last executing test programs: 1h36m27.68435629s ago: executing program 0 (id=149): syz_open_dev$mouse(&(0x7f0000000000), 0x4, 0x90241) 1h35m51.232183595s ago: executing program 0 (id=172): openat$dsp1(0xffffff9c, &(0x7f0000002b00), 0x113082, 0x0) 1h35m14.288945906s ago: executing program 0 (id=194): add_key$fscrypt_v1(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) 1h34m43.843692918s ago: executing program 0 (id=212): getdents64(0xffffffffffffffff, 0x0, 0x0) 1h34m8.473296984s ago: executing program 0 (id=232): openat$dma_heap(0xffffffffffffff9c, &(0x7f0000003c00), 0x305400, 0x0) 1h33m29.857632995s ago: executing program 0 (id=247): mknodat$null(0xffffffffffffff9c, 0x0, 0xb0a54e68b1cd2fdb, 0x103) 1h32m43.553231897s ago: executing program 32 (id=247): mknodat$null(0xffffffffffffff9c, 0x0, 0xb0a54e68b1cd2fdb, 0x103) 2m0.720765675s ago: executing program 2 (id=2564): r0 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r0, 0x5450, 0x0) 1m54.616508235s ago: executing program 2 (id=2567): pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x5451, 0x0) 1m48.169016634s ago: executing program 2 (id=2568): r0 = epoll_create1(0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x5452, &(0x7f00000000c0)) 1m42.843234122s ago: executing program 2 (id=2570): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SCRUB(r0, 0x5451, 0x0) 1m37.829692362s ago: executing program 2 (id=2572): r0 = openat2$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x103040}, 0x18) fcntl$setown(r0, 0x8, 0x0) 1m31.9542029s ago: executing program 2 (id=2574): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x38, 0x1403, 0x1, 0x70bd2c, 0x25dfdbfa, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) 46.044874811s ago: executing program 33 (id=2574): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x38, 0x1403, 0x1, 0x70bd2c, 0x25dfdbfa, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) 36.053037961s ago: executing program 1 (id=2586): r0 = socket$unix(0x1, 0x5, 0x0) ioctl$TUNGETFILTER(r0, 0x5450, 0x0) 31.047389282s ago: executing program 1 (id=2587): symlinkat(&(0x7f0000000140)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) 24.474348607s ago: executing program 1 (id=2588): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x275a, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0x5450, 0x0) 15.662474063s ago: executing program 1 (id=2589): r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) 11.690053658s ago: executing program 1 (id=2590): r0 = syz_open_dev$sndpcmc(&(0x7f00000001c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HWSYNC(r0, 0x4122, 0x0) 0s ago: executing program 1 (id=2591): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000003e40)={0x0, 0x0, &(0x7f0000003e00)={&(0x7f0000003d80)={0x14}, 0x14}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:46095' (ED25519) to the list of known hosts. [ 266.058890][ T30] audit: type=1400 audit(265.210:46): avc: denied { name_bind } for pid=3323 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 266.657257][ T30] audit: type=1400 audit(265.810:47): avc: denied { execute } for pid=3324 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 266.675866][ T30] audit: type=1400 audit(265.830:48): avc: denied { execute_no_trans } for pid=3324 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 275.390533][ T30] audit: type=1400 audit(274.540:49): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 275.457130][ T30] audit: type=1400 audit(274.610:50): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 275.514870][ T3324] cgroup: Unknown subsys name 'net' [ 275.563728][ T30] audit: type=1400 audit(274.720:51): avc: denied { unmount } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 275.821375][ T3324] cgroup: Unknown subsys name 'cpuset' [ 275.891546][ T3324] cgroup: Unknown subsys name 'rlimit' [ 276.187524][ T30] audit: type=1400 audit(275.340:52): avc: denied { setattr } for pid=3324 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 276.194701][ T30] audit: type=1400 audit(275.350:53): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 276.205712][ T30] audit: type=1400 audit(275.350:54): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 276.744967][ T3326] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 276.753593][ T30] audit: type=1400 audit(275.900:55): avc: denied { relabelto } for pid=3326 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 276.757940][ T30] audit: type=1400 audit(275.910:56): avc: denied { write } for pid=3326 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 276.845925][ T30] audit: type=1400 audit(276.000:57): avc: denied { read } for pid=3324 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 276.855089][ T30] audit: type=1400 audit(276.000:58): avc: denied { open } for pid=3324 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 276.871714][ T3324] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 293.770434][ T30] audit: type=1400 audit(292.920:59): avc: denied { execmem } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 293.914260][ T30] audit: type=1400 audit(293.070:60): avc: denied { read } for pid=3329 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 293.918412][ T30] audit: type=1400 audit(293.070:61): avc: denied { open } for pid=3329 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 293.970228][ T30] audit: type=1400 audit(293.120:62): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 