last executing test programs: 9m26.66142599s ago: executing program 1 (id=1742): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000100)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="0000722147ae63191bf796e7b09ef932d7e500c745b38d2122b1a26ffeb76936af00", @ANYRES16, @ANYBLOB="000426bd7000ffdbdf25020000000500040001000000050021000100000014002000fe880000000000000000000000000101050021000100000005001300460000000c0010000100000000000000060001000500000008000c0004000000080009000300000008", @ANYRES32, @ANYBLOB="2456a76b9648542ace65fea36ac47e0ce1bf2ab26d5b0cebfa8685fd9b064976df62da6b6fab3a36e6d51132ec105d6d90fed482cfc029247d95a8fba63723d68931af1e2e6e4eed478d013346b5e5711f6ce88e9996333cae356c6c2b049fd76ed833d3d7c31f6d6e4a25932788d7a57442d0ca76d1d125a6a77099367a5629a65dd47a52f90b96707f9d922bd551b9af783c8c76629b48b43e9bb374337c9c650532e09b29db1a36f4019e1f02a60ed0994b48bbb2d57f3bb3d781b3b3223b99549af3cd9e040face44fc8f15aecce0a23b565979ff04610d69c"], 0x74}, 0x1, 0x0, 0x0, 0x40880}, 0x40000856) 9m22.356657179s ago: executing program 1 (id=1744): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)={0x4c}, 0x4c}}, 0x4000004) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 9m18.40737035s ago: executing program 1 (id=1746): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000100), 0x0, 0x0) close(r0) socket$igmp(0x2, 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005a80), &(0x7f0000005ac0)=0xc) 9m15.315681176s ago: executing program 1 (id=1747): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) write$char_usb(r0, &(0x7f0000000280)="afe408cbf0e18f98ca60849e2dd8a1a11240a11a31038d0cc4a6673d073709971ac23453aa001c75e8f18e1d7857d1a7c27c3b3afa2c15e22a8bbfac9c88aaac717ec003c427ef757d3fafe2fb5c3b2b2f1c04e0e63dfd568ecde763ae50e0d488f6d07516eaf8e49c909ebae118ad2efe265d9426f1a671797f7a9c30b0b62234a18c7ab44fb5fdab7713061c0ccfddebffec48a0e3142fe5929afa782fd56b123efa707c5ec56c47467910da767bfea685b5c69c359abcbf26980097d8098a318c3e380991f275ecaa117f8696b65971d25c514df429f2a0b270789eb2eef5e93f828d9b95a8ddb4ebed54c2f38050e98c17be9894977b1b5d6c31921bc2c84b802ef4f005f627c1f68a8069b11792febb8407941da3192aa0abc6783aac0a9e4bf6d27b204d32f750fcf525edc6ac21dfb398d3fd68beee56f034182d0c74bd99de27ce45a4a047ceecd315f9711daf2b8431bbb561727cdcc0427c4eccd9e12c3dd57e636608b7af27c3faf5c231b7faace98aecd967ca8226baf0ab39f38203f0102af1b8d9691f8c2aa7651353a225976fa9040a69afa6311e4711e3efc6f755568f4599e1faba179ec3534b8af62f01ee505dd951e4779ac13995576116938a808ee0f08179fbae1b33973cbc66c43b763bcf52b6bdacb11ccc0431d93042e2c907c91edcebacde0bf8a0f5c1a9047c7f2942f1d87ff60e933a76c3a2c94bc4774e9fa7b1ec235465ed2e23f7362d450b7e4f0a986ad04d201e223304f0b46b041199d1ce2cffca48f099d96eaa6f9d777bb983d9aa1b495029e1eabdac7cdacc1c60fb18a64586812e676bc3ace19605ad8506518700b2119aaa722102b8f674124b4e2cd3017bee1b1eefdf1983466ed80c6f2baf1fed2ffa038dddf3ec4d57eaa662c159589f9e12c252fc70bd3eeb3d40d3e26529cb28b3511185d162295c97987a88a95e882c7b823d130ccbd73b938c9c28afe11ec6efa428d381c7a517d9494276e183317bd9e6c356887328b07135526a00f397dfcbeab9705ef23ff0c5f0ccfd2ed0b2cd289ce21dd91c8a83ac1cf9036e86a7573acd0c08ffa474f9ddeeaf381ef806e909b5756a287f1260ade85b66d78523ec3df6b9548475664e9d70c4f6427c4fd3b7d47ca5d74d06b9f83b8c71809d7768fbdf8ec2ae2cfd390c239638c598700c43aa32d349c33a7361b3dc17761277199df130b743dad6860aa4acc74812811cc2b23c70dc86c08b91b56478cd7fc7f329c8288d2a0f56c28e253e677bab15121cc1b0aebca685205452655018498db7cc1f360f954ee40d30e1e01bb151fce122246fc1b05594e411f90bf7656aa1047a475b1f4049a0569ffa9554d7d6a518bcb2d6dfcd2db02f04b3b00cf9073d212713da465a798453a2290fbb8a8c1e3f44df3d5c95f562e9f4d05a7ca45feff9df0c8ca8142e7219c946fdf3be86246bab855803370192c557b74093afb9ba3f7e61168bfeb2ffa0419e69d46286a1578479b31f19c0eba11eef2682a3f3981cd8e8aeace7ba160d821617771e5fa87009f1a037c72bab267cfefb162ed32baa83074cfb1e0d3a88120865c93bcb776447c0e866e588e654d6153c179895339f3ff6b72c25488ad1246284917797c8b88d0237d3fcc887d17c12fee983c5fc3ef4077e5c2a9773a181506b0b959fcbbb1e38e2e2f12c5492923633681c6462978b94457179a7c9a7305f25def8e059bc236a2774a287b779620f254473c505a01c498fc9cc1b859bd66675096498a650e37a0f4a039964c194760c74e456b5d19156640fbfbe52f9826f5804db2c8c6a7b1d1f9874ec6a06a6666eacd5dc4c140fd359d9cadd196c0e992e2116e134942642b79fff276370d693086ac8f9656c423de9111259b0b192ebed545256c1c1b9ba0588c9713ec32a7b1a86fdc5b6e33e16f9a0dc3b2489152b36190f35bd355ff872747a316ee7716e6e3c4f5fb7b55b01146cdb4cd784c49b0c7e94e869ea74bb9b8f7a2c01830db0d4042eef00c3971cc5e5fff90293f4134ac481f3d13fe926dac81f650ad4555e67e21e0db868ac4fef26bdc7b35f363efe7b7a9e80254ac70522f839335b5d95d8f35ec0d482844cf75184f849469ea176a1f088d82261ccf84c70513bd9ee3bb68e53f250726f198aa599e8a695a27491bdc5e137d7f50017156553a363f28d66bd6e7c3106b2d73c5fe1154209013bba45827af508c7e5b327067b0c1d1fbfa6272954035ca700881118837b059ae54f92f6e738aa4c809a7f077442a582ed6791b4414fa1cd45631ab63b8b0809276fd80d22316169961a31a16e007c4155bfe6d2c9753b967684702779d2af85da43d0c3f0b63b2e0e212e2dc7eef673eb1db0722d0541d32367824a903a849a2428f263d65f0ab538548c11ab207e91f02a7998ac9e55473521f9d55aee1ddcba27a3ad9571002895b5d5afa41c897573569711ad3ebf1b01f42a6a830b58bde126508b26786184bc1ff41a0bcac6599d8afa67ecc7cc29e02923e3e3f3bd2959474c2d1ead6faa52fc7cd1ed7a38ccd6dcae212878c26c3b7291bc2ffad3c3186c5f9ec7395470d94bdfe6998ea51926802d0b881b115257af7f428c16e38394c80bc0d0a4e6d7b74a8caa7d450f7ba65933e8acb9c900b08f593e596ec414daf142be40accbbeecddd8062142316e77d444b55a374035c26fe40ebadb0e166f77d6c7075d9b7e4d1684988aeaa8428e440cca295df97918203387dd7981e16140700634eebefcd9ab31f488546400b4ab25b819ba9d21afd830c7363535aac80a39af55e1fe4db9aa9c2a43415f8b4bf77702654bcd013d0190218628e02481f2ea807a98b27ab7916e576c06180992e554408ce9107d4aa11fed1c9ebfd9a3610bed392cb0f304a84888eeb7481b913c6559e6875abe9a78ba44844db177cb51574ca14dc38a715d6bcbf08a57699c0cca1f7249bea0682bd0d730df2c4690c871b6e3aa7dde4ba31fd17e65041f3a231cfd10421400615de4755112e7830d641f141f83afca18c5f5ace1bd60517b9860bfef475ea2fb4cbeed482b436d28bd57bfaa63fe26e8e976601bd7facebc97a12aca64059c075f2e08138f848d92203bf303d3a979139827a8c983fb6e49f3f4b155d5bb045ff3626c7f905d8b6f8db948e97b23343be1799fc8b2768b6aafdd0324907875d12ad116fcf3c739cf1cbb67b8a07adc236c2e570f7c9ccc4231641786bc6cd6e23adbff91f0a03d3185482b9f969f48d2d6b3cb0e9b30af031df9b88c8e74e515fd7ea3770b94034334e9fbcbe6b0ef736f275e600ec225cd6263058a6169c57e9cc8eed64848398fec97f098d4ce7ac05c45dba2f638cad18a305d7dafd45d076e8703c43b8f5e6687503bab80ed66fddd2fd1ef89dfbd60bb85478de2efea3da98224a7b58179beda3627f844b838eeda32577cee446aed56c9dfdabcb655d5682c0276fe5b8f97c85871cfb13bbde7930aab4d220a2ae6c509e7accdd459096dd681168e98d6608cb1345e2194a8e138f983afb0ffd55fb343137f2ab0e5a320ef337ad7c9e6024077e460c00fc68b56c25b00a436567edbe6e4c5b11a92fc56f30cd1915efe0cb237980644b94581132e6453f5f155e9573d62e53db84f21029ee9004346f9b93dcc4e998bdb2d90b128c2e4d696dffaba364e4699e8eef10491ae8641334317b7e3de9d3ddc2056edf334f5ef52da1ee42c24daa952181ce04a617a61d0dc2bdc78698a2da3d80650f776bb0c57219acbe136c2053e87deb721b41fa100aa0fb8082794506c6147a87472aeff1e1d8588faa970b7e52063beb26337a935d4335e0cac8a589a01f9f539aa687b1d96b2b3c569b4e3b29c1acb085bbe35a6188e05da296b5c98ec1efe1ab73e76df136ec04ba17cbcc48ff5a02542aef21d2893b672ed777d5198cf1a800b0b74a5857ea46b4249665c1625ba5ed5eb8532c876bacfeab86e2b2d2b23ffbd8fccffa7f101648d6ec2481839e380adf5b18160e3a29f27dd0972f4309aa1669c76ceb0a89740f1df1101ad5861c725b5ac1066fcb521efefc0750c5a1f5ca12b230d76757ccf699a0a14bf5b32ed8525952c845f670fccba7af124eecfab58fdab11d3fa249505f7fe13b8d685f36e81500f9a5584c6ad1d73f4b2f7061581c2e1c6cd0d72bd9389fe15ebfd10974bbbf738ad091d79937d3f31a57da89954597073065f63bc895c5eb5a27080f9fee6f7d9841e03ee70e9a149af7a499df8e59ef207d3144d680b5b46d595a022c16cbff09eeea4e744e534f4b26927f8a230f35d0a7f5c964da92dd32601fb1cf60a67043c4ed6153af3842343a93066abf8f6af198d80a17cb78cc8349b01a4154b27a26033a336c2ae026a2a513367305df487e11326b51f528dee151420ce1b3e655dd1f0207ba1b1eed78d031abdc8c9ec028f41e39ae7a1095371634e2c2d3289211a28ad15d5ae535095d38996417b16eb15db9dc9f50a73c912268db9ab9c43a4cb11c7732e90d32ca369fe47d845182f0a548cd20d460661e5b688b49cc3f525dd85f1515bd1651f6cd9f1458c3a0dd157913541543ccf574d85c70914b6294d9ee3d7cd47b7ff37bcf268f7b40a3d18744f003ab175272828669bfdbc9ae54902bfdb3ce2b878bc8e7e0a13d1c18bdc7626e84d58fbca5557711b8b2f4b65c890698b0920a5442ecc1c3aa6847228feb6f0133fc91ea6213e0fb28c25e09e0e3e1e68a90dd84f79e732b5b8e38c2b3b10207f45b27f73915fca767616237b1d1a9886132c9da326be30942bda90e3ebdb765c62c5070d05fd4761f0a94dfcb4794910cd5355cd367e95620bbcf93231121c8d3b8397f76c897954368bf3fd77ceb77bc5a7fe7c67f9adc7f455226af34d6251b85340928185053124fd85557e2cc0767cc1cebb12bc05122ae0bfd06b9a5a545aeb66e5247a9ec6766b21679131bea102fcce2ef3461d302006bfc7fd47c378dcc445cbb70d42e5d778041ad86ef816ad57256ad9202f7c1dc09d61b357757d6fc5e0ce63ba9e1556cec8f938e694a07bcb972d70d2000b70e4a0be6c27f42515657f5be69f4d16398c7c4bac1cb9df84286b68559c88acab71c3d3a5e1536cd0b5681e250e88547625a27cc929b508c32ae77425fb87c319a60980869c772ed3bd5a70ca27b94c8b3641942039b28b96564a2a51ae2eae0de99ffd1542f9eb8c85df1e01d2803a7756e49b9265b65350ea850221bdbde18494807ade8bf46d9b1734ed927b1a7ce332ba7f3ce46edef26942181f859fc3f9ede987e4bf0f5b5d1eca212d750a313f5c69e0eb94486f2a083fb67bf7033407f2820c7c6dcf88970c6f974119d3d6dcbc4a64920e0f37a76d98726f210c8abe1c9034252cfbca24f35e86508fa8e418e0b6c23f3848c6d8402b003a3cabe4a190dc9a51ca1bd5f4b89aef7bf69a091f260eed5d4ffec16ccd64b618d80744ca44ca95c0fc1cf391fa509491bc38866846570cd565bd904e892d24ada3199b2638b07ff2f0120361bff53ccc971612f3640cd111ef27804f7901893ce6625fd1fd5e404b104cf155b5fc6c696061bad3ed87ad3c34aaa3f864d458053387381d03811facb3e4fb05d05d1762ec3433f7a70f9d957711079a38ba5bacc21046567316a55bb240d0a3f977471666e6906c46ea9e012ed0dcaeb3eb01a0c2d715ed398f9bf3082283f2c2ffac40f44b3ac0faeff9db34e9942f9688d791eee1c82bfe273db1f460c78ae8ff19f774523087", 0x1000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r1 = syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$TIOCL_SETVESABLANK(r1, 0x541c, &(0x7f0000000040)) 9m8.57612649s ago: executing program 1 (id=1750): r0 = socket$igmp(0x2, 0x3, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x439c1, 0x0) write$evdev(r1, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) write$selinux_context(r2, 0x0, 0x0) r3 = syz_open_procfs$pagemap(0x0, &(0x7f0000000180)) ftruncate(r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "7f12ddc1517600"}) r5 = syz_open_pts(r4, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r5, 0x5451, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x141142) write$cgroup_subtree(r7, 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NL80211_CMD_SET_COALESCE(r8, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000f80)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$BATADV_CMD_SET_HARDIF(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) fcntl$setsig(r6, 0xa, 0x1f) setsockopt$IPT_SO_SET_ADD_COUNTERS(r6, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYRESOCT=r7], 0x68) getsockopt$inet_mreq(r0, 0x0, 0x20, 0x0, &(0x7f00000031c0)) 9m4.116559531s ago: executing program 1 (id=1752): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(r1, &(0x7f00000004c0)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000040)="114eb0d9cbf30e924456671e1e2dcde8b200000000de84f4a1fffb95b6408a5f81f397a6fd6239bffe2f0a42ef8a22c31db98eff3ddbf53176911d3672a959af9620636ac524042bbc706c38844d008e1dc0ec1e99919088e445e16870399c4d73d4af79060000000000000056c7bd1daeab0dc87419677b6a6da2f4941011668b06419d91f8ca18b4d1646442d36b5257", 0x91, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, 0x0, 0x40460c0) r2 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e24, 0x0, @empty}, 0x1c) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = signalfd4(r3, &(0x7f0000000180)={[0x0, 0x89]}, 0x8, 0x80000) r5 = dup3(r3, r4, 0x0) ioctl$EVIOCGUNIQ(r5, 0x80404508, &(0x7f00000003c0)=""/4096) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_int(r2, 0x29, 0x46, 0x0, 0xe) 8m18.01447998s ago: executing program 32 (id=1752): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$inet6(r1, &(0x7f00000004c0)=""/4096, 0x1000, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000040)="114eb0d9cbf30e924456671e1e2dcde8b200000000de84f4a1fffb95b6408a5f81f397a6fd6239bffe2f0a42ef8a22c31db98eff3ddbf53176911d3672a959af9620636ac524042bbc706c38844d008e1dc0ec1e99919088e445e16870399c4d73d4af79060000000000000056c7bd1daeab0dc87419677b6a6da2f4941011668b06419d91f8ca18b4d1646442d36b5257", 0x91, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_MCAST_RATE(0xffffffffffffffff, 0x0, 0x40460c0) r2 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e24, 0x0, @empty}, 0x1c) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r4 = signalfd4(r3, &(0x7f0000000180)={[0x0, 0x89]}, 0x8, 0x80000) r5 = dup3(r3, r4, 0x0) ioctl$EVIOCGUNIQ(r5, 0x80404508, &(0x7f00000003c0)=""/4096) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_int(r2, 0x29, 0x46, 0x0, 0xe) 32.776895678s ago: executing program 0 (id=1858): r0 = openat$rdma_cm(0xffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_GETFSUUID(r0, 0x80111500, &(0x7f00000007c0)) 25.966452217s ago: executing program 0 (id=1860): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000180)={[0x0, 0xffffffff]}, 0x8, 0x80000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPSET_CMD_PROTOCOL(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x6, 0x5}, 0x14}}, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x5450, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000c00), 0x0, 0x0) dup3(r3, r4, 0x0) symlinkat(&(0x7f0000000000)='./file0/../file0\x00', r4, &(0x7f0000000040)='./file0\x00') mknod(&(0x7f0000000080)='./file0\x00', 0x1000, 0x4) creat(&(0x7f0000000280)='./file0\x00', 0xa1) r5 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r5, &(0x7f0000000240)={0xa, 0x4e22, 0x0, @private1}, 0x1c) fanotify_init(0x2, 