(330.490:85): avc: denied { create } for pid=3493 comm="syz.0.14" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 331.180678][ T30] audit: type=1400 audit(330.550:86): avc: denied { read } for pid=3493 comm="syz.0.14" dev="anon_inodefs" ino=4450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 331.189328][ T30] audit: type=1400 audit(330.560:87): avc: denied { watch watch_reads } for pid=3493 comm="syz.0.14" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 331.414714][ T30] audit: type=1400 audit(330.780:88): avc: denied { create } for pid=3494 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 331.415919][ T3496] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 331.506401][ T30] audit: type=1400 audit(330.880:89): avc: denied { setopt } for pid=3494 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 334.839242][ T30] audit: type=1400 audit(334.210:90): avc: denied { create } for pid=3515 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 335.530850][ T3520] binfmt_misc: register: failed to install interpreter file ./file0/file0 [ 336.301790][ T3524] netlink: 16 bytes leftover after parsing attributes in process `syz.1.28'. [ 338.227126][ T30] audit: type=1400 audit(337.590:91): avc: denied { read write } for pid=3534 comm="syz.1.34" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 338.249622][ T30] audit: type=1400 audit(337.620:92): avc: denied { open } for pid=3534 comm="syz.1.34" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 338.277471][ T30] audit: type=1400 audit(337.650:93): avc: denied { ioctl } for pid=3534 comm="syz.1.34" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 341.926480][ T3555] capability: warning: `syz.0.43' uses deprecated v2 capabilities in a way that may be insecure [ 347.466708][ T3587] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 348.350492][ T30] audit: type=1400 audit(347.720:94): avc: denied { create } for pid=3590 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 348.472761][ T30] audit: type=1400 audit(347.840:95): avc: denied { ioctl } for pid=3590 comm="syz.0.62" path="socket:[3876]" dev="sockfs" ino=3876 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 348.520072][ T30] audit: type=1400 audit(347.890:96): avc: denied { write } for pid=3590 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 349.561048][ T30] audit: type=1400 audit(348.930:97): avc: denied { create } for pid=3596 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 349.597283][ T30] audit: type=1400 audit(348.970:98): avc: denied { getopt } for pid=3596 comm="syz.1.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 349.653571][ T30] audit: type=1400 audit(349.020:99): avc: denied { ioctl } for pid=3596 comm="syz.1.65" path="socket:[3891]" dev="sockfs" ino=3891 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 352.559327][ T3614] capability: warning: `syz.1.73' uses 32-bit capabilities (legacy support in use) [ 355.691773][ T3632] Zero length message leads to an empty skb [ 356.463479][ T30] audit: type=1400 audit(355.830:100): avc: denied { write } for pid=3634 comm="syz.0.84" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 357.606977][ T30] audit: type=1400 audit(356.970:102): avc: denied { create } for pid=3641 comm="syz.0.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 357.616517][ T30] audit: type=1400 audit(356.960:101): avc: denied { create } for pid=3642 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 357.670347][ T30] audit: type=1400 audit(357.040:103): avc: denied { connect } for pid=3642 comm="syz.1.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 357.703846][ T30] audit: type=1400 audit(357.060:104): avc: denied { ioctl } for pid=3641 comm="syz.0.87" path="socket:[3979]" dev="sockfs" ino=3979 ioctlcmd=0xaa04 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 357.704717][ T30] audit: type=1400 audit(357.070:105): avc: denied { write } for pid=3642 comm="syz.1.88" laddr=fe80::a8aa:aaff:feaa:aaaa lport=1 faddr=ff04::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 359.539659][ T30] audit: type=1400 audit(358.910:106): avc: denied { read write } for pid=3658 comm="syz.1.96" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 359.550615][ T30] audit: type=1400 audit(358.920:107): avc: denied { open } for pid=3658 comm="syz.1.96" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 359.656151][ T30] audit: type=1400 audit(359.030:108): avc: denied { ioctl } for pid=3658 comm="syz.1.96" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0x500b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 365.335843][ T30] audit: type=1400 audit(364.710:109): avc: denied { create } for pid=3687 comm="syz.1.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 365.355552][ T30] audit: type=1400 audit(364.730:110): avc: denied { write } for pid=3687 comm="syz.1.110" path="socket:[4776]" dev="sockfs" ino=4776 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 369.324542][ T3701] block nbd1: shutting down sockets [ 372.238142][ T30] audit: type=1400 audit(371.610:111): avc: denied { create } for pid=3716 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 372.280814][ T30] audit: type=1400 audit(371.650:112): avc: denied { bind } for pid=3716 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 372.317897][ T30] audit: type=1400 audit(371.680:113): avc: denied { accept } for pid=3716 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 374.019052][ T30] audit: type=1400 audit(373.390:114): avc: denied { create } for pid=3730 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 374.046628][ T30] audit: type=1400 audit(373.420:115): avc: denied { write } for pid=3730 comm="syz.1.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 374.940323][ T30] audit: type=1400 audit(374.310:116): avc: denied { read append } for pid=3738 comm="syz.1.134" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 374.972783][ T30] audit: type=1400 audit(374.340:117): avc: denied { open } for pid=3738 comm="syz.1.134" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 375.105552][ T30] audit: type=1400 audit(374.480:118): avc: denied { ioctl } for pid=3738 comm="syz.1.134" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 ioctlcmd=0x64cc scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 381.960081][ T30] audit: type=1400 audit(381.330:119): avc: denied { write } for pid=3790 comm="syz.1.159" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 383.038926][ T3798] block nbd1: NBD_DISCONNECT [ 384.079408][ T30] audit: type=1400 audit(383.450:120): avc: denied { create } for pid=3802 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 384.177168][ T30] audit: type=1400 audit(383.540:121): avc: denied { ioctl } for pid=3802 comm="syz.1.164" path="socket:[5296]" dev="sockfs" ino=5296 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 385.425138][ T30] audit: type=1400 audit(384.800:122): avc: denied { read } for pid=3808 comm="syz.0.167" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 385.436785][ T30] audit: type=1400 audit(384.810:123): avc: denied { open } for pid=3808 comm="syz.0.167" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 385.968522][ T30] audit: type=1400 audit(385.340:124): avc: denied { ioctl } for pid=3808 comm="syz.0.167" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 387.620656][ T30] audit: type=1400 audit(386.990:125): avc: denied { mount } for pid=3812 comm="syz.0.168" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 388.871585][ T3821] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3821 comm=syz.1.172 [ 389.746011][ T30] audit: type=1400 audit(389.110:126): avc: denied { read write } for pid=3826 comm="syz.1.175" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 389.754190][ T30] audit: type=1400 audit(389.120:127): avc: denied { open } for pid=3826 comm="syz.1.175" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 389.986521][ T9] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 390.008076][ T30] audit: type=1400 audit(389.370:128): avc: denied { read } for pid=3828 comm="syz.0.176" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 390.029714][ T30] audit: type=1400 audit(389.400:129): avc: denied { open } for pid=3828 comm="syz.0.176" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 390.064321][ T30] audit: type=1400 audit(389.430:130): avc: denied { ioctl } for pid=3828 comm="syz.0.176" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 390.079966][ T3829] binder: 3828:3829 ioctl 40046205 0 returned -22 [ 390.091799][ T9] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz0 [ 390.130584][ T3829] binder: 3828:3829 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 390.131925][ T3829] binder: 3829 RLIMIT_NICE not set [ 391.170214][ T30] audit: type=1400 audit(390.540:131): avc: denied { read write } for pid=3833 comm="syz.1.178" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 391.180612][ T30] audit: type=1400 audit(390.550:132): avc: denied { open } for pid=3833 comm="syz.1.178" path="/dev/virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 391.646525][ T3831] fido_id[3831]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 