294.054721][ T30] audit: type=1400 audit(293.210:63): avc: denied { module_request } for pid=3329 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 294.372947][ T30] audit: type=1400 audit(293.530:64): avc: denied { sys_module } for pid=3330 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 304.983623][ T3329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 305.048045][ T3329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 305.835956][ T3330] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 305.998450][ T3330] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 310.152332][ T3329] hsr_slave_0: entered promiscuous mode [ 310.172585][ T3329] hsr_slave_1: entered promiscuous mode [ 311.131046][ T3330] hsr_slave_0: entered promiscuous mode [ 311.137801][ T3330] hsr_slave_1: entered promiscuous mode [ 311.148019][ T3330] debugfs: 'hsr0' already exists in 'hsr' [ 311.151984][ T3330] Cannot create hsr debugfs directory [ 314.373388][ T30] audit: type=1400 audit(313.530:65): avc: denied { create } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 314.378123][ T30] audit: type=1400 audit(313.530:66): avc: denied { write } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 314.391803][ T30] audit: type=1400 audit(313.540:67): avc: denied { read } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 314.424145][ T3329] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 314.541658][ T3329] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 314.668853][ T3329] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 314.824610][ T3329] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 315.797712][ T3330] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 315.933147][ T3330] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 316.093878][ T3330] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 316.174511][ T3330] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 320.183793][ T3329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.424444][ T3330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 337.134415][ T3329] veth0_vlan: entered promiscuous mode [ 337.347134][ T3329] veth1_vlan: entered promiscuous mode [ 337.945053][ T3329] veth0_macvtap: entered promiscuous mode [ 338.072512][ T3329] veth1_macvtap: entered promiscuous mode [ 338.708969][ T3330] veth0_vlan: entered promiscuous mode [ 339.013732][ T1015] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.025021][ T1015] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.029938][ T1015] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.074191][ T1015] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 339.166871][ T3330] veth1_vlan: entered promiscuous mode [ 340.016970][ T30] audit: type=1400 audit(339.170:68): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.i744tZ/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 340.047493][ T30] audit: type=1400 audit(339.200:69): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 340.147355][ T30] audit: type=1400 audit(339.300:70): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.i744tZ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 340.202940][ T30] audit: type=1400 audit(339.360:71): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 340.295780][ T30] audit: type=1400 audit(339.450:72): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.i744tZ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 340.330964][ T30] audit: type=1400 audit(339.480:73): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/syzkaller.i744tZ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3785 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 340.354971][ T3330] veth0_macvtap: entered promiscuous mode [ 340.434241][ T3330] veth1_macvtap: entered promiscuous mode [ 340.445851][ T30] audit: type=1400 audit(339.600:74): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 340.475910][ T30] audit: type=1400 audit(339.630:75): avc: denied { mounton } for pid=3329 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 340.505139][ T30] audit: type=1400 audit(339.660:76): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="gadgetfs" ino=3786 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 340.578358][ T30] audit: type=1400 audit(339.720:77): avc: denied { mount } for pid=3329 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 340.955924][ T3329] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 341.342627][ T25] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.352296][ T1022] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.353230][ T1022] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.353592][ T1022] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 350.278417][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 350.280761][ T30] audit: type=1400 audit(349.410:83): avc: denied { prog_load } for pid=3495 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 350.302529][ T30] audit: type=1400 audit(349.460:84): avc: denied { bpf } for pid=3495 comm="syz.0.9" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 350.417980][ T30] audit: type=1400 audit(349.570:85): avc: denied { perfmon } for pid=3495 comm="syz.0.9" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 363.986350][ T30] audit: type=1400 audit(363.140:86): avc: denied { create } for pid=3539 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 