0x80000) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0xfffffffffffffef4) 17.398417151s ago: executing program 0 (id=1863): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x2c, &(0x7f0000000540)=[@in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e1f, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7fffffff}]}, &(0x7f0000000200)=0xc) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffff9c, &(0x7f0000000240)='/proc/meminfo\x00', 0x0, 0x0) 15.621987107s ago: executing program 2 (id=1864): r0 = openat$rdma_cm(0xffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_GETFSUUID(r0, 0x80111500, &(0x7f00000007c0)) 13.417513055s ago: executing program 2 (id=1865): r0 = openat$mice(0xffffff9c, &(0x7f0000000080), 0x80002) fstatfs(r0, &(0x7f0000000640)=""/128) r1 = syz_open_dev$mouse(&(0x7f0000000000), 0x6486, 0x40) readv(r1, 0x0, 0x0) r2 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x180, 0x0) r3 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x40, 0x0) r4 = dup2(r3, r3) r5 = syz_open_dev$vcsa(&(0x7f00000006c0), 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x5450, 0x0) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) write$UHID_INPUT2(r6, 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r4, 0x40186417, 0x0) r7 = openat$vcs(0xffffff9c, &(0x7f0000000040), 0xb0402, 0x0) write$P9_RGETLOCK(r7, &(0x7f0000000380)=ANY=[@ANYBLOB="1b748e2900000037020026550000ee000000006391000000e59e", @ANYRES32, @ANYBLOB='\v\x00/dev/mixer\x00'], 0x29) ioctl$VFAT_IOCTL_READDIR_BOTH(r4, 0x82187201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r8 = dup3(r2, r7, 0x0) ioctl$HIDIOCSFEATURE(r8, 0xc0404806, &(0x7f0000000100)="21b9f34f00d0c99ea587413b2386f105db43c86829eb3dbd040c2616e1c2ec3acd5172adf2ca4a2a01bec876495b1b7222ac17e40a9829b50000") ioctl$TUNGETVNETLE(r8, 0x800454dd, &(0x7f0000000080)) 12.56880287s ago: executing program 0 (id=1866): r0 = gettid() timer_create(0x2, &(0x7f000049efa0)={0x0, 0xb, 0x4, @tid=r0}, &(0x7f0000044000)=0x0) timer_settime(r1, 0x1, 0x0, 0x0) socket(0x2c, 0x3, 0x0) 10.357039299s ago: executing program 2 (id=1867): r0 = landlock_create_ruleset(&(0x7f0000000000)={0xa140}, 0x18, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040), 0x1, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x9) landlock_restrict_self(r0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = dup(r2) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r3, 0x3309) 7.451656731s ago: executing program 0 (id=1868): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x4005, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0xfffffffffffffff5, r1, {0x7, 0x1f, 0x0, 0xefa390, 0x0, 0xfffc, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x3}}, 0x50) open(&(0x7f0000000000)='./file0\x00', 0x1c1400, 0x60) 7.312158462s ago: executing program 2 (id=1869): r0 = openat$rdma_cm(0xffffff9c, 0x0, 0x2, 0x0) ioctl$FS_IOC_GETFSUUID(r0, 0x80111500, &(0x7f00000007c0)) 3.708964276s ago: executing program 2 (id=1870): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 496.892472ms ago: executing program 0 (id=1871): r0 = openat$mice(0xffffff9c, &(0x7f0000000080), 0x80002) fstatfs(r0, &(0x7f0000000640)=""/128) r1 = syz_open_dev$mouse(&(0x7f0000000000), 0x6486, 0x40) readv(r1, 0x0, 0x0) openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x180, 0x0) r2 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x40, 0x0) r3 = dup2(r2, r2) r4 = syz_open_dev$vcsa(&(0x7f00000006c0), 0x1, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r4, 0x5450, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) write$UHID_INPUT2(r5, 0x0, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40186417, 0x0) r6 = openat$vcs(0xffffff9c, &(0x7f0000000040), 0xb0402, 0x0) write$P9_RGETLOCK(r6, &(0x7f0000000380)=ANY=[@ANYBLOB="1b748e2900000037020026550000ee000000006391000000e59e", @ANYRES32, @ANYBLOB='\v\x00/dev/mixer\x00'], 0x29) ioctl$VFAT_IOCTL_READDIR_BOTH(r3, 0x82187201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 0s ago: executing program 2 (id=1872): timer_create(0x8, &(0x7f00000002c0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)=0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) timer_settime(r0, 0x0, &(0x7f0000000080)={{}, {0x77359400}}, 0x0) r1 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) r2 = socket(0x2, 0x2, 0x0) r3 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x0) ioctl$NBD_SET_SOCK(r1, 0xab00, r2) ioctl$NBD_DO_IT(r3, 0xab03) openat$sndseq(0xffffff9c, 0x0, 0x80040) ioctl$int_in(r3, 0x5421, &(0x7f0000000100)=0x3) r4 = socket(0xa, 0x1, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='setgroups\x00') write$P9_RMKDIR(r5, 0x0, 0x2) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000004880), 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000000), 0x5f6689bc, 0x403) fcntl$setflags(r6, 0x2, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r7, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETDEBUG(r8, 0x5450, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0xa}, 0x2000000c, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000000000000000000006000000"], 0x14}}, 0x240008c0) kernel console output (not intermixed with test programs): T30] audit: type=1400 audit(1681.220:4556): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1682.282897][ T30] audit: type=1400 audit(1681.980:4557): avc: denied { read } for pid=8654 comm="syz.0.1799" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1682.473811][ T30] audit: type=1400 audit(1682.170:4558): avc: denied { read open } for pid=8654 comm="syz.0.1799" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1682.658577][ T30] audit: type=1400 audit(1682.360:4559): avc: denied { ioctl } for pid=8654 comm="syz.0.1799" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1684.257169][ T30] audit: type=1400 audit(1683.950:4560): avc: denied { search } for pid=8653 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.261077][ T30] audit: type=1400 audit(1683.950:4561): avc: denied { search } for pid=8653 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.288294][ T30] audit: type=1400 audit(1683.950:4562): avc: denied { search } for pid=8653 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.473334][ T30] audit: type=1400 audit(1684.170:4563): avc: denied { search } for pid=8632 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.762493][ T30] audit: type=1400 audit(1684.460:4564): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1684.876485][ T30] audit: type=1400 audit(1684.550:4565): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1687.884556][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1687.919135][ T30] audit: type=1400 audit(1687.580:4567): avc: denied { sys_module } for pid=8455 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1688.032752][ T30] audit: type=1400 audit(1687.730:4568): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1689.116602][ T30] audit: type=1400 audit(1688.810:4569): avc: denied { search } for pid=3152 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1689.119267][ T30] audit: type=1400 audit(1688.820:4570): avc: denied { search } for pid=3152 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1689.121876][ T30] audit: type=1400 audit(1688.820:4571): avc: denied { search } for pid=3152 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1689.166151][ T30] audit: type=1400 audit(1688.860:4572): avc: denied { read } for pid=3152 comm="dhcpcd" name="n29" dev="tmpfs" ino=6516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1689.203941][ T30] audit: type=1400 audit(1688.900:4573): avc: denied { read open } for pid=3152 comm="dhcpcd" path="/run/udev/data/n29" dev="tmpfs" ino=6516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1689.229795][ T30] audit: type=1400 audit(1688.930:4574): avc: denied { getattr } for pid=3152 comm="dhcpcd" path="/run/udev/data/n29" dev="tmpfs" ino=6516 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1689.384482][ T8660] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8660 comm=syz.0.1800 [ 1690.480797][ T30] audit: type=1400 audit(1690.180:4575): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1690.579236][ T30] audit: type=1400 audit(1690.280:4576): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1694.385915][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1694.389274][ T30] audit: type=1400 audit(1694.080:4579): avc: denied { create } for pid=8663 comm="syz.0.1801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1695.026279][ T30] audit: type=1400 audit(1694.710:4580): avc: denied { read } for pid=8663 comm="syz.0.1801" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1695.078824][ T30] audit: type=1400 audit(1694.780:4581): avc: denied { read open } for pid=8663 comm="syz.0.1801" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1695.171206][ T30] audit: type=1400 audit(1694.870:4582): avc: denied { ioctl } for pid=8663 comm="syz.0.1801" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x125f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1695.850459][ T30] audit: type=1400 audit(1695.550:4583): avc: denied { execmem } for pid=8663 comm="syz.0.1801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1696.520753][ T30] audit: type=1400 audit(1696.220:4584): avc: denied { sys_module } for pid=8455 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1696.651840][ T30] audit: type=1400 audit(1696.350:4585): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1697.151038][ T30] audit: type=1400 audit(1696.850:4586): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1697.286021][ T30] audit: type=1400 audit(1696.970:4587): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1697.458134][ T30] audit: type=1400 audit(1697.150:4588): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1700.304826][ T30] audit: type=1400 audit(1700.000:4589): avc: denied { search } for pid=8665 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1700.589122][ T30] audit: type=1400 audit(1700.260:4590): avc: denied { create } for pid=8667 comm="syz.0.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1700.772366][ T30] audit: type=1400 audit(1700.470:4591): avc: denied { getopt } for pid=8667 comm="syz.0.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1700.962030][ T30] audit: type=1400 audit(1700.660:4592): avc: denied { connect } for pid=8667 comm="syz.0.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1701.101675][ T30] audit: type=1400 audit(1700.800:4593): avc: denied { name_connect } for pid=8667 comm="syz.0.1802" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1701.273350][ T30] audit: type=1400 audit(1700.970:4594): avc: denied { connect } for pid=8667 comm="syz.0.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1701.497320][ T30] audit: type=1400 audit(1701.190:4595): avc: denied { name_connect } for pid=8667 comm="syz.0.1802" dest=19999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1702.303757][ T30] audit: type=1400 audit(1702.000:4596): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1702.995907][ T30] audit: type=1400 audit(1702.690:4597): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1703.061183][ T30] audit: type=1400 audit(1702.750:4598): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1706.240019][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1706.245574][ T30] audit: type=1400 audit(1705.940:4604): avc: denied { sys_module } for pid=8455 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1706.316521][ T30] audit: type=1400 audit(1705.980:4605): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1707.724654][ T30] audit: type=1400 audit(1707.420:4606): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1707.757970][ T30] audit: type=1400 audit(1707.450:4607): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1707.759152][ T30] audit: type=1400 audit(1707.450:4608): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1707.766555][ T30] audit: type=1400 audit(1707.460:4609): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1707.800624][ T30] audit: type=1400 audit(1707.500:4610): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1707.833064][ T30] audit: type=1400 audit(1707.530:4611): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1707.885732][ T30] audit: type=1400 audit(1707.570:4612): avc: denied { read open } for pid=8675 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1707.955890][ T30] audit: type=1400 audit(1707.650:4613): avc: denied { getattr } for pid=8675 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1711.300403][ T30] kauditd_printk_skb: 92 callbacks suppressed [ 1711.301014][ T30] audit: type=1400 audit(1711.000:4706): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1711.306159][ T30] audit: type=1400 audit(1711.000:4707): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1711.306657][ T30] audit: type=1400 audit(1711.000:4708): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1711.306922][ T30] audit: type=1400 audit(1711.000:4709): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1711.497855][ T30] audit: type=1400 audit(1711.200:4710): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1711.506356][ T30] audit: type=1400 audit(1711.200:4711): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1711.507132][ T30] audit: type=1400 audit(1711.200:4712): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1711.609864][ T30] audit: type=1400 audit(1711.310:4713): avc: denied { read open } for pid=8675 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1711.737848][ T30] audit: type=1400 audit(1711.430:4714): avc: denied { getattr } for pid=8675 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1711.960373][ T30] audit: type=1400 audit(1711.660:4715): avc: denied { search } for pid=8675 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1716.334163][ T30] kauditd_printk_skb: 