last executing test programs: 27m24.634021289s ago: executing program 0 (id=570): r0 = openat$mixer(0xffffff9c, &(0x7f0000001280), 0x0, 0x0) r1 = dup(r0) ioctl$EXT4_IOC_GETSTATE(r1, 0x5452, &(0x7f00000000c0)) 27m23.871371955s ago: executing program 0 (id=571): socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) recvfrom$llc(r0, &(0x7f0000000180)=""/156, 0x9c, 0x2000, 0x0, 0x62) 27m23.216647448s ago: executing program 0 (id=573): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) r1 = dup(r0) sendto$l2tp6(r1, &(0x7f0000000000)="96e80f4ebcf6211532db67cd631f4dfc9535fb0abffe37a5b2bc3b123bd8081782f075a40a8d1de68967542f1ddec756e9a0a5c718f7b6b54700a5fa5c5f874fdd75942793e1576f710e12a3bc17b6e4", 0x0, 0x20000050, 0x0, 0x34) 27m22.336895415s ago: executing program 0 (id=575): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount(&(0x7f0000000040)=@rnullb, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='ramfs\x00', 0x1200800, &(0x7f0000000240)='\x00') 27m21.380212574s ago: executing program 0 (id=577): r0 = openat$sequencer2(0xffffff9c, &(0x7f0000000040), 0xa0901, 0x0) r1 = dup(r0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, 0x0) 27m19.683697787s ago: executing program 0 (id=579): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup(r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) 27m19.664727597s ago: executing program 32 (id=579): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup(r0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) 21.328724318s ago: executing program 1 (id=3787): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='cubic', 0x5) 20.610011062s ago: executing program 1 (id=3789): r0 = getpid() r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) kcmp(r0, r0, 0x1, 0xffffffffffffffff, r1) 19.938892825s ago: executing program 1 (id=3790): r0 = openat$mixer(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = dup(r0) ioctl$HIDIOCGRAWPHYS(r1, 0x80404805, &(0x7f00000001c0)) 19.292674938s ago: executing program 1 (id=3792): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) syz_clone3(&(0x7f00000004c0)={0xe12d480, &(0x7f0000000480), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18.420384266s ago: executing program 1 (id=3796): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000080)={0xa458, 0x88, 0x6, 0x9e9e, 0x4, "09580640000a000000e6ff17ac5b00", 0x5, 0x2}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xff) 16.556831452s ago: executing program 1 (id=3798): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x2041, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0x5450, 0x0) 3.980208011s ago: executing program 2 (id=3815): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) write$P9_RXATTRWALK(r1, 0x0, 0x0) 3.588402299s ago: executing program 2 (id=3816): r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup(r0) read$eventfd(r1, 0x0, 0x0) 2.719609906s ago: executing program 2 (id=3817): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) chroot(&(0x7f00000004c0)='./file0\x00') openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) 1.944366141s ago: executing program 2 (id=3818): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) write$FUSE_INTERRUPT(r1, 0x0, 0x0) 1.47191877s ago: executing program 2 (id=3819): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0x5451, 0x0) 0s ago: executing program 2 (id=3820): r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000440)={0x0, "3f6fb7b2dfda0c8df8c0bb2c8a7cef38187fd36c295791d549b811e488653ed9", 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_OBJ_SETPROPERTY(r1, 0x5450, 0x0) kernel console output (not intermixed with test programs): [ 344.936371][ T30] audit: type=1400 audit(343.440:91): avc: denied { write } for pid=3329 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 352.792878][ T30] audit: type=1400 audit(351.280:92): avc: denied { write } for pid=3338 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 354.418975][ T30] audit: type=1400 audit(352.920:93): avc: denied { write } for pid=3341 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 356.588006][ T30] audit: type=1400 audit(355.090:94): avc: denied { write } for pid=3344 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 357.873910][ T30] audit: type=1400 audit(356.380:95): avc: denied { write } for pid=3347 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 Warning: Permanently added '[localhost]:57280' (ED25519) to the list of known hosts. [ 419.639302][ T30] audit: type=1400 audit(418.140:96): avc: denied { name_bind } for pid=3352 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 420.284248][ T30] audit: type=1400 audit(418.790:97): avc: denied { execute } for pid=3353 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 420.300825][ T30] audit: type=1400 audit(418.800:98): avc: denied { execute_no_trans } for pid=3353 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 423.775039][ T30] audit: type=1400 audit(422.280:99): avc: denied { write } for pid=3354 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 424.501802][ T30] audit: type=1400 audit(423.000:100): avc: denied { write } for pid=3357 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 430.759541][ T30] audit: type=1400 audit(429.260:101): avc: denied { mounton } for pid=3353 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 430.802501][ T30] audit: type=1400 audit(429.300:102): avc: denied { mount } for pid=3353 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 430.843733][ T3353] cgroup: Unknown subsys name 'net' [ 430.901733][ T30] audit: type=1400 audit(429.400:103): avc: denied { unmount } for pid=3353 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 431.350467][ T3353] cgroup: Unknown subsys name 'cpuset' [ 431.434675][ T3353] cgroup: Unknown subsys name 'rlimit' [ 431.817509][ T30] audit: type=1400 audit(430.320:104): avc: denied { setattr } for pid=3353 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 431.829183][ T30] audit: type=1400 audit(430.330:105): avc: denied { mounton } for pid=3353 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 431.840164][ T30] audit: type=1400 audit(430.340:106): avc: denied { mount } for pid=3353 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 432.704720][ T3361] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 432.712630][ T30] audit: type=1400 audit(431.210:107): avc: denied { relabelto } for pid=3361 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 432.722417][ T30] audit: type=1400 audit(431.220:108): avc: denied { write } for pid=3361 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 432.879812][ T30] audit: type=1400 audit(431.380:109): avc: denied { read } for pid=3353 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 432.888320][ T30] audit: type=1400 audit(431.380:110): avc: denied { open } for pid=3353 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 432.918605][ T3353] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 