387.845944][ T30] audit: type=1400 audit(387.000:87): avc: denied { mounton } for pid=3623 comm="syz.1.72" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 387.885633][ T3624] ======================================================= [ 387.885633][ T3624] WARNING: The mand mount option has been deprecated and [ 387.885633][ T3624] and is ignored by this kernel. Remove the mand [ 387.885633][ T3624] option from the mount to silence this warning. [ 387.885633][ T3624] ======================================================= [ 394.305253][ T30] audit: type=1400 audit(393.460:88): avc: denied { wake_alarm } for pid=3640 comm="syz.1.81" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 402.495978][ T30] audit: type=1400 audit(401.650:89): avc: denied { kexec_image_load } for pid=3662 comm="syz.1.91" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 404.470320][ T30] audit: type=1400 audit(403.620:90): avc: denied { create } for pid=3666 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 412.820690][ T30] audit: type=1400 audit(411.970:91): avc: denied { remount } for pid=3688 comm="syz.0.104" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 416.200642][ T30] audit: type=1400 audit(415.350:92): avc: denied { remount } for pid=3697 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 459.200654][ T3776] mmap: syz.0.131 (3776) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 472.801330][ T30] audit: type=1400 audit(471.950:93): avc: denied { create } for pid=3798 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 473.057278][ T30] audit: type=1400 audit(472.210:94): avc: denied { read write } for pid=3330 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 473.094436][ T30] audit: type=1400 audit(472.210:95): avc: denied { open } for pid=3330 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 473.112362][ T30] audit: type=1400 audit(472.250:96): avc: denied { ioctl } for pid=3330 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 479.908471][ T30] audit: type=1400 audit(479.060:97): avc: denied { write } for pid=3808 comm="syz.1.160" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 491.141744][ T30] audit: type=1400 audit(490.290:98): avc: denied { read } for pid=3821 comm="syz.1.166" name="vsock" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 491.151311][ T30] audit: type=1400 audit(490.290:99): avc: denied { open } for pid=3821 comm="syz.1.166" path="/dev/vsock" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 632.584799][ T30] audit: type=1400 audit(631.740:100): avc: denied { create } for pid=3982 comm="syz.1.243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 689.608144][ T1000] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.095023][ T1000] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 690.677955][ T1000] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 691.531074][ T1000] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 693.142532][ T30] audit: type=1400 audit(692.290:101): avc: denied { read } for pid=3173 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 693.478563][ T30] audit: type=1400 audit(692.610:102): avc: denied { read } for pid=3173 comm="dhcpcd" name="n18" dev="tmpfs" ino=1864 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 693.503848][ T30] audit: type=1400 audit(692.630:103): avc: denied { open } for pid=3173 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1864 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 693.532062][ T30] audit: type=1400 audit(692.630:104): avc: denied { getattr } for pid=3173 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=1864 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 697.653375][ T1000] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 697.821962][ T1000] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 697.895561][ T1000] bond0 (unregistering): Released all slaves [ 698.672679][ T1000] hsr_slave_0: left promiscuous mode [ 698.704472][ T1000] hsr_slave_1: left promiscuous mode [ 698.976590][ T1000] veth1_macvtap: left promiscuous mode [ 698.978106][ T1000] veth0_macvtap: left promiscuous mode [ 698.993416][ T1000] veth1_vlan: left promiscuous mode [ 698.995472][ T1000] veth0_vlan: left promiscuous mode [ 700.991203][ T30] audit: type=1400 audit(700.110:105): avc: denied { create } for pid=4045 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 700.992826][ T30] audit: type=1400 audit(700.140:106): avc: denied { write } for pid=4045 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=1875 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 701.005352][ T30] audit: type=1400 audit(700.160:107): avc: denied { append } for pid=4045 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=1875 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 702.953197][ T30] audit: type=1400 audit(702.090:108): avc: denied { unlink } for pid=4048 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=1875 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 711.485184][ T30] audit: type=1400 audit(710.640:109): avc: denied { write } for pid=4055 comm="syz.1.267" name="ubi_ctrl" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 722.710481][ T4024] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 722.811499][ T4024] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 735.317296][ T4024] hsr_slave_0: entered promiscuous mode [ 735.334007][ T4024] hsr_slave_1: entered promiscuous mode [ 740.662063][ T4024] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 740.735592][ T4024] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 740.800427][ T4024] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 740.887860][ T4024] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 748.844119][ T4024] 8021q: adding VLAN 0 to HW filter on device bond0 [ 779.567910][ T4024] veth0_vlan: entered promiscuous mode [ 779.785928][ T4024] veth1_vlan: entered promiscuous mode [ 781.111352][ T4024] veth0_macvtap: entered promiscuous mode [ 781.327465][ T4024] veth1_macvtap: entered promiscuous mode [ 782.716093][ T25] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.717322][ T25] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.718160][ T25] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 782.718691][ T25] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 808.001850][ T4270] Soft offlining pfn 0x493e5 at process virtual address 0x20ffd000 [ 808.316033][ T4270] Memory failure: 0x493e5: unhandlable page. [ 815.101030][ T30] audit: type=1400 audit(814.250:110): avc: denied { create } for pid=4285 comm="syz.2.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 846.175757][ T30] audit: type=1400 audit(845.330:111): avc: denied { create } for pid=4355 comm="syz.2.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 860.564892][ T30] audit: type=1400 audit(859.690:112): avc: denied { create } for pid=4389 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 879.337112][ T30] audit: type=1326 audit(878.470:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4451 comm="syz.1.390" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x127f38 code=0x0 [ 884.493431][ T30] audit: type=1400 audit(883.640:114): avc: denied { unmount } for pid=3330 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 909.300879][ C0] hrtimer: interrupt took 23762016 ns [ 930.565757][ T30] audit: type=1400 audit(929.720:115): avc: denied { create } for pid=4542 comm="syz.2.437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 950.362203][ T30] audit: type=1400 audit(949.510:116): avc: denied { ioctl } for pid=4577 comm="syz.1.453" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 966.335170][ T30] audit: type=1400 audit(965.490:117): avc: denied { create } for pid=4613 comm="syz.2.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 972.500993][ T30] audit: type=1400 audit(971.640:118): avc: denied { write } for pid=4626 comm="syz.2.479" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 972.505943][ T30] audit: type=1400 audit(971.660:119): avc: denied { open } for pid=4626 comm="syz.2.479" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 972.506499][ T4627] random: crng reseeded on system resumption [ 996.395356][ T30] audit: type=1400 audit(995.530:120): avc: denied { create } for pid=4677 comm="syz.2.502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1006.954299][ T30] audit: type=1400 audit(1006.110:121): avc: denied { create } for pid=4705 comm="syz.2.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1019.381564][ T4732] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1019.398779][ T4732] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1023.606019][ T30] audit: type=1400 audit(1022.760:122): avc: denied { mounton } for pid=4741 comm="syz.2.531" path="/syzcgroup/unified/syz2" dev="cgroup2" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1057.824674][ T30] audit: type=1400 audit(1056.980:123): avc: denied { map_create } for pid=4819 comm="syz.2.570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1075.711206][ T4858] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1075.714298][ T4858] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1089.253153][ T30] audit: type=1400 audit(1088.400:124): avc: denied { read append } for pid=4888 comm="syz.2.604" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1089.294042][ T30] audit: type=1400 audit(1088.450:125): avc: denied { open } for pid=4888 comm="syz.2.604" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1095.591748][ T30] audit: type=1400 audit(1094.740:126): avc: denied { write } for pid=4901 comm="syz.2.610" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1127.260843][ T30] audit: type=1400 audit(1126.410:127): avc: denied { mount } for pid=4964 comm="syz.2.641" name="/" dev="pstore" ino=2440 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1190.997157][ T30] audit: type=1400 audit(1190.140:128): avc: denied { create } for pid=5072 comm="syz.2.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 1255.848207][ T30] audit: type=1400 audit(1255.000:129): avc: denied { create } for pid=5188 comm="syz.2.