53 callbacks suppressed [ 1716.334718][ T30] audit: type=1400 audit(1716.030:4769): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1719.431164][ T30] audit: type=1400 audit(1719.130:4770): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1719.527256][ T30] audit: type=1400 audit(1719.200:4771): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1719.585723][ T30] audit: type=1400 audit(1719.270:4772): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1720.246690][ T30] audit: type=1400 audit(1719.940:4773): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1720.676866][ T30] audit: type=1400 audit(1720.370:4774): avc: denied { search } for pid=8685 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1720.732559][ T30] audit: type=1400 audit(1720.430:4775): avc: denied { read } for pid=8685 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1720.828589][ T30] audit: type=1400 audit(1720.530:4776): avc: denied { read open } for pid=8685 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1720.945928][ T30] audit: type=1400 audit(1720.640:4777): avc: denied { search } for pid=8685 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1720.946527][ T30] audit: type=1400 audit(1720.640:4778): avc: denied { search } for pid=8685 comm="cmp" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1724.040849][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1724.041466][ T30] audit: type=1400 audit(1723.740:4784): avc: denied { create } for pid=8688 comm="syz.0.1806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1724.267602][ T30] audit: type=1400 audit(1723.950:4785): avc: denied { getopt } for pid=8688 comm="syz.0.1806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1724.444833][ T30] audit: type=1400 audit(1724.140:4786): avc: denied { connect } for pid=8688 comm="syz.0.1806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1724.643996][ T30] audit: type=1400 audit(1724.340:4787): avc: denied { name_connect } for pid=8688 comm="syz.0.1806" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1725.202711][ T30] audit: type=1400 audit(1724.900:4788): avc: denied { sys_module } for pid=8455 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1725.273066][ T30] audit: type=1400 audit(1724.970:4789): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1726.076115][ T30] audit: type=1400 audit(1725.770:4790): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1726.176143][ T30] audit: type=1400 audit(1725.870:4791): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1726.307167][ T30] audit: type=1400 audit(1725.990:4792): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1728.472108][ T30] audit: type=1400 audit(1728.170:4793): avc: denied { search } for pid=8690 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1730.902385][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 1730.903520][ T30] audit: type=1400 audit(1730.600:4804): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1731.083866][ T30] audit: type=1400 audit(1730.780:4805): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1731.336800][ T30] audit: type=1400 audit(1731.020:4806): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1734.043561][ T30] audit: type=1400 audit(1733.740:4807): avc: denied { sys_module } for pid=8455 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1734.180927][ T30] audit: type=1400 audit(1733.870:4808): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1735.277493][ T30] audit: type=1400 audit(1734.970:4809): avc: denied { search } for pid=8696 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1735.282104][ T30] audit: type=1400 audit(1734.970:4810): avc: denied { search } for pid=8696 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1735.316649][ T30] audit: type=1400 audit(1734.970:4811): avc: denied { search } for pid=8696 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1735.762403][ T30] audit: type=1400 audit(1735.460:4812): avc: denied { search } for pid=8669 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1736.528075][ T30] audit: type=1400 audit(1736.210:4813): avc: denied { read write } for pid=8698 comm="syz.0.1808" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1736.580933][ T30] audit: type=1400 audit(1736.270:4814): avc: denied { read write open } for pid=8698 comm="syz.0.1808" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1736.751859][ T30] audit: type=1400 audit(1736.450:4815): avc: denied { ioctl } for pid=8698 comm="syz.0.1808" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0x6629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1736.962391][ T30] audit: type=1400 audit(1736.660:4816): avc: denied { ioctl } for pid=8698 comm="syz.0.1808" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0xf512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1737.263144][ T30] audit: type=1400 audit(1736.960:4817): avc: denied { allowed } for pid=8698 comm="syz.0.1808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1737.363125][ T30] audit: type=1400 audit(1737.060:4818): avc: denied { create } for pid=8698 comm="syz.0.1808" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1737.403109][ T30] audit: type=1400 audit(1737.100:4819): avc: denied { map } for pid=8698 comm="syz.0.1808" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=21300 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1737.496800][ T30] audit: type=1400 audit(1737.190:4820): avc: denied { read write } for pid=8698 comm="syz.0.1808" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=21300 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1737.571243][ T30] audit: type=1400 audit(1737.270:4821): avc: denied { map } for pid=8698 comm="syz.0.1808" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=21300 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1737.628109][ T30] audit: type=1400 audit(1737.330:4822): avc: denied { read write } for pid=8698 comm="syz.0.1808" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=21300 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1742.327280][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 1742.358345][ T30] audit: type=1400 audit(1742.020:4832): avc: denied { search } for pid=8701 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1743.158695][ T30] audit: type=1400 audit(1742.860:4833): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1743.226168][ T30] audit: type=1400 audit(1742.920:4834): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1743.329965][ T30] audit: type=1400 audit(1743.020:4835): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1745.841990][ T30] audit: type=1400 audit(1745.540:4836): avc: denied { sys_module } for pid=8455 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1746.017244][ T30] audit: type=1400 audit(1745.710:4837): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1747.284296][ T30] audit: type=1400 audit(1746.980:4838): avc: denied { create } for pid=8706 comm="syz.0.1810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1747.485527][ T30] audit: type=1400 audit(1747.180:4839): avc: denied { getopt } for pid=8706 comm="syz.0.1810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1747.562479][ T30] audit: type=1400 audit(1747.260:4840): avc: denied { connect } for pid=8706 comm="syz.0.1810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1747.607500][ T30] audit: type=1400 audit(1747.310:4841): avc: denied { name_connect } for pid=8706 comm="syz.0.1810" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1749.306244][ T30] audit: type=1400 audit(1749.000:4842): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1749.376128][ T30] audit: type=1400 audit(1749.070:4843): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1749.467954][ T30] audit: type=1400 audit(1749.170:4844): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1750.146463][ T30] audit: type=1400 audit(1749.840:4845): avc: denied { search } for pid=8705 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1750.389971][ T30] audit: type=1400 audit(1750.090:4846): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1753.946064][ T30] audit: type=1400 audit(1753.640:4847): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1754.056046][ T30] audit: type=1400 audit(1753.740:4848): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1754.107683][ T30] audit: type=1400 audit(1753.810:4849): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1754.833664][ T30] audit: type=1400 audit(1754.530:4850): avc: denied { sys_module } for pid=8455 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1754.897402][ T30] audit: type=1400 audit(1754.600:4851): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1757.056334][ T30] audit: type=1400 audit(1756.750:4852): avc: denied { create } for pid=8716 comm="syz.0.1812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1757.179161][ T30] audit: type=1400 audit(1756.880:4853): avc: denied { create } for pid=8716 comm="syz.0.1812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1757.322045][ T30] audit: type=1400 audit(1757.020:4854): avc: denied { ioctl } for pid=8716 comm="syz.0.1812" path="socket:[21321]" dev="sockfs" ino=21321 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1757.472826][ T30] audit: type=1400 audit(1757.100:4855): avc: denied { prog_load } for pid=8716 comm="syz.0.1812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1757.578068][ T30] audit: type=1400 audit(1757.270:4856): avc: denied { bpf } for pid=8716 comm="syz.0.1812" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1759.342196][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1759.346147][ T30] audit: type=1400 audit(1759.040:4863): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1759.456057][ T30] audit: type=1400 audit(1759.150:4864): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1759.560753][ T30] audit: type=1400 audit(1759.260:4865): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1759.695784][ T30] audit: type=1400 audit(1759.380:4866): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1760.593750][ T30] audit: type=1400 audit(1760.290:4867): avc: denied { search } for pid=8719 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1760.625927][ T30] audit: type=1400 audit(1760.310:4868): avc: denied { search } for pid=8719 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1760.626515][ T30] audit: type=1400 audit(1760.310:4869): avc: denied { search } for pid=8719 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1760.648024][ T30] audit: type=1400 audit(1760.350:4870): avc: denied { read open } for pid=8719 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1760.670676][ T30] audit: type=1400 audit(1760.370:4871): avc: denied { getattr } for pid=8719 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1760.737574][ T30] audit: type=1400 audit(1760.440:4872): avc: denied { search } for pid=8719 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1764.358226][ T30] kauditd_printk_skb: 86 callbacks suppressed [ 1764.358797][ T30] audit: type=1400 audit(1764.060:4959): avc: denied { search } for pid=8719 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1764.368573][ T30] audit: type=1400 audit(1764.070:4960): avc: denied { search } for pid=8719 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1764.372299][ T30] audit: type=1400 audit(1764.070:4961): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1764.374514][ T30] audit: type=1400 audit(1764.070:4962): avc: denied { search } for pid=8719 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1764.386103][ T30] audit: type=1400 audit(1764.080:4963): avc: denied { sys_module } for pid=8455 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1764.466441][ T30] audit: type=1400 audit(1764.150:4964): avc: denied { module_request } for pid=8455 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1764.480656][ T30] audit: type=1400 audit(1764.180:4965): avc: denied { read open } for pid=8719 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1764.543686][ T30] audit: type=1400 audit(1764.240:4966): avc: denied { getattr } for pid=8719 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1764.740142][ T30] audit: type=1400 audit(1764.440:4967): avc: denied { search } for pid=8719 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1764.742150][ T30] audit: type=1400 audit(1764.440:4968): avc: denied { search } for pid=8719 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1769.858413][ T8455] veth0_vlan: entered promiscuous mode [ 1771.238822][ T8455] veth1_vlan: entered promiscuous mode [ 1772.990098][ T30] kauditd_printk_skb: 62 callbacks suppressed [ 1773.014206][ T30] audit: type=1400 audit(1772.690:5031): avc: denied { search } for pid=8725 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1773.070578][ T30] audit: type=1400 audit(1772.770:5032): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1773.096965][ T30] audit: type=1400 audit(1772.770:5033): avc: denied { read } for pid=8725 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1773.101663][ T30] audit: type=1400 audit(1772.800:5034): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1773.123106][ T30] audit: type=1400 audit(1772.820:5035): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1773.217687][ T30] audit: type=1400 audit(1772.910:5036): avc: denied { read open } for pid=8725 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1773.408118][ T30] audit: type=1400 audit(1773.090:5037): avc: denied { search } for pid=8725 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1773.409136][ T30] audit: type=1400 audit(1773.090:5038): avc: denied { search } for pid=8725 comm="cmp" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1773.437116][ T30] audit: type=1400 audit(1773.120:5039): avc: denied { search } for pid=8725 