392.803273][ T30] audit: type=1400 audit(392.170:133): avc: denied { write } for pid=3842 comm="syz.1.181" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 392.906367][ T30] audit: type=1400 audit(392.280:134): avc: denied { mounton } for pid=3843 comm="syz.0.182" path="/80/file0" dev="tmpfs" ino=426 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 392.933859][ T30] audit: type=1400 audit(392.300:135): avc: denied { mount } for pid=3843 comm="syz.0.182" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 392.973819][ T30] audit: type=1400 audit(392.340:136): avc: denied { remount } for pid=3843 comm="syz.0.182" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 393.308437][ T30] audit: type=1400 audit(392.650:137): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 394.258059][ T30] audit: type=1400 audit(393.630:138): avc: denied { connect } for pid=3853 comm="syz.1.187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 397.905285][ T30] audit: type=1400 audit(397.280:139): avc: denied { ioctl } for pid=3878 comm="syz.1.199" path="/dev/iommu" dev="devtmpfs" ino=614 ioctlcmd=0x3b89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 400.654433][ T30] audit: type=1400 audit(400.020:140): avc: denied { create } for pid=3897 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 400.810870][ T30] audit: type=1400 audit(400.180:141): avc: denied { write } for pid=3897 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 400.865386][ T30] audit: type=1400 audit(400.230:142): avc: denied { read } for pid=3897 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 406.561948][ T30] audit: type=1400 audit(405.930:143): avc: denied { setattr } for pid=3928 comm="syz.1.224" name="adsp1" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 408.034476][ T30] audit: type=1400 audit(407.400:144): avc: denied { create } for pid=3937 comm="syz.0.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 408.074100][ T30] audit: type=1400 audit(407.440:145): avc: denied { read } for pid=3937 comm="syz.0.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 414.076200][ T30] audit: type=1400 audit(413.450:146): avc: denied { ioctl } for pid=3964 comm="syz.0.241" path="socket:[5550]" dev="sockfs" ino=5550 ioctlcmd=0x4b72 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 416.308824][ T30] audit: type=1400 audit(415.680:147): avc: denied { bind } for pid=3978 comm="syz.1.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 417.127332][ T30] audit: type=1400 audit(416.500:148): avc: denied { prog_load } for pid=3984 comm="syz.0.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 417.139017][ T30] audit: type=1400 audit(416.500:149): avc: denied { bpf } for pid=3984 comm="syz.0.251" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 417.167245][ T30] audit: type=1400 audit(416.530:150): avc: denied { perfmon } for pid=3984 comm="syz.0.251" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 417.266243][ T30] audit: type=1400 audit(416.630:151): avc: denied { prog_run } for pid=3984 comm="syz.0.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 417.718561][ T30] audit: type=1400 audit(417.090:152): avc: denied { write } for pid=3988 comm="syz.1.254" path="socket:[5601]" dev="sockfs" ino=5601 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 418.831110][ T30] audit: type=1400 audit(418.200:153): avc: denied { read } for pid=4000 comm="syz.0.259" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 418.839550][ T30] audit: type=1400 audit(418.210:154): avc: denied { open } for pid=4000 comm="syz.0.259" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 418.861356][ T30] audit: type=1400 audit(418.230:155): avc: denied { ioctl } for pid=4000 comm="syz.0.259" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x642b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 420.174281][ T30] audit: type=1400 audit(419.550:156): avc: denied { connect } for pid=4010 comm="syz.0.263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 422.460332][ T30] audit: type=1400 audit(421.830:157): avc: denied { write } for pid=4027 comm="syz.1.270" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 423.398606][ T4034] ======================================================= [ 423.398606][ T4034] WARNING: The mand mount option has been deprecated and [ 423.398606][ T4034] and is ignored by this kernel. Remove the mand [ 423.398606][ T4034] option from the mount to silence this warning. [ 423.398606][ T4034] ======================================================= [ 423.434156][ T30] audit: type=1400 audit(422.800:158): avc: denied { mount } for pid=4033 comm="syz.0.273" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 423.493694][ T30] audit: type=1400 audit(422.860:159): avc: denied { remount } for pid=4033 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 423.725286][ T30] audit: type=1400 audit(423.090:160): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 424.062959][ T30] audit: type=1400 audit(423.430:161): avc: denied { map_create } for pid=4038 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 424.077692][ T30] audit: type=1400 audit(423.450:162): avc: denied { map_read map_write } for pid=4038 comm="syz.1.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 427.554295][ T30] audit: type=1400 audit(426.920:163): avc: denied { allowed } for pid=4053 comm="syz.1.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 431.440338][ T30] audit: type=1400 audit(430.810:164): avc: denied { read } for pid=4073 comm="syz.1.292" path="socket:[5738]" dev="sockfs" ino=5738 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 434.027825][ T30] audit: type=1400 audit(433.400:165): avc: denied { open } for pid=4091 comm="syz.0.301" path="/dev/ptyq4" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 434.647728][ T30] audit: type=1400 audit(434.020:166): avc: denied { setopt } for pid=4095 comm="syz.0.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 434.680543][ T30] audit: type=1400 audit(434.050:167): avc: denied { ioctl } for pid=4095 comm="syz.0.303" path="socket:[5765]" dev="sockfs" ino=5765 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 435.510824][ T30] audit: type=1400 audit(434.880:168): avc: denied { watch_mount watch_reads } for pid=4100 comm="syz.0.305" path="/dev/vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 442.753538][ T30] audit: type=1400 audit(442.120:169): avc: denied { watch } for pid=4143 comm="syz.0.324" path="/156/file0" dev="tmpfs" ino=815 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 442.857253][ T30] audit: type=1400 audit(442.230:170): avc: denied { setopt } for pid=4144 comm="syz.1.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 457.907865][ T30] audit: type=1400 audit(457.280:171): avc: denied { connect } for pid=4207 comm="syz.0.354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 462.342036][ T30] audit: type=1400 audit(461.710:172): avc: denied { create } for pid=4242 comm="syz.0.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 462.377606][ T30] audit: type=1400 audit(461.750:173): avc: denied { write } for pid=4242 comm="syz.0.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 462.878396][ T30] audit: type=1400 audit(462.240:174): avc: denied { read } for pid=4242 comm="syz.0.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 463.686788][ T30] audit: type=1400 audit(463.010:175): avc: denied { mount } for pid=4249 comm="syz.1.374" name="/" dev="securityfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 463.711243][ T30] audit: type=1400 audit(463.080:176): avc: denied { remount } for pid=4249 comm="syz.1.374" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 463.808394][ T30] audit: type=1400 audit(463.170:177): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 471.638843][ T30] audit: type=1400 audit(471.000:178): avc: denied { watch watch_reads } for pid=4304 comm="syz.1.400" path="/204" dev="tmpfs" ino=1054 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 472.866716][ T30] audit: type=1400 audit(472.240:179): avc: denied { create } for pid=4312 comm="syz.1.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 472.907070][ T30] audit: type=1400 audit(472.280:180): avc: denied { setopt } for pid=4312 comm="syz.1.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 475.365668][ T30] audit: type=1400 audit(474.730:181): avc: denied { read } for pid=4328 comm="syz.0.411" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 475.381071][ T30] audit: type=1400 audit(474.740:182): avc: denied { open } for pid=4328 comm="syz.0.411" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 475.666689][ T30] audit: type=1400 audit(475.030:183): avc: denied { append } for pid=4328 comm="syz.0.411" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 477.240678][ T30] audit: type=1400 audit(476.610:184): avc: denied { read write } for pid=4340 comm="syz.0.417" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 477.260050][ T30] audit: type=1400 audit(476.610:185): avc: denied { open } for pid=4340 comm="syz.0.417" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 477.260873][ T30] audit: type=1400 audit(476.630:186): avc: denied { ioctl } for pid=4340 comm="syz.0.417" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x125f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 479.559134][ T30] audit: type=1400 audit(478.930:187): avc: denied { write } for pid=4350 comm="syz.0.422" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 480.190296][ T30] audit: type=1400 audit(479.560:188): avc: denied { read } for pid=4354 comm="syz.0.424" path="socket:[7007]" dev="sockfs" ino=7007 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 481.344079][ T30] audit: type=1400 audit(480.710:189): avc: denied { setopt } for pid=4362 comm="syz.1.