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1313.655629][ T30] audit: type=1400 audit(1312.810:130): avc: denied { read write } for pid=5284 comm="syz.2.793" name="card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1313.671289][ T30] audit: type=1400 audit(1312.820:131): avc: denied { open } for pid=5284 comm="syz.2.793" path="/dev/dri/card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1368.680831][ T5370] Soft offlining pfn 0x493e5 at process virtual address 0x20ffb000 [ 1369.610948][ T5370] Memory failure: 0x493e5: unhandlable page. [ 1385.168348][ T30] audit: type=1400 audit(1384.320:132): avc: denied { unmount } for pid=4024 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1387.241576][ T5397] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1387.274886][ T5397] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1426.274278][ T30] audit: type=1400 audit(1425.430:133): avc: denied { read } for pid=5450 comm="syz.1.871" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1426.372365][ T30] audit: type=1400 audit(1425.520:134): avc: denied { open } for pid=5450 comm="syz.1.871" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1430.302498][ T5457] random: crng reseeded on system resumption [ 1441.574104][ T30] audit: type=1400 audit(1440.730:135): avc: denied { read write } for pid=5472 comm="syz.2.882" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1441.576157][ T30] audit: type=1400 audit(1440.730:136): avc: denied { open } for pid=5472 comm="syz.2.882" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1472.608659][ T30] audit: type=1400 audit(1471.760:137): avc: denied { create } for pid=5517 comm="syz.2.903" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1473.221513][ T30] audit: type=1400 audit(1472.250:138): avc: denied { unlink } for pid=4024 comm="syz-executor" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=2172 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1510.281291][ T30] audit: type=1326 audit(1509.430:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5555 comm="syz.2.919" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x127f38 code=0x0 [ 1714.127825][ T30] audit: type=1400 audit(1713.280:140): avc: denied { write } for pid=5718 comm="syz.2.987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1724.703473][ T30] audit: type=1400 audit(1723.760:141): avc: denied { append } for pid=5726 comm="syz.2.990" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1746.867758][ T30] audit: type=1400 audit(1746.020:142): avc: denied { module_load } for pid=5746 comm="syz.1.999" path="/sys/power/pm_wakeup_irq" dev="sysfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 2054.430902][ T6034] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6034 comm=syz.1.1119 [ 2058.326357][ T30] audit: type=1400 audit(2057.480:143): avc: denied { append } for pid=6036 comm="syz.2.1121" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2099.891555][ T30] audit: type=1400 audit(2099.040:144): avc: denied { setattr } for pid=6076 comm="syz.1.1137" name="" dev="pipefs" ino=11700 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 2108.804375][ T6085] syz.2.1141 (6085): /proc/6084/oom_adj is deprecated, please use /proc/6084/oom_score_adj instead. [ 2268.913087][ T6222] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6222 comm=syz.2.1197 [ 2280.055571][ T30] audit: type=1400 audit(2279.210:145): avc: denied { mount } for pid=6231 comm="syz.1.1201" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2293.750555][ T30] audit: type=1400 audit(2292.900:146): avc: denied { ioctl } for pid=6245 comm="syz.2.1207" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x4c81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 2351.771649][ T6303] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6303 comm=syz.2.1232 [ 2377.936287][ T30] audit: type=1400 audit(2377.090:147): avc: denied { create } for pid=6325 comm="syz.1.1242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2404.922358][ T6353] Zero length message leads to an empty skb [ 2406.434793][ T30] audit: type=1400 audit(2405.590:148): avc: denied { setopt } for pid=6354 comm="syz.2.1254" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2443.882314][ T6394] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6394 comm=syz.2.1269 [ 2505.802925][ T6451] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6451 comm=syz.1.1288 [ 2566.264344][ T30] audit: type=1400 audit(2565.420:149): avc: denied { write } for pid=6498 comm="syz.2.1308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2585.469920][ T30] audit: type=1400 audit(2584.580:150): avc: denied { setcheckreqprot } for pid=6517 comm="syz.2.1315" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 2585.524237][ T6518] SELinux: syz.2.1315 (6518) set checkreqprot to 1. This is no longer supported. [ 2694.118102][ T30] audit: type=1400 audit(2693.270:151): avc: denied { read write } for pid=6631 comm="syz.1.1364" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2694.321991][ T30] audit: type=1400 audit(2693.470:152): avc: denied { open } for pid=6631 comm="syz.1.1364" path="/dev/uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2695.248326][ T30] audit: type=1400 audit(2694.150:153): avc: denied { ioctl } for pid=6631 comm="syz.1.1364" path="/dev/uinput" dev="devtmpfs" ino=708 ioctlcmd=0x55c9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2772.583630][ T6699] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6699 comm=syz.2.1388 [ 2889.642185][ T6798] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=25 sclass=netlink_tcpdiag_socket pid=6798 comm=syz.1.1426 [ 2923.104812][ T30] audit: type=1400 audit(2922.260:154): avc: denied { read write } for pid=6828 comm="syz.2.1439" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2923.133042][ T30] audit: type=1400 audit(2922.280:155): avc: denied { open } for pid=6828 comm="syz.2.1439" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2923.411496][ T30] audit: type=1400 audit(2922.550:156): avc: denied { ioctl } for pid=6828 comm="syz.2.1439" path="/dev/nullb0" dev="devtmpfs" ino=672 