comm="cmp" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1773.481084][ T30] audit: type=1400 audit(1773.180:5040): avc: denied { read } for pid=8725 comm="cmp" name="resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=6680 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1773.917009][ T8455] veth0_macvtap: entered promiscuous mode [ 1774.660330][ T8455] veth1_macvtap: entered promiscuous mode [ 1777.298742][ T8455] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1777.302454][ T8455] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1777.307455][ T8455] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1777.309083][ T8455] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1778.101486][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1778.103418][ T30] audit: type=1400 audit(1777.800:5045): avc: denied { read open } for pid=8728 comm="syz.0.1816" path="net:[4026532691]" dev="nsfs" ino=4026532691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1778.371301][ T30] audit: type=1400 audit(1778.070:5046): avc: denied { create } for pid=8728 comm="syz.0.1816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1778.721659][ T8730] SELinux: Context system_u:object_r:user_cron_spool_t:s0 is not valid (left unmapped). [ 1778.721724][ T30] audit: type=1400 audit(1778.420:5047): avc: denied { mac_admin } for pid=8728 comm="syz.0.1816" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1778.801921][ T30] audit: type=1400 audit(1778.500:5048): avc: denied { relabelto } for pid=8728 comm="syz.0.1816" name="file0" dev="tmpfs" ino=1128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:user_cron_spool_t:s0" [ 1778.908964][ T30] audit: type=1400 audit(1778.600:5049): avc: denied { associate } for pid=8728 comm="syz.0.1816" name="file0" dev="tmpfs" ino=1128 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:user_cron_spool_t:s0" [ 1779.039763][ T30] audit: type=1400 audit(1778.730:5050): avc: denied { read } for pid=8728 comm="syz.0.1816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1779.443501][ T30] audit: type=1400 audit(1779.140:5051): avc: denied { unlink } for pid=7313 comm="syz-executor" name="file0" dev="tmpfs" ino=1128 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:user_cron_spool_t:s0" [ 1779.994012][ T30] audit: type=1400 audit(1779.690:5052): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1780.066117][ T30] audit: type=1400 audit(1779.750:5053): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1780.136206][ T30] audit: type=1400 audit(1779.820:5054): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1783.174869][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 1783.177745][ T30] audit: type=1400 audit(1782.870:5081): avc: denied { mount } for pid=8455 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1783.345848][ T30] audit: type=1400 audit(1783.040:5082): avc: denied { mounton } for pid=8455 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1783.589477][ T30] audit: type=1400 audit(1783.240:5083): avc: denied { mount } for pid=8455 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1784.006382][ T30] audit: type=1400 audit(1783.700:5084): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1784.043855][ T30] audit: type=1400 audit(1783.730:5085): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1784.048094][ T30] audit: type=1400 audit(1783.740:5086): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1786.208132][ T30] audit: type=1400 audit(1785.910:5087): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1786.241028][ T30] audit: type=1400 audit(1785.940:5088): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1786.298104][ T30] audit: type=1400 audit(1786.000:5089): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1786.768400][ T30] audit: type=1400 audit(1786.470:5090): avc: denied { search } for pid=8734 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1789.106474][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 1789.116484][ T30] audit: type=1400 audit(1788.800:5100): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1789.351052][ T30] audit: type=1400 audit(1789.050:5101): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1789.725828][ T30] audit: type=1400 audit(1789.410:5102): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1790.190854][ T30] audit: type=1400 audit(1789.890:5103): avc: denied { create } for pid=8739 comm="syz.2.1763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1790.387264][ T30] audit: type=1400 audit(1790.080:5104): avc: denied { search } for pid=8714 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1791.439646][ T30] audit: type=1400 audit(1791.130:5105): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1791.546459][ T30] audit: type=1400 audit(1791.240:5106): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1791.687664][ T30] audit: type=1400 audit(1791.390:5107): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1795.227032][ T30] audit: type=1400 audit(1794.920:5108): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1795.299570][ T30] audit: type=1400 audit(1794.990:5109): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1795.349155][ T30] audit: type=1400 audit(1795.050:5110): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1795.967371][ T30] audit: type=1400 audit(1795.660:5111): avc: denied { read write } for pid=8746 comm="syz.2.1820" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1796.189262][ T30] audit: type=1400 audit(1795.880:5112): avc: denied { read write open } for pid=8746 comm="syz.2.1820" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1796.466119][ T30] audit: type=1400 audit(1796.150:5113): avc: denied { ioctl } for pid=8746 comm="syz.2.1820" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1796.590609][ T30] audit: type=1400 audit(1796.290:5114): avc: denied { ioctl } for pid=8746 comm="syz.2.1820" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xf511 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1796.726715][ T30] audit: type=1400 audit(1796.420:5115): avc: denied { ioctl } for pid=8746 comm="syz.2.1820" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1798.677975][ T30] audit: type=1400 audit(1798.370:5116): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1798.756325][ T30] audit: type=1400 audit(1798.450:5117): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1800.510496][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1800.511365][ T30] audit: type=1400 audit(1800.210:5119): avc: denied { create } for pid=8752 comm="syz.0.1821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1800.870392][ T30] audit: type=1400 audit(1800.570:5120): avc: denied { ioctl } for pid=8752 comm="syz.0.1821" path="socket:[22292]" dev="sockfs" ino=22292 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1802.105576][ T30] audit: type=1400 audit(1801.800:5121): avc: denied { read } for pid=8754 comm="syz.2.1822" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1802.144739][ T30] audit: type=1400 audit(1801.840:5122): avc: denied { read open } for pid=8754 comm="syz.2.1822" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1802.384491][ T8755] FAULT_INJECTION: forcing a failure. [ 1802.384491][ T8755] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.386308][ T8755] CPU: 1 UID: 0 PID: 8755 Comm: syz.2.1822 Not tainted 6.16.0-rc1-syzkaller #0 PREEMPT [ 1802.386379][ T8755] Hardware name: linux,dummy-virt (DT) [ 1802.386417][ T8755] Call trace: [ 1802.386445][ T8755] show_stack+0x18/0x24 (C) [ 1802.386528][ T8755] dump_stack_lvl+0xdc/0xf4 [ 1802.386580][ T8755] dump_stack+0x1c/0x28 [ 1802.386659][ T8755] should_fail_ex+0x5a0/0x6ac [ 1802.386773][ T8755] should_failslab+0xbc/0x11c [ 1802.386895][ T8755] __kmalloc_noprof+0xd0/0x4d0 [ 1802.387006][ T8755] tomoyo_encode2+0xa8/0x2c0 [ 1802.387160][ T8755] tomoyo_encode+0x28/0x40 [ 1802.387212][ T8755] tomoyo_realpath_from_path+0x114/0x534 [ 1802.387307][ T8755] tomoyo_path_number_perm+0x200/0x438 [ 1802.387412][ T8755] tomoyo_file_ioctl+0x1c/0x28 [ 1802.387516][ T8755] security_file_ioctl_compat+0x8c/0x19c [ 1802.387630][ T8755] __arm64_compat_sys_ioctl+0x98/0x238 [ 1802.387747][ T8755] invoke_syscall+0x6c/0x258 [ 1802.387855][ T8755] el0_svc_common.constprop.0+0xac/0x230 [ 1802.387979][ T8755] do_el0_svc_compat+0x40/0x68 [ 1802.388086][ T8755] el0_svc_compat+0x4c/0x17c [ 1802.388206][ T8755] el0t_32_sync_handler+0x98/0x13c [ 1802.388311][ T8755] el0t_32_sync+0x19c/0x1a0 [ 1802.392590][ T8755] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1802.496211][ T30] audit: type=1400 audit(1802.180:5124): avc: denied { ioctl } for pid=8754 comm="syz.2.1822" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x9417 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1802.496912][ T30] audit: type=1400 audit(1802.140:5123): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1802.623543][ T30] audit: type=1400 audit(1802.280:5125): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1802.740948][ T30] audit: type=1400 audit(1802.400:5126): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1802.969097][ T30] audit: type=1400 audit(1802.670:5127): avc: denied { search } for pid=8751 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1803.836717][ T30] audit: type=1400 audit(1803.530:5128): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1806.585779][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1806.586811][ T30] audit: type=1400 audit(1806.270:5131): avc: denied { read } for pid=8756 comm="syz.0.1823" name="loop9" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1806.730608][ T30] audit: type=1400 audit(1806.410:5132): avc: denied { read open } for pid=8756 comm="syz.0.1823" path="/dev/loop9" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1806.827504][ T30] audit: type=1400 audit(1806.530:5133): avc: denied { ioctl } for pid=8756 comm="syz.0.1823" path="/dev/loop9" dev="devtmpfs" ino=646 ioctlcmd=0x4c03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1807.878616][ T30] audit: type=1400 audit(1807.570:5134): avc: denied { create } for pid=8759 comm="syz.2.1824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1808.856761][ T30] audit: type=1400 audit(1808.500:5135): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1808.941314][ T30] audit: type=1400 audit(1808.640:5136): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1809.054436][ T30] audit: type=1400 audit(1808.750:5137): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1809.489357][ T30] audit: type=1400 audit(1809.190:5138): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1809.606215][ T30] audit: type=1400 audit(1809.290:5139): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1809.720653][ T30] audit: type=1400 audit(1809.420:5140): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1813.402174][ T30] audit: type=1400 audit(1813.100:5141): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1813.444535][ T30] audit: type=1400 audit(1813.140:5142): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1813.470629][ T30] audit: type=1400 audit(1813.170:5143): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1814.209173][ T30] audit: type=1400 audit(1813.900:5144): avc: denied { create } for pid=8764 comm="syz.2.1826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1814.679787][ T30] audit: type=1400 audit(1814.380:5145): avc: denied { write } for pid=8764 comm="syz.2.1826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1816.023463][ T30] audit: type=1400 audit(1815.720:5146): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1816.147158][ T30] audit: type=1400 audit(1815.840:5147): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1816.258194][ T30] audit: type=1400 audit(1815.950:5148): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1817.076858][ T30] audit: type=1400 audit(1816.770:5149): avc: denied { read } for pid=8767 comm="syz.0.1827" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1817.226436][ T30] audit: type=1400 audit(1816.920:5150): avc: denied { read open } for pid=8767 comm="syz.0.1827" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1818.333716][ T8768] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1827'. [ 1818.627863][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1818.628648][ T30] audit: type=1400 audit(1818.320:5155): avc: denied { create } for pid=8767 comm="syz.0.1827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1818.687392][ T30] audit: type=1400 audit(1818.370:5156): avc: denied { search } for pid=8765 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1818.691652][ T30] audit: type=1400 audit(1818.370:5157): avc: denied { search } for pid=8765 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1818.696469][ T30] audit: type=1400 audit(1818.370:5158): avc: denied { search } for pid=8765 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1818.698901][ T30] audit: type=1400 audit(1818.370:5159): avc: denied { search } for pid=8765 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1818.854039][ T30] audit: type=1400 audit(1818.540:5160): avc: denied { write } for pid=8767 comm="syz.0.1827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1819.058735][ T30] audit: type=1400 audit(1818.760:5161): avc: denied { ioctl } for pid=8767 comm="syz.0.1827" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x9417 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1820.311648][ T30] audit: type=1400 audit(1820.010:5162): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1820.368118][ T30] audit: type=1400 audit(1820.040:5163): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1820.407003][ T30] audit: type=1400 audit(1820.090:5164): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1823.640783][ T30] kauditd_printk_skb: 52 callbacks