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 485.521379][ T30] audit: type=1400 audit(484.890:190): avc: denied { read } for pid=4389 comm="syz.0.441" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 485.534306][ T30] audit: type=1400 audit(484.900:191): avc: denied { open } for pid=4389 comm="syz.0.441" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 485.560638][ T30] audit: type=1400 audit(484.920:192): avc: denied { ioctl } for pid=4389 comm="syz.0.441" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 486.186449][ T30] audit: type=1400 audit(485.550:193): avc: denied { write } for pid=4392 comm="syz.0.443" name="arp" dev="proc" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 487.627377][ T4409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4409 comm=syz.1.450 [ 490.418328][ T30] audit: type=1400 audit(489.790:194): avc: denied { write } for pid=4428 comm="syz.1.460" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 490.561921][ T30] audit: type=1400 audit(489.930:195): avc: denied { ioctl } for pid=4430 comm="syz.0.461" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7136 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 493.387318][ T30] audit: type=1400 audit(492.750:196): avc: denied { read write } for pid=4452 comm="syz.1.472" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 493.387784][ T30] audit: type=1400 audit(492.750:197): avc: denied { open } for pid=4452 comm="syz.1.472" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 493.404816][ T30] audit: type=1400 audit(492.780:198): avc: denied { ioctl } for pid=4452 comm="syz.1.472" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 498.264884][ T30] audit: type=1400 audit(497.630:199): avc: denied { read write } for pid=4487 comm="syz.1.489" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 498.278355][ T30] audit: type=1400 audit(497.630:200): avc: denied { open } for pid=4487 comm="syz.1.489" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 506.614759][ T30] audit: type=1400 audit(505.980:201): avc: denied { bind } for pid=4557 comm="syz.1.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 506.649023][ T30] audit: type=1400 audit(506.010:202): avc: denied { node_bind } for pid=4557 comm="syz.1.525" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 516.694624][ T30] audit: type=1400 audit(516.060:203): avc: denied { ioctl } for pid=4657 comm="syz.0.573" path="pid:[4026532605]" dev="nsfs" ino=4026532605 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 523.204019][ T30] audit: type=1400 audit(522.570:204): avc: denied { ioctl } for pid=4703 comm="syz.1.597" path="socket:[8737]" dev="sockfs" ino=8737 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 525.891509][ T30] audit: type=1400 audit(525.260:205): avc: denied { unlink } for pid=3319 comm="syz-executor" name="file0" dev="tmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 528.809741][ T30] audit: type=1400 audit(528.180:206): avc: denied { ioctl } for pid=4752 comm="syz.0.620" path="socket:[8801]" dev="sockfs" ino=8801 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 534.160316][ T30] audit: type=1400 audit(533.530:207): avc: denied { remount } for pid=4780 comm="syz.0.633" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 534.228309][ T30] audit: type=1400 audit(533.590:208): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 542.540228][ T30] audit: type=1400 audit(541.910:209): avc: denied { append } for pid=4828 comm="syz.1.655" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 544.909274][ T30] audit: type=1400 audit(544.280:210): avc: denied { name_bind } for pid=4842 comm="syz.0.662" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 544.938699][ T30] audit: type=1400 audit(544.280:211): avc: denied { node_bind } for pid=4842 comm="syz.0.662" saddr=fe80::aa src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 547.305361][ T30] audit: type=1400 audit(546.670:212): avc: denied { create } for pid=4853 comm="syz.1.666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 547.326898][ T30] audit: type=1400 audit(546.700:213): avc: denied { write } for pid=4853 comm="syz.1.666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 547.331834][ T4854] netlink: 32 bytes leftover after parsing attributes in process `syz.1.666'. [ 547.378760][ T30] audit: type=1400 audit(546.740:214): avc: denied { read } for pid=4853 comm="syz.1.666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 547.847889][ T30] audit: type=1400 audit(547.210:215): avc: denied { audit_write } for pid=4857 comm="syz.0.669" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 548.253219][ T30] audit: type=1400 audit(547.620:216): avc: denied { mount } for pid=4863 comm="syz.0.671" name="/" dev="ramfs" ino=7923 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 548.268356][ T30] audit: type=1400 audit(547.640:217): avc: denied { remount } for pid=4863 comm="syz.0.671" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 548.370186][ T30] audit: type=1400 audit(547.740:218): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 548.585369][ T30] audit: type=1400 audit(547.950:219): avc: denied { create } for pid=4865 comm="syz.1.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 548.651369][ T30] audit: type=1400 audit(548.020:220): avc: denied { setopt } for pid=4865 comm="syz.1.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 549.238972][ T30] audit: type=1400 audit(548.610:221): avc: denied { append } for pid=4871 comm="syz.1.676" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 555.419522][ T30] audit: type=1400 audit(554.790:222): avc: denied { setopt } for pid=4936 comm="syz.0.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 562.987464][ T5017] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5017 comm=syz.1.746 [ 568.104677][ T30] audit: type=1400 audit(567.470:223): avc: denied { read write } for pid=5060 comm="syz.1.768" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 568.113298][ T30] audit: type=1400 audit(567.480:224): avc: denied { open } for pid=5060 comm="syz.1.768" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 571.848502][ T30] audit: type=1400 audit(571.220:225): avc: denied { remount } for pid=5099 comm="syz.1.788" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 571.966480][ T30] audit: type=1400 audit(571.320:226): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 576.570835][ T30] audit: type=1400 audit(575.940:227): avc: denied { mount } for pid=5142 comm="syz.0.809" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 576.603042][ T30] audit: type=1400 audit(575.970:228): avc: denied { remount } for pid=5142 comm="syz.0.809" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 576.805888][ T30] audit: type=1400 audit(576.180:229): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 579.999557][ T30] audit: type=1400 audit(579.370:230): avc: denied { bind } for pid=5175 comm="syz.0.825" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 581.053481][ T30] audit: type=1400 audit(580.420:231): avc: denied { create } for pid=5183 comm="syz.1.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 581.116993][ T30] audit: type=1400 audit(580.480:232): avc: denied { write } for pid=5183 comm="syz.1.828" path="socket:[10522]" dev="sockfs" ino=10522 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 582.899904][ T30] audit: type=1400 audit(582.270:233): avc: denied { write } for pid=5199 comm="syz.1.837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 583.305125][ T30] audit: type=1400 audit(582.680:234): avc: denied { getopt } for pid=5203 comm="syz.1.839" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 586.538219][ T30] audit: type=1400 audit(585.910:235): avc: denied { write } for pid=5242 comm="syz.0.858" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 586.946888][ T5245] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 587.228994][ T5245] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 587.637018][ T5245] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 587.981208][ T5245] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.515889][ T56] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 588.616880][ T56] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 588.683546][ T1596] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 588.750067][ T1596] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 590.650922][ T30] audit: type=1400 audit(590.020:236): avc: denied { ioctl } for pid=5267 comm="syz.1.870" path="/dev/ttyq7" dev="devtmpfs" ino=374 ioctlcmd=0x5412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 597.247460][ T5315] binfmt_misc: register: failed to install interpreter file ./file0/../file0 [ 603.189018][ T30] audit: type=1400 audit(602.560:237): avc: denied { read } for pid=5376 comm="syz.0.923" path="socket:[9998]" dev="sockfs" ino=9998 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 612.024924][ T30] audit: type=1400 audit(611.380:238): avc: denied { read } for pid=5468 comm="syz.0.967" path="socket:[10952]" dev="sockfs" ino=10952 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 615.950816][ T30] audit: type=1400 audit(615.320:239): avc: denied { create } for pid=5503 comm="syz.0.