ioctlcmd=0x127c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2931.952877][ T6838] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=262 sclass=netlink_audit_socket pid=6838 comm=syz.2.1443 [ 2934.123876][ T30] audit: type=1400 audit(2933.280:157): avc: denied { ioctl } for pid=6839 comm="syz.1.1444" path="socket:[13852]" dev="sockfs" ino=13852 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3018.497625][ T30] audit: type=1400 audit(3017.650:158): avc: denied { write } for pid=6918 comm="syz.1.1476" name="ipv6_route" dev="proc" ino=4026532688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3154.177596][ T30] audit: type=1400 audit(3153.330:159): avc: denied { map } for pid=7042 comm="syz.1.1529" path="socket:[14175]" dev="sockfs" ino=14175 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 3189.534082][ T7078] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7078 comm=syz.1.1545 [ 3211.215454][ T7101] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 3211.361867][ T30] audit: type=1400 audit(3210.510:160): avc: denied { getopt } for pid=7100 comm="syz.2.1555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3222.801242][ T7113] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2048 sclass=netlink_route_socket pid=7113 comm=syz.1.1561 [ 3296.405565][ T30] audit: type=1400 audit(3295.560:161): avc: denied { nlmsg_write } for pid=7186 comm="syz.2.1592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3301.687794][ T30] audit: type=1400 audit(3300.840:162): avc: denied { setopt } for pid=7191 comm="syz.2.1594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3341.051889][ T7225] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5138 sclass=netlink_route_socket pid=7225 comm=syz.1.1607 [ 3375.002409][ T30] audit: type=1400 audit(3374.150:163): avc: denied { ioctl } for pid=7254 comm="syz.2.1619" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3424.521700][ T7302] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=113 sclass=netlink_audit_socket pid=7302 comm=syz.2.1638 [ 3428.933715][ T30] audit: type=1400 audit(3428.090:164): avc: denied { read write } for pid=7305 comm="syz.2.1640" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 3428.950864][ T30] audit: type=1400 audit(3428.100:165): avc: denied { open } for pid=7305 comm="syz.2.1640" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 3516.915916][ T30] audit: type=1400 audit(3516.070:166): avc: granted { setsecparam } for pid=7381 comm="syz.1.1671" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 3745.042717][ T7574] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7574 comm=syz.2.1744 [ 3761.506576][ T30] audit: type=1400 audit(3760.660:167): avc: denied { audit_write } for pid=7589 comm="syz.2.1752" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3762.813986][ T30] audit: type=1400 audit(3761.970:168): avc: denied { write } for pid=7590 comm="syz.1.1751" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3845.341114][ T30] audit: type=1400 audit(3844.460:169): avc: denied { create } for pid=7668 comm="syz.2.1784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3845.483870][ T30] audit: type=1400 audit(3844.640:170): avc: denied { write } for pid=7668 comm="syz.2.1784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3845.625675][ T7669] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1784'. [ 3853.187479][ T30] audit: type=1400 audit(3852.290:171): avc: denied { getopt } for pid=7676 comm="syz.2.1787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3859.518798][ T30] audit: type=1400 audit(3858.580:172): avc: denied { prog_run } for pid=7681 comm="syz.2.1789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3966.307237][ T30] audit: type=1400 audit(3965.460:173): avc: denied { nlmsg_read } for pid=7764 comm="syz.2.1821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 4054.971264][ T30] audit: type=1400 audit(4054.120:174): avc: denied { write } for pid=7833 comm="syz.1.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4059.215221][ T30] audit: type=1400 audit(4058.370:175): avc: denied { mounton } for pid=7838 comm="syz.2.1849" path="/953/file0" dev="tmpfs" ino=4860 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4059.825383][ T30] audit: type=1400 audit(4058.980:176): avc: denied { unmount } for pid=4024 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 4064.152075][ T7844] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7844 comm=syz.2.1851 [ 4119.736833][ T30] audit: type=1400 audit(4118.890:177): avc: denied { getopt } for pid=7897 comm="syz.1.1872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4156.784625][ T7940] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7940 comm=syz.2.1887 [ 4280.454625][ T8042] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8042 comm=syz.2.1927 [ 4311.052876][ T30] audit: type=1400 audit(4310.200:178): avc: denied { map_read map_write } for pid=8067 comm="syz.2.1938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4438.008940][ T8192] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1988'. [ 4493.863790][ T30] audit: type=1400 audit(4493.020:179): avc: denied { setopt } for pid=8245 comm="syz.2.2010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4557.453568][ T8294] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8294 comm=syz.1.2027 [ 4594.941456][ T30] audit: type=1400 audit(4594.090:180): avc: denied { read } for pid=8325 comm="syz.2.2040" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4595.301336][ T30] audit: type=1400 audit(4594.440:181): avc: denied { open } for pid=8325 comm="syz.2.2040" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4624.319872][ T30] audit: type=1400 audit(4623.470:182): avc: denied { create } for pid=8350 comm="syz.1.2049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4624.583690][ T30] audit: type=1400 audit(4623.710:183): avc: denied { setopt } for pid=8350 comm="syz.1.2049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4734.370778][ T30] audit: type=1400 audit(4733.520:184): avc: denied { create } for pid=8447 comm="syz.2.