suppressed [ 1823.652945][ T30] audit: type=1400 audit(1823.340:5217): avc: denied { getattr } for pid=8771 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1823.737249][ T30] audit: type=1400 audit(1823.420:5218): avc: denied { search } for pid=8771 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1823.738446][ T30] audit: type=1400 audit(1823.420:5219): avc: denied { search } for pid=8771 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1823.739005][ T30] audit: type=1400 audit(1823.420:5220): avc: denied { search } for pid=8771 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1823.739536][ T30] audit: type=1400 audit(1823.420:5221): avc: denied { search } for pid=8771 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1823.818360][ T30] audit: type=1400 audit(1823.500:5222): avc: denied { search } for pid=8771 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1823.819060][ T30] audit: type=1400 audit(1823.500:5223): avc: denied { search } for pid=8771 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1823.819348][ T30] audit: type=1400 audit(1823.500:5224): avc: denied { search } for pid=8771 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1823.848986][ T30] audit: type=1400 audit(1823.530:5225): avc: denied { read open } for pid=8771 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1823.866261][ T30] audit: type=1400 audit(1823.560:5226): avc: denied { getattr } for pid=8771 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1828.726809][ T30] kauditd_printk_skb: 82 callbacks suppressed [ 1828.744170][ T30] audit: type=1400 audit(1828.420:5309): avc: denied { add_name search } for pid=8765 comm="dhcpcd-run-hook" name="resolv.conf.eth2.ipv4ll" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1828.806596][ T30] audit: type=1400 audit(1828.420:5310): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1828.896440][ T30] audit: type=1400 audit(1828.570:5311): avc: denied { create } for pid=8765 comm="dhcpcd-run-hook" name="resolv.conf.eth2.ipv4ll" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1828.913413][ T30] audit: type=1400 audit(1828.610:5312): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1829.100774][ T30] audit: type=1400 audit(1828.800:5313): avc: denied { write open } for pid=8765 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=6724 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1829.268827][ T30] audit: type=1400 audit(1828.950:5314): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1829.357802][ T30] audit: type=1400 audit(1829.020:5315): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1829.376441][ T30] audit: type=1400 audit(1829.070:5316): avc: denied { search } for pid=8765 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.380005][ T30] audit: type=1400 audit(1829.070:5317): avc: denied { search } for pid=8765 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.383368][ T30] audit: type=1400 audit(1829.070:5318): avc: denied { search } for pid=8765 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1833.366709][ T8781] fuse: Bad value for 'group_id' [ 1833.367759][ T8781] fuse: Bad value for 'group_id' [ 1834.491850][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 1834.494139][ T30] audit: type=1400 audit(1834.190:5345): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1834.686299][ T30] audit: type=1400 audit(1834.380:5346): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1834.709428][ T30] audit: type=1400 audit(1834.410:5347): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1834.803489][ T30] audit: type=1400 audit(1834.490:5348): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1834.863808][ T30] audit: type=1400 audit(1834.500:5349): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1834.993562][ T30] audit: type=1400 audit(1834.690:5350): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1837.630724][ T30] audit: type=1400 audit(1837.330:5351): avc: denied { search } for pid=8783 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1837.666308][ T30] audit: type=1400 audit(1837.360:5352): avc: denied { read } for pid=8783 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1837.697218][ T30] audit: type=1400 audit(1837.400:5353): avc: denied { read open } for pid=8783 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1837.748229][ T30] audit: type=1400 audit(1837.450:5354): avc: denied { search } for pid=8783 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1839.623585][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 1839.624201][ T30] audit: type=1400 audit(1839.320:5370): avc: denied { mount } for pid=8784 comm="syz.0.1833" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1839.868250][ T8786] FAULT_INJECTION: forcing a failure. [ 1839.868250][ T8786] name failslab, interval 1, probability 0, space 0, times 0 [ 1839.876520][ T8786] CPU: 0 UID: 0 PID: 8786 Comm: syz.0.1833 Not tainted 6.16.0-rc1-syzkaller #0 PREEMPT [ 1839.876627][ T8786] Hardware name: linux,dummy-virt (DT) [ 1839.876662][ T8786] Call trace: [ 1839.876718][ T8786] show_stack+0x18/0x24 (C) [ 1839.876807][ T8786] dump_stack_lvl+0xdc/0xf4 [ 1839.876868][ T8786] dump_stack+0x1c/0x28 [ 1839.876946][ T8786] should_fail_ex+0x5a0/0x6ac [ 1839.877051][ T8786] should_failslab+0xbc/0x11c [ 1839.877156][ T8786] kmem_cache_alloc_lru_noprof+0x7c/0x3b8 [ 1839.877262][ T8786] __d_alloc+0x34/0x948 [ 1839.877365][ T8786] d_alloc+0x34/0x180 [ 1839.877455][ T8786] d_alloc_parallel+0xd8/0xf38 [ 1839.877551][ T8786] __lookup_slow+0x128/0x310 [ 1839.877658][ T8786] walk_component+0x1f0/0x484 [ 1839.877756][ T8786] path_lookupat+0xf0/0x50c [ 1839.877862][ T8786] filename_lookup+0x16c/0x41c [ 1839.877964][ T8786] filename_setxattr+0x98/0x15c [ 1839.878069][ T8786] path_setxattrat+0x1b0/0x204 [ 1839.878170][ T8786] __arm64_sys_setxattr+0xa8/0x114 [ 1839.878270][ T8786] invoke_syscall+0x6c/0x258 [ 1839.878374][ T8786] el0_svc_common.constprop.0+0xac/0x230 [ 1839.878472][ T8786] do_el0_svc_compat+0x40/0x68 [ 1839.878570][ T8786] el0_svc_compat+0x4c/0x17c [ 1839.878682][ T8786] el0t_32_sync_handler+0x98/0x13c [ 1839.878786][ T8786] el0t_32_sync+0x19c/0x1a0 [ 1840.396142][ T30] audit: type=1400 audit(1840.090:5371): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1840.523579][ T30] audit: type=1400 audit(1840.200:5372): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1840.632994][ T30] audit: type=1400 audit(1840.320:5373): avc: denied { unmount } for pid=7313 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1840.637726][ T30] audit: type=1400 audit(1840.330:5374): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1841.807096][ T30] audit: type=1400 audit(1841.460:5375): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1841.826534][ T30] audit: type=1400 audit(1841.520:5376): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1841.976890][ T30] audit: type=1400 audit(1841.670:5377): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1844.269640][ T30] audit: type=1400 audit(1843.950:5378): avc: denied { read write } for pid=8789 comm="syz.2.1835" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1844.318652][ T30] audit: type=1400 audit(1844.020:5379): avc: denied { read open } for pid=8789 comm="syz.2.1835" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1844.676284][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1844.676803][ T30] audit: type=1400 audit(1844.370:5384): avc: denied { ioctl } for pid=8789 comm="syz.2.1835" path="/dev/input/mice" dev="devtmpfs" ino=706 ioctlcmd=0xf509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1844.850349][ T30] audit: type=1400 audit(1844.530:5385): avc: denied { read } for pid=8789 comm="syz.2.1835" dev="nsfs" ino=4026532621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1844.884426][ T30] audit: type=1400 audit(1844.580:5386): avc: denied { search } for pid=8788 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1844.887598][ T30] audit: type=1400 audit(1844.580:5387): avc: denied { search } for pid=8788 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1844.889264][ T30] audit: type=1400 audit(1844.580:5388): avc: denied { search } for pid=8788 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1844.903213][ T30] audit: type=1400 audit(1844.600:5389): avc: denied { read open } for pid=8789 comm="syz.2.1835" path="net:[4026532621]" dev="nsfs" ino=4026532621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1844.976985][ T30] audit: type=1400 audit(1844.680:5390): avc: denied { create } for pid=8789 comm="syz.2.1835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1844.988019][ T30] audit: type=1400 audit(1844.680:5391): avc: denied { getattr } for pid=8788 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=6724 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1845.141572][ T30] audit: type=1400 audit(1844.840:5392): avc: denied { ioctl } for pid=8789 comm="syz.2.1835" path="/dev/input/mice" dev="devtmpfs" ino=706 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1845.218677][ T30] audit: type=1400 audit(1844.890:5394): avc: denied { search } for pid=8788 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1850.356862][ T30] kauditd_printk_skb: 21 callbacks suppressed [ 1850.357454][ T30] audit: type=1400 audit(1850.040:5415): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1850.418476][ T30] audit: type=1400 audit(1850.120:5416): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1850.496840][ T30] audit: type=1400 audit(1850.190:5417): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1852.976220][ T30] audit: type=1400 audit(1852.660:5418): avc: denied { search } for pid=8798 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1852.986937][ T30] audit: type=1400 audit(1852.680:5419): avc: denied { search } for pid=8798 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1852.988117][ T30] audit: type=1400 audit(1852.680:5420): avc: denied { search } for pid=8798 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1854.282736][ T30] audit: type=1400 audit(1853.980:5421): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1854.386170][ T30] audit: type=1400 audit(1854.080:5422): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1854.462899][ T30] audit: type=1400 audit(1854.160:5423): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1854.950144][ T30] audit: type=1400 audit(1854.650:5424): avc: denied { create } for pid=8801 comm="syz.0.1838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1856.730841][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1856.732067][ T30] audit: type=1400 audit(1856.430:5426): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1857.011785][ T30] audit: type=1400 audit(1856.710:5427): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1857.246721][ T30] audit: type=1400 audit(1856.920:5428): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1858.099044][ T30] audit: type=1400 audit(1857.800:5429): avc: denied { create } for pid=8806 comm="syz.2.1839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1858.249172][ T30] audit: type=1400 audit(1857.950:5430): avc: denied { read write } for pid=8806 comm="syz.2.1839" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1858.367298][ T30] audit: type=1400 audit(1858.030:5431): avc: denied { read write open } for pid=8806 comm="syz.2.1839" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1858.489846][ T30] audit: type=1400 audit(1858.190:5432): avc: denied { ioctl } for pid=8806 comm="syz.2.1839" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 ioctlcmd=0x1500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1859.643235][ T30] audit: type=1400 audit(1859.340:5433): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1859.710365][ T30] audit: type=1400 audit(1859.410:5434): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1859.758106][ T30] audit: type=1400 audit(1859.460:5435): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1863.020149][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1863.021245][ T30] audit: type=1400 audit(1862.710:5440): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1863.030749][ T30] audit: type=1400 audit(1862.730:5441): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1863.031905][ T30] audit: type=1400 audit(1862.730:5442): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1863.246821][ T30] audit: type=1400 audit(1862.930:5443): avc: denied { read open } for pid=8810 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1863.332412][ T30] audit: type=1400 audit(1863.030:5444): avc: denied { getattr } for pid=8810 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1863.554571][ T30] audit: type=1400 audit(1863.250:5445): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1863.558615][ T30] audit: type=1400 audit(1863.250:5446): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1863.583717][ T30] audit: type=1400 audit(1863.270:5447): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1863.584632][ T30] audit: type=1400 audit(1863.270:5448): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1863.733355][ T30] audit: type=1400 audit(1863.430:5449): avc: denied { create } for pid=8808 comm="syz.0.1840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1868.089142][ T30] kauditd_printk_skb: 114 callbacks suppressed [ 1868.090192][ T30] audit: type=1400 audit(1867.790:5564): avc: denied { read open } for pid=8810 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1868.280713][ T30] audit: type=1400 audit(1867.980:5565): avc: denied { getattr } for pid=8810 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1868.575473][ T30] audit: type=1400 audit(1868.260:5566): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1868.576505][ T30] audit: type=1400 audit(1868.270:5567): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1868.577173][ T30] audit: type=1400 audit(1868.270:5568): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1868.577808][ T30] audit: type=1400 audit(1868.270:5569): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1869.071613][ T30] audit: type=1400 audit(1868.770:5570): avc: denied { search } for pid=8805 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1869.116727][ T30] audit: type=1400 audit(1868.800:5571): avc: denied { search } for pid=8805 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1869.118036][ T30] audit: type=1400 audit(1868.810:5572): avc: denied { search } for pid=8805 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1869.400039][ T30] audit: type=1400 audit(1869.100:5573): avc: denied { search } for pid=8805 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1873.111224][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 1873.111786][ T30] audit: type=1400 audit(1872.810:5611): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1873.256654][ T30] audit: type=1400 audit(1872.900:5612): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1873.748687][ T30] audit: type=1400 audit(1873.450:5613): avc: denied { read } for pid=8815 comm="syz.0.1842" name="nbd0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1873.962021][ T30] audit: type=1400 audit(1873.660:5614): avc: denied { read open } for pid=8815 comm="syz.0.1842" path="/dev/nbd0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1874.468815][ T30] audit: type=1400 audit(1874.170:5615): avc: denied { allowed } for pid=8815 comm="syz.0.1842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1874.740656][ T30] audit: type=1400 audit(1874.440:5616): avc: denied { create } for pid=8815 comm="syz.0.1842" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1875.281671][ T30] audit: type=1400 audit(1874.980:5617): avc: denied { read append } for pid=8815 comm="syz.0.1842" name="nbd0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1875.455774][ T30] audit: type=1400 audit(1875.150:5618): avc: denied { read open } for pid=8815 comm="syz.0.1842" path="/dev/nbd0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1875.653007][ T30] audit: type=1400 audit(1875.350:5619): avc: denied { ioctl } for pid=8815 comm="syz.0.1842" path="/dev/nbd0" dev="devtmpfs" ino=653 ioctlcmd=0x64c5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1877.259678][ T30] audit: type=1400 audit(1876.960:5620): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1878.179364][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 1878.180158][ T30] audit: type=1400 audit(1877.880:5634): avc: denied { getattr } for pid=8817 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1878.252575][ T30] audit: type=1400 audit(1877.940:5635): avc: denied { getattr } for pid=8817 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.ipv4ll" dev="tmpfs" ino=6750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1882.096168][ T30] audit: type=1400 audit(1881.790:5636): avc: denied { create } for pid=8820 comm="syz.2.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1882.378166][ T30] audit: type=1400 audit(1882.050:5637): avc: denied { getopt } for pid=8820 comm="syz.2.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1883.655985][ T30] audit: type=1400 audit(1883.350:5638): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1883.724796][ T30] audit: type=1400 audit(1883.420:5639): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1883.789386][ T30] audit: type=1400 audit(1883.490:5640): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1885.956710][ T30] audit: type=1400 audit(1885.640:5641): avc: denied { search } for pid=8821 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1885.957483][ T30] audit: type=1400 audit(1885.640:5642): avc: denied { search } for pid=8821 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1885.958332][ T30] audit: type=1400 audit(1885.640:5643): avc: denied { search } for pid=8821 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1886.090356][ T30] audit: type=1400 audit(1885.780:5644): avc: denied { getattr } for pid=8821 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth3.ipv4ll" dev="tmpfs" ino=6750 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1886.246983][ T30] audit: type=1400 audit(1885.940:5645): avc: denied { search } for pid=8821 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1886.253193][ T30] audit: type=1400 audit(1885.950:5646): avc: denied { search } for pid=8821 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1886.267313][ T30] audit: type=1400 audit(1885.960:5647): avc: denied { search } for pid=8821 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1888.706566][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 1888.709162][ T30] audit: type=1400 audit(1888.400:5660): avc: denied { create } for pid=8824 comm="syz.2.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1888.942200][ T30] audit: type=1400 audit(1888.640:5661): avc: denied { ioctl } for pid=8824 comm="syz.2.1847" path="socket:[22413]" dev="sockfs" ino=22413 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1889.745905][ T30] audit: type=1400 audit(1889.440:5663): avc: denied { getopt } for pid=8824 comm="syz.2.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1889.746617][ T30] audit: type=1400 audit(1889.410:5662): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1889.915810][ T30] audit: type=1400 audit(1889.600:5664): avc: denied { read } for pid=8824 comm="syz.2.1847" dev="nsfs" ino=4026532621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1889.993127][ T30] audit: type=1400 audit(1889.690:5665): avc: denied { create } for pid=8824 comm="syz.2.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1890.026200][ T30] audit: type=1400 audit(1889.720:5666): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1890.195967][ T30] audit: type=1400 audit(1889.890:5667): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1890.212676][ T30] audit: type=1400 audit(1889.910:5668): avc: denied { read open } for pid=8824 comm="syz.2.1847" path="net:[4026532621]" dev="nsfs" ino=4026532621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1890.247633][ T30] audit: type=1400 audit(1889.930:5669): avc: denied { getopt } for pid=8824 comm="syz.2.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1893.853138][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1893.853739][ T30] audit: type=1400 audit(1893.550:5677): avc: denied { search } for pid=8831 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1893.886716][ T30] audit: type=1400 audit(1893.580:5678): avc: denied { search } for pid=8831 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1893.887487][ T30] audit: type=1400 audit(1893.580:5679): avc: denied { search } for pid=8831 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1895.550220][ T30] audit: type=1400 audit(1895.250:5680): avc: denied { create } for pid=8835 comm="syz.2.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1895.656835][ T30] audit: type=1400 audit(1895.350:5681): avc: denied { setopt } for pid=8835 comm="syz.2.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1895.766147][ T30] audit: type=1400 audit(1895.450:5682): avc: denied { connect } for pid=8835 comm="syz.2.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1895.886220][ T30] audit: type=1400 audit(1895.580:5683): avc: denied { name_connect } for pid=8835 comm="syz.2.1849" dest=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1895.964617][ T30] audit: type=1400 audit(1895.660:5684): avc: denied { connect } for pid=8835 comm="syz.2.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1896.094129][ T30] audit: type=1400 audit(1895.790:5685): avc: denied { name_connect } for pid=8835 comm="syz.2.1849" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1896.236416][ T30] audit: type=1400 audit(1895.920:5686): avc: denied { connect } for pid=8835 comm="syz.2.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1898.896654][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 1898.897865][ T30] audit: type=1400 audit(1898.590:5713): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1902.249926][ T30] audit: type=1400 audit(1901.930:5714): avc: denied { create } for pid=8842 comm="syz.2.1851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1902.401290][ T30] audit: type=1400 audit(1902.100:5715): avc: denied { getopt } for pid=8842 comm="syz.2.1851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1902.509154][ T30] audit: type=1400 audit(1902.210:5716): avc: denied { connect } for pid=8842 comm="syz.2.1851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1902.594455][ T30] audit: type=1400 audit(1902.290:5717): avc: denied { name_connect } for pid=8842 comm="syz.2.1851" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1902.793331][ T30] audit: type=1400 audit(1902.490:5718): avc: denied { connect } for pid=8842 comm="syz.2.1851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1903.095501][ T30] audit: type=1400 audit(1902.780:5719): avc: denied { name_connect } for pid=8842 comm="syz.2.1851" dest=19999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1903.841702][ T30] audit: type=1400 audit(1903.540:5720): avc: denied { read write } for pid=8844 comm="syz.0.1850" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1904.003542][ T30] audit: type=1400 audit(1903.700:5721): avc: denied { read write open } for pid=8844 comm="syz.0.1850" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1904.192885][ T30] audit: type=1400 audit(1903.890:5722): avc: denied { allowed } for pid=8844 comm="syz.0.1850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1904.276211][ T30] audit: type=1400 audit(1903.970:5723): avc: denied { create } for pid=8844 comm="syz.0.1850" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1904.527787][ T30] audit: type=1400 audit(1904.220:5725): avc: denied { map } for pid=8844 comm="syz.0.1850" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22549 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1904.546062][ T30] audit: type=1400 audit(1904.200:5724): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1904.647500][ T30] audit: type=1400 audit(1904.340:5726): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1904.757051][ T30] audit: type=1400 audit(1904.440:5727): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1904.852745][ T30] audit: type=1400 audit(1904.550:5728): avc: denied { read write } for pid=8844 comm="syz.0.1850" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22549 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1904.909040][ T30] audit: type=1400 audit(1904.610:5729): avc: denied { map } for pid=8844 comm="syz.0.1850" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22549 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1904.970530][ T30] audit: type=1400 audit(1904.670:5730): avc: denied { read write } for pid=8844 comm="syz.0.1850" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22549 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1909.129182][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 1909.130600][ T30] audit: type=1400 audit(1908.820:5741): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1909.264626][ T30] audit: type=1400 audit(1908.960:5742): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1909.476175][ T30] audit: type=1400 audit(1909.160:5743): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1910.586015][ T30] audit: type=1400 audit(1910.280:5744): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.586707][ T30] audit: type=1400 audit(1910.280:5745): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.587214][ T30] audit: type=1400 audit(1910.280:5746): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.631551][ T30] audit: type=1400 audit(1910.330:5747): avc: denied { read open } for pid=8851 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.743336][ T30] audit: type=1400 audit(1910.440:5748): avc: denied { getattr } for pid=8851 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.956648][ T30] audit: type=1400 audit(1910.640:5749): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1910.966563][ T30] audit: type=1400 audit(1910.660:5750): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1914.136499][ T30] kauditd_printk_skb: 98 callbacks suppressed [ 1914.137065][ T30] audit: type=1400 audit(1913.810:5849): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1914.146538][ T30] audit: type=1400 audit(1913.840:5850): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1914.225261][ T30] audit: type=1400 audit(1913.920:5851): avc: denied { read open } for pid=8853 comm="syz.0.1853" path="net:[4026532691]" dev="nsfs" ino=4026532691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1914.233989][ T30] audit: type=1400 audit(1913.930:5852): avc: denied { read open } for pid=8851 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1914.324697][ T30] audit: type=1400 audit(1914.020:5853): avc: denied { getattr } for pid=8851 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1914.429199][ T30] audit: type=1400 audit(1914.130:5854): avc: denied { create } for pid=8853 comm="syz.0.1853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1914.545946][ T30] audit: type=1400 audit(1914.240:5855): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1914.546586][ T30] audit: type=1400 audit(1914.240:5856): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1914.546856][ T30] audit: type=1400 audit(1914.240:5857): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1914.547117][ T30] audit: type=1400 audit(1914.240:5858): avc: denied { search } for pid=8851 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1919.158339][ T30] kauditd_printk_skb: 81 callbacks suppressed [ 1919.158937][ T30] audit: type=1400 audit(1918.860:5940): avc: denied { read } for pid=8853 comm="syz.0.1853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1919.430816][ T30] audit: type=1400 audit(1919.130:5941): avc: denied { read } for pid=8853 comm="syz.0.1853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1919.755731][ T30] audit: type=1400 audit(1919.450:5942): avc: denied { read } for pid=8853 comm="syz.0.1853" dev="nsfs" ino=4026532691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1919.916059][ T30] audit: type=1400 audit(1919.560:5943): avc: denied { read open } for pid=8853 comm="syz.0.1853" path="net:[4026532691]" dev="nsfs" ino=4026532691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1920.237817][ T30] audit: type=1400 audit(1919.940:5944): avc: denied { create } for pid=8853 comm="syz.0.1853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1920.352582][ T30] audit: type=1400 audit(1920.050:5945): avc: denied { write } for pid=8853 comm="syz.0.1853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1920.524463][ T30] audit: type=1400 audit(1920.220:5946): avc: denied { module_request } for pid=8853 comm="syz.0.1853" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1920.966191][ T30] audit: type=1400 audit(1920.660:5947): avc: denied { write } for pid=8853 comm="syz.0.1853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1921.063775][ T30] audit: type=1400 audit(1920.750:5948): avc: denied { read } for pid=8853 comm="syz.0.1853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1922.505894][ T30] audit: type=1400 audit(1922.200:5949): avc: denied { create } for pid=8867 comm="syz.2.1856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1924.269412][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1924.270037][ T30] audit: type=1400 audit(1923.970:5957): avc: denied { search } for pid=8864 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1924.275687][ T30] audit: type=1400 audit(1923.970:5958): avc: denied { search } for pid=8864 comm="cmp" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1924.276326][ T30] audit: type=1400 audit(1923.970:5959): avc: denied { search } for pid=8864 comm="cmp" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1924.346160][ T30] audit: type=1400 audit(1924.040:5960): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1924.375786][ T30] audit: type=1400 audit(1924.070:5961): avc: denied { read } for pid=8864 comm="cmp" name="resolv.conf.eth4.ipv4ll" dev="tmpfs" ino=6785 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1924.479338][ T30] audit: type=1400 audit(1924.180:5962): avc: denied { read open } for pid=8864 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth4.ipv4ll" dev="tmpfs" ino=6785 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1924.486833][ T30] audit: type=1400 audit(1924.190:5963): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1924.576495][ T30] audit: type=1400 audit(1924.270:5964): avc: denied { getattr } for pid=8864 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1924.681677][ T30] audit: type=1400 audit(1924.380:5965): avc: denied { getattr } for pid=8864 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth4.ipv4ll" dev="tmpfs" ino=6785 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1926.749078][ T30] audit: type=1400 audit(1926.390:5966): avc: denied { create } for pid=8869 comm="syz.2.1857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1929.276175][ T30] kauditd_printk_skb: 13 callbacks suppressed [ 1929.276851][ T30] audit: type=1400 audit(1928.970:5980): avc: denied { search } for pid=8870 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1929.277261][ T30] audit: type=1400 audit(1928.970:5981): avc: denied { search } for pid=8870 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1929.277592][ T30] audit: type=1400 audit(1928.970:5982): avc: denied { search } for pid=8870 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1929.321452][ T30] audit: type=1400 audit(1929.020:5983): avc: denied { remove_name search } for pid=8870 comm="rm" name="resolv.conf.eth4.ipv4ll" dev="tmpfs" ino=6785 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1929.443205][ T30] audit: type=1400 audit(1929.140:5984): avc: denied { unlink } for pid=8870 comm="rm" name="resolv.conf.eth4.ipv4ll" dev="tmpfs" ino=6785 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1930.930551][ T30] audit: type=1400 audit(1930.630:5985): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1930.953507][ T30] audit: type=1400 audit(1930.650:5986): avc: denied { create } for pid=8874 comm="syz.2.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1931.108216][ T30] audit: type=1400 audit(1930.810:5987): avc: denied { write } for pid=8874 comm="syz.2.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1931.119641][ T30] audit: type=1400 audit(1930.820:5988): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1931.223443][ T30] audit: type=1400 audit(1930.920:5989): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1934.414326][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1934.416154][ T30] audit: type=1400 audit(1934.110:5996): avc: denied { search } for pid=8878 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1934.445565][ T30] audit: type=1400 audit(1934.140:5997): avc: denied { search } for pid=8878 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1934.446270][ T30] audit: type=1400 audit(1934.140:5998): avc: denied { search } for pid=8878 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1934.878915][ T30] audit: type=1400 audit(1934.580:5999): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1934.949988][ T30] audit: type=1400 audit(1934.650:6000): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1934.999373][ T30] audit: type=1400 audit(1934.700:6001): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1936.003975][ T30] audit: type=1400 audit(1935.700:6002): avc: denied { create } for pid=8880 comm="syz.0.1860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1936.181366][ T30] audit: type=1400 audit(1935.880:6003): avc: denied { write } for pid=8880 comm="syz.0.1860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1936.598615][ T30] audit: type=1400 audit(1936.300:6004): avc: denied { search } for pid=8847 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1937.282341][ T30] audit: type=1400 audit(1936.980:6005): avc: denied { create } for pid=8884 comm="syz.2.1861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1940.580951][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1940.582153][ T30] audit: type=1400 audit(1940.280:6012): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1940.676474][ T30] audit: type=1400 audit(1940.370:6013): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1940.735641][ T30] audit: type=1400 audit(1940.430:6014): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1942.243676][ T30] audit: type=1400 audit(1941.940:6015): avc: denied { create } for pid=8889 comm="syz.0.1863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1942.412037][ T30] audit: type=1400 audit(1942.100:6016): avc: denied { getopt } for pid=8889 comm="syz.0.1863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1942.567684][ T30] audit: type=1400 audit(1942.260:6017): avc: denied { connect } for pid=8889 comm="syz.0.1863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1942.693360][ T30] audit: type=1400 audit(1942.390:6018): avc: denied { name_connect } for pid=8889 comm="syz.0.1863" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1942.844663][ T30] audit: type=1400 audit(1942.540:6019): avc: denied { connect } for pid=8889 comm="syz.0.1863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1942.878621][ T30] audit: type=1400 audit(1942.580:6020): avc: denied { name_connect } for pid=8889 comm="syz.0.1863" dest=19999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1943.055716][ T30] audit: type=1400 audit(1942.750:6021): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1945.790964][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 1945.791505][ T30] audit: type=1400 audit(1945.490:6029): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1945.844727][ T30] audit: type=1400 audit(1945.540:6030): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1945.924327][ T30] audit: type=1400 audit(1945.620:6031): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1948.008437][ T30] audit: type=1400 audit(1947.710:6032): avc: denied { create } for pid=8896 comm="syz.0.1866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1948.787021][ T30] audit: type=1400 audit(1948.480:6033): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1948.856353][ T30] audit: type=1400 audit(1948.550:6034): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1948.956841][ T30] audit: type=1400 audit(1948.650:6035): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1949.600035][ T30] audit: type=1400 audit(1949.300:6036): avc: denied { read write } for pid=7313 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1949.857087][ T30] audit: type=1400 audit(1949.560:6037): avc: denied { read write open } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1949.898868][ T30] audit: type=1400 audit(1949.600:6038): avc: denied { ioctl } for pid=7313 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1571 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1952.646523][ T30] audit: type=1400 audit(1952.340:6039): avc: denied { read write } for pid=8455 comm="syz-executor" name="loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1952.678760][ T30] audit: type=1400 audit(1952.380:6040): avc: denied { read write open } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1952.764833][ T30] audit: type=1400 audit(1952.460:6041): avc: denied { search } for pid=8900 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1952.778665][ T30] audit: type=1400 audit(1952.470:6042): avc: denied { ioctl } for pid=8455 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1952.797033][ T30] audit: type=1400 audit(1952.480:6043): avc: denied { search } for pid=8900 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1952.797586][ T30] audit: type=1400 audit(1952.480:6044): avc: denied { search } for pid=8900 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1952.797927][ T30] audit: type=1400 audit(1952.480:6045): avc: denied { search } for pid=8900 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1954.526786][ T30] audit: type=1400 audit(1954.210:6046): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1954.527855][ T30] audit: type=1400 audit(1954.210:6047): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1954.528743][ T30] audit: type=1400 audit(1954.210:6048): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1957.671786][ T30] kauditd_printk_skb: 96 callbacks suppressed [ 1957.672417][ T30] audit: type=1400 audit(1957.370:6145): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1957.715886][ T30] audit: type=1400 audit(1957.410:6146): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1957.716657][ T30] audit: type=1400 audit(1957.410:6147): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1957.795776][ T30] audit: type=1400 audit(1957.480:6148): avc: denied { read open } for pid=8904 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1957.897073][ T30] audit: type=1400 audit(1957.590:6149): avc: denied { getattr } for pid=8904 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1958.033822][ T30] audit: type=1400 audit(1957.730:6150): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1958.085594][ T30] audit: type=1400 audit(1957.780:6151): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1958.086185][ T30] audit: type=1400 audit(1957.780:6152): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1958.086468][ T30] audit: type=1400 audit(1957.780:6153): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1958.229143][ T30] audit: type=1400 audit(1957.930:6154): avc: denied { search } for pid=8904 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1961.372497][ T8909] [ 1961.373001][ T8909] ====================================================== [ 1961.373267][ T8909] WARNING: possible circular locking dependency detected [ 1961.373550][ T8909] 6.16.0-rc1-syzkaller #0 Not tainted [ 1961.373775][ T8909] ------------------------------------------------------ [ 1961.374282][ T8909] syz.2.1872/8909 is trying to acquire lock: [ 1961.374608][ T8909] ffff000014802988 (&set->update_nr_hwq_lock){++++}-{4:4}, at: blk_mq_update_nr_hw_queues+0x44/0x8e0 [ 1961.375683][ T8909] [ 1961.375683][ T8909] but task is already holding lock: [ 1961.376653][ T8909] ffff000014802a30 (&nbd->config_lock){+.+.}-{4:4}, at: nbd_ioctl+0x100/0xa08 [ 1961.378289][ T8909] [ 1961.378289][ T8909] which lock already depends on the new lock. [ 1961.378289][ T8909] [ 1961.378618][ T8909] [ 1961.378618][ T8909] the existing dependency chain (in reverse order) is: [ 1961.379011][ T8909] [ 1961.379011][ T8909] -> #2 (&nbd->config_lock){+.+.}-{4:4}: [ 1961.379579][ T8909] __mutex_lock+0x144/0x9d8 [ 1961.379901][ T8909] mutex_lock_nested+0x24/0x30 [ 1961.380156][ T8909] refcount_dec_and_mutex_lock+0x44/0xbc [ 1961.380411][ T8909] nbd_config_put+0x28/0x5b0 [ 1961.380634][ T8909] nbd_release+0x7c/0x128 [ 1961.380841][ T8909] blkdev_put_whole+0x98/0xf0 [ 1961.381068][ T8909] bdev_release+0x2a4/0x510 [ 1961.381284][ T8909] blkdev_release+0x14/0x24 [ 1961.381501][ T8909] __fput+0x2c8/0x954 [ 1961.381711][ T8909] fput_close_sync+0xdc/0x230 [ 1961.381934][ T8909] __arm64_sys_close+0x6c/0xbc [ 1961.382158][ T8909] invoke_syscall+0x6c/0x258 [ 1961.382375][ T8909] el0_svc_common.constprop.0+0xac/0x230 [ 1961.382613][ T8909] do_el0_svc+0x40/0x58 [ 1961.382819][ T8909] el0_svc+0x50/0x198 [ 1961.383032][ T8909] el0t_64_sync_handler+0x10c/0x138 [ 1961.383267][ T8909] el0t_64_sync+0x198/0x19c [ 1961.383551][ T8909] [ 1961.383551][ T8909] -> #1 (&disk->open_mutex){+.