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 616.723974][ T5512] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5512 comm=syz.1.986 [ 617.918122][ T5531] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2573 sclass=netlink_route_socket pid=5531 comm=syz.1.997 [ 624.003917][ T5586] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=65498 sclass=netlink_tcpdiag_socket pid=5586 comm=syz.1.1024 [ 629.631804][ T30] audit: type=1400 audit(629.000:240): avc: denied { block_suspend } for pid=5629 comm="syz.0.1046" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 634.083225][ T30] audit: type=1400 audit(633.450:241): avc: denied { bind } for pid=5677 comm="syz.0.1069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 638.961416][ T30] audit: type=1400 audit(638.310:242): avc: denied { ioctl } for pid=5736 comm="syz.0.1098" path="socket:[12401]" dev="sockfs" ino=12401 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 646.204447][ T30] audit: type=1400 audit(645.570:243): avc: denied { mount } for pid=5793 comm="syz.1.1127" name="/" dev="hugetlbfs" ino=11816 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 646.221947][ T30] audit: type=1400 audit(645.590:244): avc: denied { remount } for pid=5793 comm="syz.1.1127" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 646.288968][ T30] audit: type=1400 audit(645.650:245): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 659.498435][ T30] audit: type=1400 audit(658.870:246): avc: denied { setopt } for pid=5905 comm="syz.1.1180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 662.434977][ T30] audit: type=1400 audit(661.800:247): avc: denied { read } for pid=5953 comm="syz.1.1203" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 664.111137][ T5977] SELinux: syz.1.1214 (5977) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 670.299052][ T30] audit: type=1400 audit(669.670:248): avc: denied { setopt } for pid=6025 comm="syz.1.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 672.817276][ T30] audit: type=1400 audit(672.180:249): avc: denied { write } for pid=6049 comm="syz.1.1250" path="socket:[12216]" dev="sockfs" ino=12216 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 678.051353][ T6117] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 678.083440][ T6117] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 679.298202][ T30] audit: type=1400 audit(678.670:250): avc: denied { read } for pid=6121 comm="syz.1.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 680.905491][ T30] audit: type=1400 audit(680.270:251): avc: denied { setattr } for pid=6149 comm="syz.0.1299" name="RAWv6" dev="sockfs" ino=13408 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 683.866631][ T30] audit: type=1400 audit(683.240:252): avc: denied { append } for pid=6185 comm="syz.0.1317" name="ubi_ctrl" dev="devtmpfs" ino=687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 685.655953][ T30] audit: type=1400 audit(685.030:253): avc: denied { execute } for pid=6206 comm="syz.1.1327" name="file1" dev="tmpfs" ino=3413 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 685.737626][ T30] audit: type=1400 audit(685.110:254): avc: denied { read } for pid=6208 comm="syz.0.1328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 686.000088][ T30] audit: type=1400 audit(685.370:255): avc: denied { getopt } for pid=6211 comm="syz.1.1329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 686.010042][ T6212] tmpfs: Invalid uid '0x00000000ffffffff' [ 688.264385][ T30] audit: type=1400 audit(687.630:256): avc: denied { ioctl } for pid=6227 comm="syz.1.1337" path="socket:[13548]" dev="sockfs" ino=13548 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 697.609333][ T30] audit: type=1400 audit(696.980:257): avc: denied { ioctl } for pid=6286 comm="syz.1.1366" path="socket:[14379]" dev="sockfs" ino=14379 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 702.920434][ T30] audit: type=1400 audit(702.290:258): avc: denied { read } for pid=6352 comm="syz.1.1399" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 702.921369][ T30] audit: type=1400 audit(702.290:259): avc: denied { open } for pid=6352 comm="syz.1.1399" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 704.223922][ T30] audit: type=1400 audit(703.590:260): avc: denied { append } for pid=6369 comm="syz.0.1406" name="loop5" dev="devtmpfs" ino=642 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 705.615938][ T30] audit: type=1400 audit(704.990:261): avc: denied { bind } for pid=6378 comm="syz.1.1411" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 707.073164][ T30] audit: type=1400 audit(706.440:262): avc: denied { read } for pid=6395 comm="syz.0.1419" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 707.076432][ T30] audit: type=1400 audit(706.450:263): avc: denied { open } for pid=6395 comm="syz.0.1419" path="net:[4026532615]" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 711.317811][ T30] audit: type=1400 audit(710.680:264): avc: denied { setopt } for pid=6440 comm="syz.0.1440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 715.010367][ T6479] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6479 comm=syz.0.1459 [ 715.450998][ T30] audit: type=1400 audit(714.820:265): avc: denied { setopt } for pid=6480 comm="syz.1.1460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 715.599663][ T30] audit: type=1400 audit(714.970:266): avc: denied { connect } for pid=6482 comm="syz.0.1461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 729.215815][ T6594] __vm_enough_memory: pid: 6594, comm: syz.1.1515, bytes: 4503599627366400 not enough memory for the allocation [ 748.175632][ T30] audit: type=1400 audit(747.550:267): avc: denied { write } for pid=6765 comm="syz.0.1596" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 750.510610][ T30] audit: type=1400 audit(749.880:268): avc: denied { create } for pid=6776 comm="syz.0.1601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 756.775360][ T30] audit: type=1400 audit(756.140:269): avc: denied { map } for pid=6829 comm="syz.1.1628" path="socket:[15213]" dev="sockfs" ino=15213 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 758.615590][ T30] audit: type=1400 audit(757.980:270): avc: denied { remount } for pid=6844 comm="syz.0.1635" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 767.685614][ T30] audit: type=1400 audit(767.060:271): avc: denied { setattr } for pid=6933 comm="syz.1.1679" name="SMC" dev="sockfs" ino=16432 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 784.139784][ T30] audit: type=1400 audit(783.500:272): avc: denied { write } for pid=7099 comm="syz.1.1760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 784.140849][ T30] audit: type=1400 audit(783.510:273): avc: denied { nlmsg_read } for pid=7099 comm="syz.1.1760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 784.156279][ T7101] netlink: 76 bytes leftover after parsing attributes in process `syz.1.1760'. [ 784.180317][ T30] audit: type=1400 audit(783.550:274): avc: denied { read } for pid=7099 comm="syz.1.1760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 787.296556][ T3407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.297156][ T3407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.299550][ T3407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.301555][ T3407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.306506][ T3407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.308446][ T3407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.311611][ T3407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.323445][ T3407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.324006][ T3407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.324216][ T3407] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 787.366064][ T3407] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 788.391113][ T7147] fido_id[7147]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 789.001634][ T30] audit: type=1400 audit(788.370:275): avc: denied { connect } for pid=7152 comm="syz.0.1784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 801.291398][ T7258] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7258 comm=syz.0.1836 [ 811.731239][ T30] audit: type=1400 audit(811.100:276): avc: denied { write } for pid=7331 comm="syz.1.1870" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 812.489754][ T30] audit: type=1400 audit(811.860:277): avc: denied { map } for pid=7339 comm="syz.0.1874" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17485 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 812.500399][ T30] audit: type=1400 audit(811.860:278): avc: denied { write } for pid=7339 comm="syz.0.1874" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=17485 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 813.983905][ T30] audit: type=1400 audit(813.340:279): avc: denied { setattr } for pid=7347 comm="syz.1.1878" name="pfkey" dev="proc" ino=4026532732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 829.769351][ T7497] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7497 comm=syz.1.1950 [ 830.118861][ T7501] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7501 comm=syz.1.1952 [ 837.183784][ T30] audit: type=1400 audit(836.550:280): avc: denied { ioctl } for pid=7554 comm="syz.1.1979" path="uts:[4026532614]" dev="nsfs" ino=4026532614 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 846.386472][ T30] audit: type=1400 audit(845.760:281): avc: denied { shutdown } for pid=7621 comm="syz.1.2009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 852.875674][ T30] audit: type=1400 audit(852.220:282): avc: denied { lock } for pid=7675 comm="syz.0.2035" path="socket:[18050]" dev="sockfs" ino=18050 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 853.161610][ T30] audit: type=1400 audit(852.530:283): avc: denied { name_bind } for pid=7677 comm="syz.1.2036" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 856.020066][ T7709] random: crng reseeded on system resumption [ 856.090361][ T30] audit: type=1400 audit(855.460:284): avc: denied { ioctl } for pid=7707 comm="syz.1.2051" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x330f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 860.881387][ T7754] pimreg: entered allmulticast mode [ 877.946364][ T30] audit: type=1400 audit(877.310:285): avc: denied { read } for pid=7906 comm="syz.1.2146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 879.311244][ T30] audit: type=1400 audit(878.680:286): avc: denied { setattr } for pid=7918 comm="syz.1.2152" name="CAN_BCM" dev="sockfs" ino=19546 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 879.795280][ T30] audit: type=1400 audit(879.160:287): avc: denied { mount } for pid=7922 comm="syz.1.2154" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 879.819472][ T30] audit: type=1400 audit(879.190:288): avc: denied { remount } for pid=7922 comm="syz.1.2154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 879.911771][ T30] audit: type=1400 audit(879.280:289): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 895.165517][ T8076] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8076 comm=syz.0.2229 [ 895.543257][ T30] audit: type=1400 audit(894.910:290): avc: denied { connect } for pid=8077 comm="syz.1.2230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 907.533097][ C0] vkms_vblank_simulate: vblank timer overrun [ 917.795396][ T8278] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8278 comm=syz.0.2326 [ 918.335276][ T30] audit: type=1400 audit(917.710:291): avc: denied { append } for pid=8289 comm="syz.1.2332" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 920.395622][ T30] audit: type=1400 audit(919.760:292): avc: denied { execute } for pid=8313 comm="syz.0.2344" path="/dev/dsp" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 923.794219][ T30] audit: type=1400 audit(923.160:293): avc: denied { getopt } for pid=8360 comm="syz.1.2367" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 924.039644][ T30] audit: type=1400 audit(923.410:294): avc: denied { connect } for pid=8363 comm="syz.1.2369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 937.296985][ T8513] netlink: 'syz.0.2439': attribute type 29 has an invalid length. [ 959.033837][ T30] audit: type=1400 audit(958.400:295): avc: denied { write } for pid=8722 comm="syz.1.2542" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 959.055352][ T8724] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.2542' sets config #1 [ 961.047382][ T30] audit: type=1400 audit(960.420:296): avc: denied { connect } for pid=8735 comm="syz.1.2548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 961.089543][ T30] audit: type=1400 audit(960.460:297): avc: denied { ioctl } for pid=8735 comm="syz.1.2548" path="socket:[21414]" dev="sockfs" ino=21414 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 974.383769][ T30] audit: type=1400 audit(973.750:298): avc: denied { watch } for pid=8860 comm="syz.1.2609" path="pipe:[22611]" dev="pipefs" ino=22611 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 994.258211][ T30] audit: type=1400 audit(993.630:299): avc: denied { create } for pid=9049 comm="syz.1.2699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 995.747698][ T30] audit: type=1400 audit(995.120:300): avc: denied { ioctl } for pid=9066 comm="syz.1.2707" path="socket:[22947]" dev="sockfs" ino=22947 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1007.247647][ T30] audit: type=1400 audit(1006.620:301): avc: denied { module_load } for pid=9190 comm="syz.0.2769" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=23818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=system permissive=1 [ 1011.761772][ T30] audit: type=1400 audit(1011.130:302): avc: denied { setopt } for pid=9211 comm="syz.1.2779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1020.848598][ T30] audit: type=1400 audit(1020.220:303): avc: denied { read write } for pid=9274 comm="syz.0.2810" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1020.875063][ T30] audit: type=1400 audit(1020.220:304): avc: denied { open } for pid=9274 comm="syz.0.2810" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1026.756297][ T30] audit: type=1400 audit(1026.130:305): avc: denied { append } for pid=9317 comm="syz.1.2831" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1027.198277][ T9320] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9320 comm=syz.0.2832 [ 1028.588232][ T30] audit: type=1400 audit(1027.960:306): avc: denied { bind } for pid=9331 comm="syz.0.2839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1035.488326][ T9382] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9382 comm=syz.1.2862 [ 1036.990937][ T9397] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9397 comm=syz.0.2869 [ 1048.841630][ T9488] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1048.896992][ T9488] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1056.044164][ T9541] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9541 comm=syz.1.2939 [ 1059.204641][ T9570] CUSE: info not properly terminated [ 1061.370943][ T30] audit: type=1400 audit(1060.740:307): avc: denied { write } for pid=9595 comm="syz.0.2967" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1061.401466][ T30] audit: type=1400 audit(1060.770:308): avc: denied { lock } for pid=9595 comm="syz.0.2967" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1070.369500][ T30] audit: type=1400 audit(1069.730:309): avc: denied { create } for pid=9677 comm="syz.0.3005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1075.537336][ T30] audit: type=1400 audit(1074.900:310): avc: denied { mount } for pid=9715 comm="syz.0.3024" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1077.108825][ T30] audit: type=1400 audit(1076.480:311): avc: denied { create } for pid=9736 comm="syz.0.3034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1077.136267][ T30] audit: type=1400 audit(1076.510:312): avc: denied { write } for pid=9736 comm="syz.0.3034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1081.725248][ T3407] hid_parser_main: 231 callbacks suppressed [ 1081.727353][ T3407] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1081.770173][ T3407] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1082.060494][ T30] audit: type=1400 audit(1081.430:313): avc: denied { setattr } for pid=9797 comm="syz.1.3063" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1082.786242][ T9803] fido_id[9803]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1084.335034][ T9818] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9818 comm=syz.0.3072 [ 1086.171412][ T30] audit: type=1400 audit(1085.540:314): avc: denied { getopt } for pid=9827 comm="syz.1.3076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1091.353460][ T30] audit: type=1400 audit(1090.720:315): avc: denied { accept } for pid=9873 comm="syz.1.