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 4734.553733][ T30] audit: type=1400 audit(4733.710:185): avc: denied { write } for pid=8447 comm="syz.2.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 4744.264715][ T30] audit: type=1400 audit(4743.420:186): avc: denied { write } for pid=8456 comm="syz.2.2091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4757.022651][ T8472] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=8472 comm=syz.2.2097 [ 4960.745069][ T30] audit: type=1400 audit(4959.900:187): avc: denied { setopt } for pid=8649 comm="syz.1.2168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5006.436775][ T30] audit: type=1400 audit(5005.590:188): avc: denied { map_create } for pid=8694 comm="syz.1.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5006.975249][ T30] audit: type=1400 audit(5006.130:189): avc: denied { map_read map_write } for pid=8694 comm="syz.1.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5076.252773][ T8769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8769 comm=syz.1.2215 [ 5082.640918][ T30] audit: type=1400 audit(5081.760:190): avc: denied { map } for pid=8773 comm="syz.1.2217" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 5199.935728][ T8851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8851 comm=syz.2.2246 [ 5373.380975][ T30] audit: type=1400 audit(5372.520:191): avc: denied { read } for pid=9008 comm="syz.1.2308" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 5373.476056][ T30] audit: type=1400 audit(5372.630:192): avc: denied { open } for pid=9008 comm="syz.1.2308" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 5373.604851][ T30] audit: type=1400 audit(5372.740:193): avc: denied { ioctl } for pid=9008 comm="syz.1.2308" path="/dev/fb0" dev="devtmpfs" ino=620 ioctlcmd=0x4610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 5393.423951][ T30] audit: type=1400 audit(5392.580:194): avc: denied { connect } for pid=9024 comm="syz.1.2315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5403.762798][ T30] audit: type=1400 audit(5402.720:195): avc: denied { write } for pid=9031 comm="syz.2.2318" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 5426.731952][ T9050] 8021q: VLANs not supported on gre0 [ 5426.837995][ T9051] netlink: 'syz.2.2325': attribute type 1 has an invalid length. [ 5486.532429][ T9097] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1025 sclass=netlink_route_socket pid=9097 comm=syz.2.2341 [ 5529.692801][ T30] audit: type=1400 audit(5528.840:196): avc: denied { ioctl } for pid=9136 comm="syz.2.2356" path="cgroup:[4026532934]" dev="nsfs" ino=4026532934 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5563.436650][ T30] audit: type=1400 audit(5562.590:197): avc: denied { write } for pid=9168 comm="syz.2.2370" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 5563.478786][ T30] audit: type=1400 audit(5562.630:198): avc: denied { open } for pid=9168 comm="syz.2.2370" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 5640.582847][ T30] audit: type=1400 audit(5639.730:199): avc: denied { getopt } for pid=9244 comm="syz.1.2401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5718.478584][ T9316] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9316 comm=syz.1.2430 [ 5866.976315][ T9433] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 5906.041724][ T30] audit: type=1400 audit(5905.190:200): avc: denied { read write } for pid=9467 comm="syz.1.2486" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 5906.164622][ T30] audit: type=1400 audit(5905.320:201): avc: denied { open } for pid=9467 comm="syz.1.2486" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 5906.320248][ T30] audit: type=1400 audit(5905.470:202): avc: denied { ioctl } for pid=9467 comm="syz.1.2486" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf79 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 6028.073506][ T30] audit: type=1400 audit(6027.200:203): avc: denied { create } for pid=9574 comm="syz.1.2530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6028.335162][ T30] audit: type=1400 audit(6027.450:204): avc: denied { setopt } for pid=9574 comm="syz.1.2530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6095.473123][ T30] audit: type=1400 audit(6094.630:205): avc: denied { create } for pid=9629 comm="syz.2.2550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6095.630830][ T30] audit: type=1400 audit(6094.750:206): avc: denied { ioctl } for pid=9629 comm="syz.2.2550" path="socket:[23340]" dev="sockfs" ino=23340 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6162.128031][ T9691] lo speed is unknown, defaulting to 1000 [ 6162.832915][ T9691] lo speed is unknown, defaulting