+.}-{4:4}: [ 1961.384015][ T8909] __mutex_lock+0x144/0x9d8 [ 1961.384237][ T8909] mutex_lock_nested+0x24/0x30 [ 1961.384458][ T8909] __del_gendisk+0x104/0x820 [ 1961.384685][ T8909] del_gendisk+0x110/0x1b0 [ 1961.385093][ T8909] loop_control_ioctl+0x398/0x4d8 [ 1961.385337][ T8909] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 1961.385697][ T8909] invoke_syscall+0x6c/0x258 [ 1961.385922][ T8909] el0_svc_common.constprop.0+0xac/0x230 [ 1961.386166][ T8909] do_el0_svc_compat+0x40/0x68 [ 1961.386400][ T8909] el0_svc_compat+0x4c/0x17c [ 1961.386625][ T8909] el0t_32_sync_handler+0x98/0x13c [ 1961.386861][ T8909] el0t_32_sync+0x19c/0x1a0 [ 1961.387111][ T8909] [ 1961.387111][ T8909] -> #0 (&set->update_nr_hwq_lock){++++}-{4:4}: [ 1961.387574][ T8909] __lock_acquire+0x1638/0x2380 [ 1961.387807][ T8909] lock_acquire+0x310/0x38c [ 1961.388054][ T8909] down_write+0xb0/0x1a4 [ 1961.388267][ T8909] blk_mq_update_nr_hw_queues+0x44/0x8e0 [ 1961.388517][ T8909] nbd_start_device+0xf8/0x9d0 [ 1961.388745][ T8909] nbd_ioctl+0x178/0xa08 [ 1961.388964][ T8909] compat_blkdev_ioctl+0x1f8/0x860 [ 1961.389172][ T8909] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 1961.389414][ T8909] invoke_syscall+0x6c/0x258 [ 1961.389642][ T8909] el0_svc_common.constprop.0+0xac/0x230 [ 1961.389906][ T8909] do_el0_svc_compat+0x40/0x68 [ 1961.390138][ T8909] el0_svc_compat+0x4c/0x17c [ 1961.390360][ T8909] el0t_32_sync_handler+0x98/0x13c [ 1961.390607][ T8909] el0t_32_sync+0x19c/0x1a0 [ 1961.390845][ T8909] [ 1961.390845][ T8909] other info that might help us debug this: [ 1961.390845][ T8909] [ 1961.391223][ T8909] Chain exists of: [ 1961.391223][ T8909] &set->update_nr_hwq_lock --> &disk->open_mutex --> &nbd->config_lock [ 1961.391223][ T8909] [ 1961.391933][ T8909] Possible unsafe locking scenario: [ 1961.391933][ T8909] [ 1961.392199][ T8909] CPU0 CPU1 [ 1961.392431][ T8909] ---- ---- [ 1961.392662][ T8909] lock(&nbd->config_lock); [ 1961.392975][ T8909] lock(&disk->open_mutex); [ 1961.393348][ T8909] lock(&nbd->config_lock); [ 1961.393726][ T8909] lock(&set->update_nr_hwq_lock); [ 1961.394057][ T8909] [ 1961.394057][ T8909] *** DEADLOCK *** [ 1961.394057][ T8909] [ 1961.394354][ T8909] 1 lock held by syz.2.1872/8909: [ 1961.394598][ T8909] #0: ffff000014802a30 (&nbd->config_lock){+.+.}-{4:4}, at: nbd_ioctl+0x100/0xa08 [ 1961.395313][ T8909] [ 1961.395313][ T8909] stack backtrace: [ 1961.395643][ T8909] CPU: 1 UID: 0 PID: 8909 Comm: syz.2.1872 Not tainted 6.16.0-rc1-syzkaller #0 PREEMPT [ 1961.396023][ T8909] Hardware name: linux,dummy-virt (DT) [ 1961.396235][ T8909] Call trace: [ 1961.396370][ T8909] show_stack+0x18/0x24 (C) [ 1961.396551][ T8909] dump_stack_lvl+0xa4/0xf4 [ 1961.396736][ T8909] dump_stack+0x1c/0x28 [ 1961.396907][ T8909] print_circular_bug+0x28c/0x370 [ 1961.397093][ T8909] check_noncircular+0x168/0x17c [ 1961.397284][ T8909] __lock_acquire+0x1638/0x2380 [ 1961.397462][ T8909] lock_acquire+0x310/0x38c [ 1961.397635][ T8909] down_write+0xb0/0x1a4 [ 1961.397802][ T8909] blk_mq_update_nr_hw_queues+0x44/0x8e0 [ 1961.398010][ T8909] nbd_start_device+0xf8/0x9d0 [ 1961.398211][ T8909] nbd_ioctl+0x178/0xa08 [ 1961.398391][ T8909] compat_blkdev_ioctl+0x1f8/0x860 [ 1961.398585][ T8909] __arm64_compat_sys_ioctl+0x1d0/0x238 [ 1961.398798][ T8909] invoke_syscall+0x6c/0x258 [ 1961.398979][ T8909] el0_svc_common.constprop.0+0xac/0x230 [ 1961.399173][ T8909] do_el0_svc_compat+0x40/0x68 [ 1961.399342][ T8909] el0_svc_compat+0x4c/0x17c [ 1961.399514][ T8909] el0t_32_sync_handler+0x98/0x13c [ 1961.399695][ T8909] el0t_32_sync+0x19c/0x1a0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1961.897165][ T8909] block nbd2: shutting down sockets [ 1963.143735][ T5910] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1963.341464][ T5910] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1963.452694][ T30] kauditd_printk_skb: 64 callbacks suppressed [ 1963.453073][ T30] audit: type=1400 audit(1963.150:6219): avc: denied { search } for pid=8913 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1963.489853][ T30] audit: type=1400 audit(1963.190:6220): avc: denied { read } for pid=8913 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1963.518283][ T30] audit: type=1400 audit(1963.220:6221): avc: denied { read open } for pid=8913 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1963.581971][ T30] audit: type=1400 audit(1963.280:6222): avc: denied { search } for pid=8913 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1963.582517][ T30] audit: type=1400 audit(1963.280:6223): avc: denied { search } for pid=8913 comm="cmp" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1963.582707][ T30] audit: type=1400 audit(1963.280:6224): avc: denied { search } for pid=8913 comm="cmp" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1963.610574][ T30] audit: type=1400 audit(1963.300:6225): avc: denied { read } for pid=8913 comm="cmp" name="resolv.conf.eth0.ra" dev="tmpfs" ino=6833 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1963.626685][ T30] audit: type=1400 audit(1963.320:6226): avc: denied { read open } for pid=8913 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=6833 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1963.639542][ T5910] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1963.645645][ T30] audit: type=1400 audit(1963.340:6227): avc: denied { getattr } for pid=8913 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1963.654113][ T30] audit: type=1400 audit(1963.350:6228): avc: denied { getattr } for pid=8913 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=6833 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1963.830617][ T5910] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1967.193439][ T5910] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1967.259797][ T5910] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1967.332321][ T5910] bond0 (unregistering): Released all slaves [ 1967.470802][ T5910] hsr_slave_0: left promiscuous mode [ 1967.474701][ T5910] hsr_slave_1: left promiscuous mode [ 1967.547412][ T5910] veth1_macvtap: left promiscuous mode [ 1967.548538][ T5910] veth0_macvtap: left promiscuous mode [ 1967.550137][ T5910] veth1_vlan: left promiscuous mode [ 1967.551198][ T5910] veth0_vlan: left promiscuous mode [ 1973.958631][ T5910] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1974.173950][ T5910] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1974.372300][ T5910] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1974.650225][ T5910] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1974.727189][ T30] kauditd_printk_skb: 24 callbacks suppressed [ 1974.746219][ T30] audit: type=1400 audit(1974.430:6253): avc: denied { search } for pid=8920 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1975.576221][ T30] audit: type=1400 audit(1975.270:6254): avc: denied { search } for pid=8921 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1975.588175][ T30] audit: type=1400 audit(1975.290:6255): avc: denied { search } for pid=8921 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1975.588649][ T30] audit: type=1400 audit(1975.290:6256): avc: denied { search } for pid=8921 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1975.591316][ T30] audit: type=1400 audit(1975.290:6257): avc: denied { search } for pid=8921 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1976.256440][ T30] audit: type=1400 audit(1975.960:6258): avc: denied { search } for pid=8926 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1976.257011][ T30] audit: type=1400 audit(1975.960:6259): avc: denied { search } for pid=8926 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1976.259586][ T30] audit: type=1400 audit(1975.960:6260): avc: denied { search } for pid=8926 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1976.285527][ T30] audit: type=1400 audit(1975.970:6261): avc: denied { read open } for pid=8926 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1976.300194][ T30] audit: type=1400 audit(1975.990:6262): avc: denied { getattr } for pid=8926 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1977.346081][ T5910] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1977.398455][ T5910] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1977.452047][ T5910] bond0 (unregistering): Released all slaves [ 1977.578038][ T5910] hsr_slave_0: left promiscuous mode [ 1977.582220][ T5910] hsr_slave_1: left promiscuous mode [ 1977.609745][ T5910] veth1_macvtap: left promiscuous mode [ 1977.610897][ T5910] veth0_macvtap: left promiscuous mode [ 1977.611967][ T5910] veth1_vlan: left promiscuous mode [ 1977.612708][ T5910] veth0_vlan: left promiscuous mode [ 1980.313474][ T30] kauditd_printk_skb: 168 callbacks suppressed [ 1980.335614][ T30] audit: type=1400 audit(1980.010:6431): avc: denied { search } for pid=8928 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1980.336238][ T30] audit: type=1400 audit(1980.030:6432): avc: denied { search } for pid=8928 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1980.336547][ T30] audit: type=1400 audit(1980.030:6433): avc: denied { search } for pid=8928 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1980.348994][ T30] audit: type=1400 audit(1980.050:6434): avc: denied { getattr } for pid=8928 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=6850 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1980.400064][ T30] audit: type=1400 audit(1980.100:6435): avc: denied { search } for pid=8928 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1980.405976][ T30] audit: type=1400 audit(1980.100:6436): avc: denied { search } for pid=8928 comm="rm" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1980.408896][ T30] audit: type=1400 audit(1980.100:6437): avc: denied { search } for pid=8928 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1980.413659][ T30] audit: type=1400 audit(1980.110:6438): avc: denied { search } for pid=8928 comm="rm" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1980.441432][ T30] audit: type=1400 audit(1980.140:6439): avc: denied { remove_name search } for pid=8928 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=6850 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1980.469215][ T30] audit: type=1400 audit(1980.170:6440): avc: denied { unlink } for pid=8928 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=6850 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1986.641578][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 1986.642433][ T30] audit: type=1400 audit(1986.340:6455): avc: denied { search } for pid=8931 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1987.368801][ T30] audit: type=1400 audit(1987.070:6456): avc: denied { search } for pid=8932 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1987.369817][ T30] audit: type=1400 audit(1987.070:6457): avc: denied { search } for pid=8932 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1987.370254][ T30] audit: type=1400 audit(1987.070:6458): avc: denied { search } for pid=8932 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1987.370668][ T30] audit: type=1400 audit(1987.070:6459): avc: denied { search } for pid=8932 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1987.848197][ T30] audit: type=1400 audit(1987.550:6460): avc: denied { search } for pid=8933 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1987.850185][ T30] audit: type=1400 audit(1987.550:6461): avc: denied { search } for pid=8933 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=935 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1987.852214][ T30] audit: type=1400 audit(1987.550:6462): avc: denied { search } for pid=8933 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=939 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1987.875559][ T30] audit: type=1400 audit(1987.560:6463): avc: denied { read open } for pid=8933 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1987.880553][ T30] audit: type=1400 audit(1987.580:6464): avc: denied { getattr } for pid=8933 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=940 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 VM DIAGNOSIS: 06:41:51 Registers: info registers vcpu 0 CPU#0 PC=ffff800081ab9b70 X00=ffff80008d59d004 X01=0000000000000000 X02=1fffe00002d0fd87 X03=1fffe00002d0fd85 X04=1fffe00001daac18 X05=ffff0000154d22dc X06=ffff800081aa20d4 X07=00000000000002d0 X08=0000000000000020 X09=00000000f2f2f200 X10=00000000f204f1f1 X11=1fffe00002dee204 X12=ffff600002dee205 X13=0000000000000000 X14=1fffe0000247dacd X15=1850323445fac26e X16=6fa10000f351ffff X17=6aded367b8dac576 X18=ffff00001fdfd500 X19=ffff00001687ec00 X20=0000000000000001 X21=1fffe00002d0fd88 X22=0000000000000003 X23=ffff000020392500 X24=1fffe00002dee200 X25=ffff00000ed560c4 X26=0000000000000040 X27=0000000000000000 X28=0000000000b610f7 X29=ffff800080006190 X30=ffff800081a9c738 SP=ffff800080006190 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000854d7e14 X00=00000000000000c0 X01=0000000000000001 X02=0000000000000001 X03=ffff800080322a90 X04=ffff700010f53915 X05=ffff800087a9c8a0 X06=ffff700010f53914 X07=0000000000000001 X08=ffff800087a9c8a0 X09=dfff800000000000 X10=ffff700010f53914 X11=1ffff00010f53914 X12=ffff700010f53915 X13=205d393039385420 X14=2b2e2b7b296b636f X15=7d343a347b2d7d2e X16=626e203a7461202c X17=2b6c74636f695f64 X18=0000000000000000 X19=00000000000000c0 X20=ffff800087a9c8a0 X21=ffff8000a0697320 X22=1fffe00001d9dc5b X23=0000000000000001 X24=1fffe00001d9dc5a X25=ffff00000ecee2d0 X26=ffff00000ecee2d8 X27=ffff00000ecee080 X28=ffff8000a0697320 X29=ffff8000a0697090 X30=ffff8000854d7e04 SP=ffff8000a0697090 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000