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1094.073765][ T30] audit: type=1400 audit(1093.440:316): avc: denied { bind } for pid=9895 comm="syz.0.3110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1103.904730][ T30] audit: type=1400 audit(1103.280:317): avc: denied { write } for pid=9965 comm="syz.0.3145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1131.138543][T10191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10191 comm=syz.0.3254 [ 1144.676710][T10292] netlink: 45 bytes leftover after parsing attributes in process `syz.1.3302'. [ 1153.550393][T10365] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10365 comm=syz.0.3337 [ 1155.674461][ T30] audit: type=1400 audit(1155.040:318): avc: denied { write } for pid=10384 comm="syz.0.3347" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1175.547777][T10584] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=10584 comm=syz.0.3444 [ 1182.456440][T10648] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=10648 comm=syz.0.3475 [ 1182.769761][ T30] audit: type=1400 audit(1182.140:319): avc: denied { relabelfrom } for pid=10650 comm="syz.1.3476" name="NETLINK" dev="sockfs" ino=28839 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1182.777076][ T30] audit: type=1400 audit(1182.150:320): avc: denied { relabelto } for pid=10650 comm="syz.1.3476" name="NETLINK" dev="sockfs" ino=28839 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 1183.204130][T10657] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1541 sclass=netlink_audit_socket pid=10657 comm=syz.1.3479 [ 1183.273126][ T30] audit: type=1400 audit(1182.640:321): avc: denied { setattr } for pid=10656 comm="syz.0.3480" name="" dev="pipefs" ino=2811 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1186.643337][T10698] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10698 comm=syz.0.3499 [ 1200.165517][T10843] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1200.184328][T10843] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1201.143184][ T30] audit: type=1400 audit(1200.510:322): avc: denied { write } for pid=10852 comm="syz.0.3574" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1206.187749][ T30] audit: type=1400 audit(1205.560:323): avc: denied { write } for pid=10898 comm="syz.0.3596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1219.407512][ T30] audit: type=1400 audit(1218.780:324): avc: denied { getopt } for pid=10997 comm="syz.0.3646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1279.575935][ T30] audit: type=1400 audit(1278.950:325): avc: denied { nlmsg_read } for pid=11531 comm="syz.0.3903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1295.348057][T11692] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3981'. [ 1295.963461][T11700] dvmrp0: entered allmulticast mode [ 1295.967517][T11700] dvmrp0: left allmulticast mode [ 1303.113873][ T30] audit: type=1400 audit(1302.470:326): avc: denied { mount } for pid=11776 comm="syz.0.4021" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1303.171048][ T30] audit: type=1400 audit(1302.540:327): avc: denied { remount } for pid=11776 comm="syz.0.4021" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1303.270837][ T30] audit: type=1400 audit(1302.640:328): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1307.025961][ T30] audit: type=1400 audit(1306.390:329): avc: denied { write } for pid=11812 comm="syz.0.4040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1307.043444][ T30] audit: type=1400 audit(1306.410:330): avc: denied { read } for pid=11812 comm="syz.0.4040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1333.344112][ T30] audit: type=1400 audit(1332.690:331): avc: denied { read } for pid=12034 comm="syz.0.4148" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1333.344795][ T30] audit: type=1400 audit(1332.710:332): avc: denied { open } for pid=12034 comm="syz.0.4148" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1333.368505][ T30] audit: type=1400 audit(1332.740:333): avc: denied { ioctl } for pid=12034 comm="syz.0.4148" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1334.434062][ T30] audit: type=1400 audit(1333.800:334): avc: denied { write } for pid=12045 comm="syz.0.4154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1334.446806][T12046] netlink: 16 bytes leftover after parsing attributes in process `syz.0.4154'. [ 1334.461701][ T30] audit: type=1400 audit(1333.830:335): avc: denied { read } for pid=12045 comm="syz.0.4154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1340.926371][ C1] hrtimer: interrupt took 289600 ns [ 1351.107984][T12184] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12184 comm=syz.1.4218 [ 1373.977730][T12384] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12384 comm=syz.1.4316 [ 1400.251541][ T30] audit: type=1400 audit(1399.620:336): avc: denied { getattr } for pid=12620 comm="syz.0.4429" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1403.935854][T12645] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12645 comm=syz.1.4441 [ 1404.591571][T12653] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=12653 comm=syz.1.4445 [ 1405.329191][ T30] audit: type=1400 audit(1404.690:337): avc: denied { lock } for pid=12660 comm="syz.1.4449" path="socket:[35910]" dev="sockfs" ino=35910 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1419.804904][ T30] audit: type=1400 audit(1419.170:338): avc: denied { create } for pid=12775 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1419.843937][ T30] audit: type=1400 audit(1419.210:339): avc: denied { write open } for pid=12775 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=2013 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1419.858182][ T30] audit: type=1400 audit(1419.230:340): avc: denied { append } for pid=12775 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2013 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1419.953931][ T30] audit: type=1400 audit(1419.320:341): avc: denied { getattr } for pid=12775 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1420.255781][T12789] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12789 comm=syz.1.4509 [ 1420.794525][ T30] audit: type=1400 audit(1420.160:342): avc: denied { read } for pid=12790 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1421.609274][T12801] 8021q: VLANs not supported on ip6_vti0 [ 1421.744253][ T30] audit: type=1400 audit(1421.100:343): avc: denied { unlink } for pid=12798 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=2013 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1422.234811][ T30] audit: type=1400 audit(1421.600:344): avc: denied { setopt } for pid=12804 comm="syz.1.4516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1424.058910][ T30] audit: type=1400 audit(1423.430:345): avc: denied { ioctl } for pid=12818 comm="syz.0.4523" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1425.247436][ T30] audit: type=1400 audit(1424.600:346): avc: denied { setopt } for pid=12823 comm="syz.1.4526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1430.084852][ T30] audit: type=1400 audit(1429.460:347): avc: denied { map } for pid=12869 comm="syz.0.4548" path="socket:[36249]" dev="sockfs" ino=36249 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1438.515997][ T30] audit: type=1400 audit(1437.890:348): avc: denied { getopt } for pid=12949 comm="syz.0.4587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1442.441145][T12979] netlink: 64 bytes leftover after parsing attributes in process `syz.0.4601'. [ 1449.149460][ T30] audit: type=1400 audit(1448.520:349): avc: denied { create } for pid=13046 comm="syz.0.4634" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1457.981491][ T30] audit: type=1400 audit(1457.340:350): avc: denied { bind } for pid=13126 comm="syz.0.4672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1483.097191][T13371] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=13371 comm=syz.0.4789 [ 1484.921174][T13390] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13390 comm=syz.1.4798 [ 1500.164365][T13534] netlink: 48 bytes leftover after parsing attributes in process `syz.0.4866'. [ 1502.504437][T13554] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13554 comm=syz.0.4876 [ 1522.337776][T13724] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1522.375190][T13724] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1528.550566][ T30] audit: type=1400 audit(1527.920:351): avc: denied { lock } for pid=13784 comm="syz.1.4987" path="socket:[38791]" dev="sockfs" ino=38791 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1546.170896][ T30] audit: type=1400 audit(1545.540:352): avc: denied { getattr } for pid=13932 comm="syz.1.5058" name="KEY" dev="sockfs" ino=40094 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1549.963706][ C0] vkms_vblank_simulate: vblank timer overrun [ 1553.141286][ C0] vkms_vblank_simulate: vblank timer overrun [ 1554.522191][ T30] audit: type=1400 audit(1553.890:353): avc: denied { bind } for pid=14007 comm="syz.0.