to 1000 [ 6163.071055][ T9691] lo speed is unknown, defaulting to 1000 [ 6176.588175][ T9697] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9697 comm=syz.1.2577 [ 6187.176838][ T9691] infiniband syz1: set active [ 6187.183969][ T8882] lo speed is unknown, defaulting to 1000 [ 6187.215034][ T9691] infiniband syz1: added lo [ 6191.687764][ T9691] RDS/IB: syz1: added [ 6191.916378][ T9691] smc: adding ib device syz1 with port count 1 [ 6192.035410][ T9691] smc: ib device syz1 port 1 has no pnetid [ 6192.044289][ T8882] lo speed is unknown, defaulting to 1000 [ 6192.374202][ T9691] lo speed is unknown, defaulting to 1000 [ 6203.407433][ T30] audit: type=1400 audit(6202.560:207): avc: denied { execute } for pid=9710 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6203.417630][ T30] audit: type=1400 audit(6202.570:208): avc: denied { execute_no_trans } for pid=9710 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6206.825606][ T9691] lo speed is unknown, defaulting to 1000 [ 6210.218624][ T9691] lo speed is unknown, defaulting to 1000 [ 6214.796334][ T8003] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6215.220793][ T8003] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6215.644835][ T8003] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6216.022993][ T8003] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6222.043377][ T8003] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6222.125975][ T8003] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6222.185144][ T8003] bond0 (unregistering): Released all slaves [ 6230.052060][ T8003] hsr_slave_0: left promiscuous mode [ 6230.074177][ T8003] hsr_slave_1: left promiscuous mode [ 6230.282777][ T8003] veth1_macvtap: left promiscuous mode [ 6230.283826][ T8003] veth0_macvtap: left promiscuous mode [ 6230.284702][ T8003] veth1_vlan: left promiscuous mode [ 6230.285328][ T8003] veth0_vlan: left promiscuous mode [ 6237.765446][ T9753] smc: removing ib device syz1 [ 6237.969684][ T8882] lo speed is unknown, defaulting to 1000 [ 6237.970590][ T8882] syz1: Port: 1 Link DOWN [ 6242.187707][ T9711] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6242.396853][ T9711] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6249.617221][ T8003] unregister_netdevice: waiting for lo to become free. Usage count = 7 [ 6249.622532][ T8003] ref_tracker: netdev@00000000d8b70dff has 1/1 users at [ 6249.622532][ T8003] ib_device_set_netdev+0x1c8/0x5b8 [ 6249.622532][ T8003] rxe_register_device+0x208/0x300 [ 6249.622532][ T8003] rxe_add+0xd50/0x10e0 [ 6249.622532][ T8003] rxe_net_add+0x9c/0x100 [ 6249.622532][ T8003] rxe_newlink+0x58/0x158 [ 6249.622532][ T8003] nldev_newlink+0x284/0x4a0 [ 6249.622532][ T8003] rdma_nl_rcv_msg+0x280/0x584 [ 6249.622532][ T8003] rdma_nl_rcv_skb.constprop.0.isra.0+0x1fc/0x338 [ 6249.622532][ T8003] rdma_nl_rcv+0x10/0x1c [ 6249.622532][ T8003] netlink_unicast+0x420/0x6f0 [ 6249.622532][ T8003] netlink_sendmsg+0x638/0xa4c [ 6249.622532][ T8003] __sock_sendmsg+0xc8/0x168 [ 6249.622532][ T8003] ____sys_sendmsg+0x524/0x730 [ 6249.622532][ T8003] ___sys_sendmsg+0x124/0x1a4 [ 6249.622532][ T8003] __sys_sendmsg+0x118/0x1a4 [ 6249.622532][ T8003] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 6249.622532][ T8003] SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 6249.683998][ T30] audit: type=1400 audit(6248.840:209): avc: denied { read } for pid=3128 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 6249.695601][ T30] audit: type=1400 audit(6248.850:210): avc: denied { search } for pid=3128 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6249.717944][ T30] audit: type=1400 audit(6248.870:211): avc: denied { search } for pid=3128 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6249.780566][ T30] audit: type=1400 audit(6248.930:212): avc: denied { add_name } for pid=3128 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6249.781441][ T30] audit: type=1400 audit(6248.930:213): avc: denied { create } for pid=3128 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6249.810722][ T30] audit: type=1400 audit(6248.940:214): avc: denied { append open } for pid=3128 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6249.846787][ T30] audit: type=1400 audit(6248.990:215): avc: denied { getattr } for pid=3128 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6256.795072][ T8003] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6257.353360][ T8003] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6257.748689][ T8003] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6258.143471][ T8003] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6262.572327][ T8003] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6262.647267][ T8003] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6262.703924][ T8003] bond0 (unregistering): Released all slaves [ 6263.608224][ T8003] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6263.678406][ T8003] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6263.735316][ T8003] bond0 (unregistering): Released all slaves [ 6264.134452][ T8003] hsr_slave_0: left promiscuous mode [ 6264.151986][ T8003] hsr_slave_1: left promiscuous mode [ 6264.220674][ T8003] veth1_macvtap: left promiscuous mode [ 6264.223615][ T8003] veth0_macvtap: left promiscuous mode [ 6264.238274][ T8003] veth1_vlan: left promiscuous mode [ 6264.240733][ T8003] veth0_vlan: left promiscuous mode