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1555.120119][T14010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14010 comm=syz.1.5094 [ 1582.116431][ T30] audit: type=1400 audit(1581.480:354): avc: denied { checkpoint_restore } for pid=14238 comm="syz.0.5205" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1594.224767][T14353] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=361 sclass=netlink_audit_socket pid=14353 comm=syz.0.5260 [ 1604.679351][T14448] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14448 comm=syz.0.5306 [ 1605.964670][ T30] audit: type=1400 audit(1605.330:355): avc: denied { mount } for pid=14460 comm="syz.0.5313" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 1608.557047][ T30] audit: type=1400 audit(1607.920:356): avc: denied { getattr } for pid=14487 comm="syz.1.5326" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=42136 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1624.447909][T14615] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2581 sclass=netlink_route_socket pid=14615 comm=syz.1.5387 [ 1627.488229][T14644] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14644 comm=syz.1.5401 [ 1629.309790][T14661] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14661 comm=syz.0.5410 [ 1636.328125][T14720] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14720 comm=syz.1.5438 [ 1647.878951][T14802] netlink: 'syz.1.5474': attribute type 4 has an invalid length. [ 1647.879761][T14802] netlink: 3657 bytes leftover after parsing attributes in process `syz.1.5474'. [ 1648.384360][T14806] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14806 comm=syz.1.5478 [ 1654.169946][ T30] audit: type=1400 audit(1653.540:357): avc: denied { read write } for pid=14870 comm="syz.0.5510" path="socket:[41765]" dev="sockfs" ino=41765 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1661.726072][ T30] audit: type=1400 audit(1661.090:358): avc: denied { mount } for pid=14927 comm="syz.1.5538" name="/" dev="hugetlbfs" ino=42972 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1661.756980][ T30] audit: type=1400 audit(1661.130:359): avc: denied { remount } for pid=14927 comm="syz.1.5538" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1661.861379][ T30] audit: type=1400 audit(1661.230:360): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1671.375494][ T30] audit: type=1400 audit(1670.750:361): avc: denied { setattr } for pid=15022 comm="syz.1.5585" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1685.138570][T15127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=15127 comm=syz.0.5634 [ 1695.258778][ T30] audit: type=1400 audit(1694.620:362): avc: denied { sqpoll } for pid=15218 comm="syz.1.5680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1700.126319][ T30] audit: type=1400 audit(1699.470:363): avc: denied { compute_member } for pid=15243 comm="syz.0.5692" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1714.938199][ T30] audit: type=1400 audit(1714.310:364): avc: denied { watch_reads } for pid=15361 comm="syz.0.5747" path=2F323935342F233135303038202864656C6574656429 dev="tmpfs" ino=15008 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1718.129331][ T3398] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1718.344902][ T3398] usb 1-1: Using ep0 maxpacket: 32 [ 1718.415474][ T3398] usb 1-1: config 0 has an invalid interface number: 51 but max is 0 [ 1718.423737][ T3398] usb 1-1: config 0 has no interface number 0 [ 1718.519515][ T3398] usb 1-1: New USB device found, idVendor=061d, idProduct=c150, bcdDevice=ce.6f [ 1718.520933][ T3398] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1718.522771][ T3398] usb 1-1: Product: syz [ 1718.523702][ T3398] usb 1-1: Manufacturer: syz [ 1718.524695][ T3398] usb 1-1: SerialNumber: syz [ 1718.627908][ T3398] usb 1-1: config 0 descriptor?? [ 1718.794233][ T3398] quatech2 1-1:0.51: Quatech 2nd gen USB to Serial Driver converter detected [ 1719.517613][ T3398] usb 1-1: Quatech 2nd gen USB to Serial Driver converter now attached to ttyUSB0 [ 1719.607140][ C1] usb 1-1: qt2_read_bulk_callback - non-zero urb status: -71 [ 1719.634894][ T3398] usb 1-1: Quatech 2nd gen USB to Serial Driver converter now attached to ttyUSB1 [ 1719.671041][ T3398] usb 1-1: USB disconnect, device number 2 [ 1719.858116][ T3398] quatech-serial ttyUSB0: Quatech 2nd gen USB to Serial Driver converter now disconnected from ttyUSB0 [ 1719.916837][ T3398] quatech-serial ttyUSB1: Quatech 2nd gen USB to Serial Driver converter now disconnected from ttyUSB1 [ 1719.930233][ T3398] quatech2 1-1:0.51: device disconnected [ 1723.759525][ T30] audit: type=1400 audit(1723.120:365): avc: denied { bind } for pid=15410 comm="syz.0.5769" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1747.624505][ T30] audit: type=1400 audit(1746.990:366): avc: denied { write } for pid=15543 comm="syz.1.5833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1749.285540][T15560] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15560 comm=syz.0.5840 [ 1774.530712][ T30] audit: type=1400 audit(1773.900:367): avc: denied { write } for pid=15782 comm="syz.1.5947" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1813.184863][T16074] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16074 comm=syz.1.6088 [ 1824.781294][ T30] audit: type=1400 audit(1824.150:368): avc: denied { bind } for pid=16162 comm="syz.0.6133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1824.785872][ T30] audit: type=1400 audit(1824.150:369): avc: denied { name_bind } for pid=16162 comm="syz.0.6133" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 1824.790389][ T30] audit: type=1400 audit(1824.160:370): avc: denied { node_bind } for pid=16162 comm="syz.0.6133" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1832.248378][ T30] audit: type=1400 audit(1831.620:371): avc: denied { setopt } for pid=16234 comm="syz.0.6168" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1838.436426][ T30] audit: type=1400 audit(1837.810:372): avc: denied { lock } for pid=16282 comm="syz.0.6191" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=48189 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1841.644417][ T30] audit: type=1400 audit(1841.010:373): avc: denied { bind } for pid=16312 comm="syz.0.6205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1841.683877][ T30] audit: type=1400 audit(1841.050:374): avc: denied { write } for pid=16312 comm="syz.0.6205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1841.709562][T16314] atomic_op 00000000eef770e2 conn xmit_atomic 0000000000000000 [ 1852.014466][ T30] audit: type=1400 audit(1851.380:375): avc: denied { map } for pid=16404 comm="syz.1.6251" path="socket:[48400]" dev="sockfs" ino=48400 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 1872.258988][T16596] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1545 sclass=netlink_audit_socket pid=16596 comm=syz.0.6343 [ 1872.746984][ T30] audit: type=1400 audit(1872.110:376): avc: denied { mount } for pid=16600 comm="syz.1.6346" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1872.760942][ T30] audit: type=1400 audit(1872.130:377): avc: denied { remount } for pid=16600 comm="syz.1.6346" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1872.897446][ T30] audit: type=1400 audit(1872.270:378): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1891.547504][T16736] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16736 comm=syz.1.6410 [ 1892.625975][ T30] audit: type=1400 audit(1891.990:379): avc: denied { ioctl } for pid=16743 comm="syz.1.6414" path="socket:[48999]" dev="sockfs" ino=48999 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1894.381183][ T30] audit: type=1400 audit(1893.750:380): avc: denied { getopt } for pid=16759 comm="syz.1.6422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1901.935904][ T26] netdevsim netdevsim1 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1901.938312][ T26] netdevsim netdevsim1 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1901.940473][ T26] netdevsim netdevsim1 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1901.947578][ T26] netdevsim netdevsim1 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1919.541659][ T30] audit: type=1400 audit(1918.910:381): avc: denied { setopt } for pid=16931 comm="syz.1.6503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1921.531036][ C0] vkms_vblank_simulate: vblank timer overrun [ 1932.157355][T17052] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17052 comm=syz.0.6562 [ 1944.544802][T17172] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17172 comm=syz.1.6621 [ 1961.212744][T17303] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17303 comm=syz.1.6684 [ 1992.034196][ T30] audit: type=1400 audit(1991.400:382): avc: denied { map } for pid=17568 comm="syz.1.6815" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2024.595812][ T30] audit: type=1400 audit(2023.960:383): avc: denied { associate } for pid=17823 comm="syz.0.6938" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2030.819587][T17874] [ 2030.821604][T17874] ====================================================== [ 2030.822542][T17874] WARNING: possible circular locking dependency detected [ 2030.823991][T17874] syzkaller #0 Not tainted [ 2030.824595][T17874] ------------------------------------------------------ [ 2030.824936][T17874] syz.0.6962/17874 is trying to acquire lock: [ 2030.825516][T17874] ffff80008745fe48 (pcpu_alloc_mutex){+.+.}-{4:4}, at: pcpu_alloc_noprof+0x8b4/0x11e8 [ 2030.827849][T17874] [ 2030.827849][T17874] but task is already holding lock: [ 2030.828302][T17874] ffff00001478ec40 (&q->q_usage_counter(io)#33){++++}-{0:0}, at: __blk_mq_update_nr_hw_queues+0x65c/0xd38 [ 2030.829401][T17874] [ 2030.829401][T17874] which lock already depends on the new lock. [ 2030.829401][T17874] [ 2030.829879][T17874] [ 2030.829879][T17874] the existing dependency chain (in reverse order) is: [ 2030.830334][T17874] [ 2030.830334][T17874] -> #2 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 2030.831560][T17874] blk_alloc_queue+0x538/0x644 [ 2030.832009][T17874] blk_mq_alloc_queue+0x144/0x220 [ 2030.832364][T17874] __blk_mq_alloc_disk+0x20/0x1a4 [ 2030.832814][T17874] nbd_dev_add+0x3c0/0x9c0 [ 2030.833198][T17874] nbd_init+0xd4/0x1a8 [ 2030.833789][T17874] do_one_initcall+0x130/0x7f0 [ 2030.834399][T17874] kernel_init_freeable+0x48c/0x70c [ 2030.834802][T17874] kernel_init+0x24/0x1dc [ 2030.835149][T17874] ret_from_fork+0x10/0x20 [ 2030.835583][T17874] [ 2030.835583][T17874] -> #1 (fs_reclaim){+.+.}-{0:0}: [ 2030.836228][T17874] fs_reclaim_acquire+0x138/0x160 [ 2030.836589][T17874] prepare_alloc_pages+0x168/0x560 [ 2030.836912][T17874] __alloc_frozen_pages_noprof+0x144/0x1f20 [ 2030.837272][T17874] __alloc_pages_noprof+0x14/0x114 [ 2030.837599][T17874] pcpu_populate_chunk+0xf0/0x90c [ 2030.837913][T17874] pcpu_alloc_noprof+0x688/0x11e8 [ 2030.838233][T17874] bpf_map_alloc_percpu+0xe4/0x5ac [ 2030.838558][T17874] array_map_alloc+0x450/0x59c [ 2030.838984][T17874] map_create+0x3b8/0x1a68 [ 2030.839398][T17874] __sys_bpf+0xa30/0x29c8 [ 2030.839732][T17874] __arm64_sys_bpf+0x70/0xa4 [ 2030.840086][T17874] invoke_syscall+0x6c/0x258 [ 2030.840421][T17874] el0_svc_common.constprop.0+0xac/0x230 [ 2030.840782][T17874] do_el0_svc+0x40/0x58 [ 2030.841104][T17874] el0_svc+0x50/0x1a0 [ 2030.841421][T17874] el0t_64_sync_handler+0xa0/0xe4 [ 2030.841753][T17874] el0t_64_sync+0x198/0x19c [ 2030.842302][T17874] [ 2030.842302][T17874] -> #0 (pcpu_alloc_mutex){+.+.}-{4:4}: [ 2030.842972][T17874] __lock_acquire+0x1638/0x2380 [ 2030.843591][T17874] lock_acquire+0x310/0x38c [ 2030.843931][T17874] __mutex_lock+0x144/0xffc [ 2030.844295][T17874] _mutex_lock_killable+0x24/0x30 [ 2030.844984][T17874] pcpu_alloc_noprof+0x8b4/0x11e8 [ 2030.845524][T17874] sbitmap_init_node+0x224/0x718 [ 2030.845896][T17874] sbitmap_queue_init_node+0x3c/0x3d0 [ 2030.846400][T17874] blk_mq_init_tags+0x100/0x230 [ 2030.846873][T17874] blk_mq_alloc_map_and_rqs+0xa4/0xc54 [ 2030.847284][T17874] __blk_mq_alloc_map_and_rqs+0x100/0x1dc [ 2030.848751][T17874] __blk_mq_update_nr_hw_queues+0x7d8/0xd38 [ 2030.849565][T17874] blk_mq_update_nr_hw_queues+0x44/0x68 [ 2030.849975][T17874] nbd_start_device+0x128/0xa38 [ 2030.850421][T17874] nbd_genl_connect+0xcb4/0x14c4 [ 2030.850803][T17874] genl_family_rcv_msg_doit+0x1b8/0x280 [ 2030.851317][T17874] genl_rcv_msg+0x3ec/0x5bc [ 2030.851781][T17874] netlink_rcv_skb+0x19c/0x338 [ 2030.852394][T17874] genl_rcv+0x38/0x50 [ 2030.852877][T17874] netlink_unicast+0x424/0x700 [ 2030.853228][T17874] netlink_sendmsg+0x644/0xa54 [ 2030.853589][T17874] __sock_sendmsg+0xc8/0x168 [ 2030.853993][T17874] ____sys_sendmsg+0x500/0x764 [ 2030.854515][T17874] ___sys_sendmsg+0x11c/0x19c [ 2030.856294][T17874] __sys_sendmsg+0x114/0x19c [ 2030.856864][T17874] __arm64_sys_sendmsg+0x70/0xa0 [ 2030.857294][T17874] invoke_syscall+0x6c/0x258 [ 2030.857641][T17874] el0_svc_common.constprop.0+0xac/0x230 [ 2030.858133][T17874] do_el0_svc+0x40/0x58 [ 2030.858508][T17874] el0_svc+0x50/0x1a0 [ 2030.858862][T17874] el0t_64_sync_handler+0xa0/0xe4 [ 2030.859217][T17874] el0t_64_sync+0x198/0x19c [ 2030.859867][T17874] [ 2030.859867][T17874] other info that might help us debug this: [ 2030.859867][T17874] [ 2030.860580][T17874] Chain exists of: [ 2030.860580][T17874] pcpu_alloc_mutex --> fs_reclaim --> &q->q_usage_counter(io)#33 [ 2030.860580][T17874] [ 2030.862070][T17874] Possible unsafe locking scenario: [ 2030.862070][T17874] [ 2030.862872][T17874] CPU0 CPU1 [ 2030.863349][T17874] ---- ---- [ 2030.863804][T17874] lock(&q->q_usage_counter(io)#33); [ 2030.864368][T17874] lock(fs_reclaim); [ 2030.864873][T17874] lock(&q->q_usage_counter(io)#33); [ 2030.865609][T17874] lock(pcpu_alloc_mutex); [ 2030.866071][T17874] [ 2030.866071][T17874] *** DEADLOCK *** [ 2030.866071][T17874] [ 2030.866685][T17874] 6 locks held by syz.0.6962/17874: [ 2030.867314][T17874] #0: ffff800088977710 (cb_lock){++++}-{4:4}, at: genl_rcv+0x28/0x50 [ 2030.868635][T17874] #1: ffff800088977648 (genl_mutex){+.+.}-{4:4}, at: genl_rcv_msg+0x41c/0x5bc [ 2030.869595][T17874] #2: ffff00001487f188 (&set->update_nr_hwq_lock){++++}-{4:4}, at: blk_mq_update_nr_hw_queues+0x2c/0x68 [ 2030.870603][T17874] #3: ffff00001487f0d8 (&set->tag_list_lock){+.+.}-{4:4}, at: blk_mq_update_nr_hw_queues+0x38/0x68 [ 2030.871729][T17874] #4: ffff00001478ec40 (&q->q_usage_counter(io)#33){++++}-{0:0}, at: __blk_mq_update_nr_hw_queues+0x65c/0xd38 [ 2030.873144][T17874] #5: ffff00001478ec78 (&q->q_usage_counter(queue)#17){+.+.}-{0:0}, at: __blk_mq_update_nr_hw_queues+0x65c/0xd38 [ 2030.874550][T17874] [ 2030.874550][T17874] stack backtrace: [ 2030.875729][T17874] CPU: 0 UID: 0 PID: 17874 Comm: syz.0.6962 Not tainted syzkaller #0 PREEMPT [ 2030.876340][T17874] Hardware name: linux,dummy-virt (DT) [ 2030.877225][T17874] Call trace: [ 2030.877907][T17874] show_stack+0x18/0x24 (C) [ 2030.878437][T17874] dump_stack_lvl+0xa4/0xf4 [ 2030.878851][T17874] dump_stack+0x1c/0x28 [ 2030.879254][T17874] print_circular_bug+0x28c/0x370 [ 2030.879836][T17874] check_noncircular+0x168/0x17c [ 2030.880507][T17874] __lock_acquire+0x1638/0x2380 [ 2030.880864][T17874] lock_acquire+0x310/0x38c [ 2030.881277][T17874] __mutex_lock+0x144/0xffc [ 2030.881772][T17874] _mutex_lock_killable+0x24/0x30 [ 2030.882286][T17874] pcpu_alloc_noprof+0x8b4/0x11e8 [ 2030.882894][T17874] sbitmap_init_node+0x224/0x718 [ 2030.883344][T17874] sbitmap_queue_init_node+0x3c/0x3d0 [ 2030.883707][T17874] blk_mq_init_tags+0x100/0x230 [ 2030.884145][T17874] blk_mq_alloc_map_and_rqs+0xa4/0xc54 [ 2030.884604][T17874] __blk_mq_alloc_map_and_rqs+0x100/0x1dc [ 2030.885059][T17874] __blk_mq_update_nr_hw_queues+0x7d8/0xd38 [ 2030.885523][T17874] blk_mq_update_nr_hw_queues+0x44/0x68 [ 2030.885899][T17874] nbd_start_device+0x128/0xa38 [ 2030.886231][T17874] nbd_genl_connect+0xcb4/0x14c4 [ 2030.886569][T17874] genl_family_rcv_msg_doit+0x1b8/0x280 [ 2030.886967][T17874] genl_rcv_msg+0x3ec/0x5bc [ 2030.887328][T17874] netlink_rcv_skb+0x19c/0x338 [ 2030.887675][T17874] genl_rcv+0x38/0x50 [ 2030.888001][T17874] netlink_unicast+0x424/0x700 [ 2030.888375][T17874] netlink_sendmsg+0x644/0xa54 [ 2030.888721][T17874] __sock_sendmsg+0xc8/0x168 [ 2030.889072][T17874] ____sys_sendmsg+0x500/0x764 [ 2030.889420][T17874] ___sys_sendmsg+0x11c/0x19c [ 2030.889839][T17874] __sys_sendmsg+0x114/0x19c [ 2030.890161][T17874] __arm64_sys_sendmsg+0x70/0xa0 [ 2030.890521][T17874] invoke_syscall+0x6c/0x258 [ 2030.890881][T17874] el0_svc_common.constprop.0+0xac/0x230 [ 2030.891539][T17874] do_el0_svc+0x40/0x58 [ 2030.891945][T17874] el0_svc+0x50/0x1a0 [ 2030.892258][T17874] el0t_64_sync_handler+0xa0/0xe4 [ 2030.892760][T17874] el0t_64_sync+0x198/0x19c [ 2031.230045][T17876] block nbd0: Receive control failed (result -32) [ 2031.231293][ T48] block nbd0: Receive control failed (result -32) VM DIAGNOSIS: 00:49:35 Registers: info registers vcpu 0 CPU#0 PC=ffff8000803462c4 X00=ffff80008dbb6460 X01=00000000ffffe53b X02=1ffff00011b76c8c X03=ffff800080352e44 X04=ffff700010e44198 X05=ffff800087220cb8 X06=ffff700010e44197 X07=0000000000000001 X08=ffff800087220cbf X09=dfff800000000000 X10=ffff700010e44197 X11=1ffff00010e44197 X12=ffff700010e44198 X13=0000000000000012 X14=0000000000000001 X15=fffffffffffe53f8 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff00006a08a5a9 X20=1ffff00011b76c7a X21=0000000000000008 X22=ffff80008723dc28 X23=ffff800086ad04d8 X24=ffff80008723dc28 X25=00000000000000c0 X26=0000000000000002 X27=0000000000000005 X28=1fffe0000d4114b5 X29=ffff80008dbb6330 X30=ffff8000803465c4 SP=ffff80008dbb6330 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffdac87c10:3fba0ab609d5cb00 Q02=0000ffffdac87bf0:ffffff80ffffffd8 Q03=0000ffffdac87ca0:0000ffffdac87ca0 Q04=0000ffffdac87ca0:0000ffff90338188 Q05=0000ffffdac87c70:0000ffffdac87ca0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdac87ec0:0000ffffdac87ec0 Q17=ffffff80ffffffd0:0000ffffdac87e90 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085443cb8 X00=0000000000000000 X01=ffff800087110000 X02=0000000000000000 X03=1fffe00001c64791 X04=ffff60000d41773f X05=ffff00006a0bb9f0 X06=ffff60000d41773e X07=0000000000000001 X08=ffff00006a0bb9f3 X09=dfff800000000000 X10=ffff60000d41773e X11=1fffe0000d41773e X12=ffff60000d41773f X13=0000000000000001 X14=1fffe00001c74cf4 X15=ffff00000e3a6880 X16=ffff00006a0ad4c4 X17=ffff8000870bef80 X18=ffff8000a06f727c X19=ffff8000802bfdf0 X20=0000000000000001 X21=dfff800000000000 X22=ffff00000e323c80 X23=1ffff00010e21bef X24=0000000000000001 X25=ffff80008710d000 X26=ffff600001c64790 X27=0000000000000000 X28=1ffff00011acafbe X29=ffff80008d657d40 X30=ffff800085443ccc SP=ffff80008d657d40 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffdac87c10:3fba0ab609d5cb00 Q02=0000ffffdac87bf0:ffffff80ffffffd8 Q03=0000ffffdac87ca0:0000ffffdac87ca0 Q04=0000ffffdac87ca0:0000ffff90338188 Q05=0000ffffdac87c70:0000ffffdac87ca0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdac87ec0:0000ffffdac87ec0 Q17=ffffff80ffffffd0:0000ffffdac87e90 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000