457.542458][ T30] audit: type=1400 audit(456.040:111): avc: denied { execmem } for pid=3362 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 457.665677][ T30] audit: type=1400 audit(456.170:112): avc: denied { read } for pid=3364 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 457.669740][ T30] audit: type=1400 audit(456.170:113): avc: denied { open } for pid=3364 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 457.701513][ T30] audit: type=1400 audit(456.200:114): avc: denied { mounton } for pid=3364 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 457.804925][ T30] audit: type=1400 audit(456.300:115): avc: denied { module_request } for pid=3364 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 458.058700][ T30] audit: type=1400 audit(456.560:116): avc: denied { sys_module } for pid=3364 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 468.239603][ T3364] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 468.314561][ T3364] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 468.920048][ T3366] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 468.965122][ T3366] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 473.240959][ T3364] hsr_slave_0: entered promiscuous mode [ 473.252737][ T3364] hsr_slave_1: entered promiscuous mode [ 473.759364][ T3366] hsr_slave_0: entered promiscuous mode [ 473.768190][ T3366] hsr_slave_1: entered promiscuous mode [ 473.775098][ T3366] debugfs: 'hsr0' already exists in 'hsr' [ 473.777543][ T3366] Cannot create hsr debugfs directory [ 476.807424][ T30] audit: type=1400 audit(475.310:117): avc: denied { create } for pid=3364 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 476.820011][ T30] audit: type=1400 audit(475.320:118): avc: denied { write } for pid=3364 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 476.847000][ T30] audit: type=1400 audit(475.350:119): avc: denied { read } for pid=3364 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 476.905885][ T3364] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 476.983398][ T3364] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 476.998975][ T3364] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 477.097095][ T3364] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 477.214654][ T3364] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 477.266375][ T3364] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 477.374952][ T3364] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 477.406848][ T3364] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 477.965646][ T3366] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 478.007730][ T3366] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 478.042869][ T3366] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 478.073728][ T3366] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 478.080496][ T3366] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 478.132478][ T3366] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 478.194806][ T3366] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 478.288579][ T3366] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 481.790248][ T3364] 8021q: adding VLAN 0 to HW filter on device bond0 [ 482.856557][ T3366] 8021q: adding VLAN 0 to HW filter on device bond0 [ 496.682412][ T3364] veth0_vlan: entered promiscuous mode [ 496.866177][ T3364] veth1_vlan: entered promiscuous mode [ 497.393405][ T3364] veth0_macvtap: entered promiscuous mode [ 497.465289][ T3364] veth1_macvtap: entered promiscuous mode [ 497.942887][ T3366] veth0_vlan: entered promiscuous mode [ 498.275694][ T3366] veth1_vlan: entered promiscuous mode [ 498.493866][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 498.503310][ T1163] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 498.534915][ T1163] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 498.536280][ T1163] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 499.477241][ T30] audit: type=1400 audit(497.970:120): avc: denied { mounton } for pid=3364 comm="syz-executor" path="/syzkaller.7i1bOo/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 499.519306][ T30] audit: type=1400 audit(498.010:121): avc: denied { mount } for pid=3364 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 499.567482][ T30] audit: type=1400 audit(498.070:122): avc: denied { mounton } for pid=3364 comm="syz-executor" path="/syzkaller.7i1bOo/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 499.620687][ T30] audit: type=1400 audit(498.120:123): avc: denied { mount } for pid=3364 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 499.726124][ T3366] veth0_macvtap: entered promiscuous mode [ 499.743744][ T30] audit: type=1400 audit(498.240:124): avc: denied { mounton } for pid=3364 comm="syz-executor" path="/syzkaller.7i1bOo/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 499.830028][ T30] audit: type=1400 audit(498.330:125): avc: denied { mounton } for pid=3364 comm="syz-executor" path="/syzkaller.7i1bOo/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 499.999241][ T3366] veth1_macvtap: entered promiscuous mode [ 500.059711][ T30] audit: type=1400 audit(498.560:126): avc: denied { unmount } for pid=3364 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 500.114700][ T30] audit: type=1400 audit(498.610:127): avc: denied { mounton } for pid=3364 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 500.144489][ T30] audit: type=1400 audit(498.650:128): avc: denied { mount } for pid=3364 comm="syz-executor" name="/" dev="gadgetfs" ino=3830 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 500.198801][ T30] audit: type=1400 audit(498.700:129): avc: denied { mount } for pid=3364 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 500.830889][ T3364] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 500.977676][ T1163] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 500.994469][ T1163] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 500.995476][ T1163] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 500.996296][ T1163] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 514.900476][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 514.907550][ T30] audit: type=1400 audit(513.400:135): avc: denied { audit_read } for pid=3549 comm="syz.1.18" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 520.273096][ T30] audit: type=1400 audit(518.770:136): avc: denied { create } for pid=3574 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 520.359316][ T30] audit: type=1400 audit(518.830:137): avc: denied { listen } for pid=3574 comm="syz.0.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 536.895840][ T30] audit: type=1400 audit(535.390:138): avc: denied { setattr } for pid=3644 comm="syz.0.65" name="vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 553.812553][ T3713] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3713 comm=syz.0.98 [ 555.340460][ T30] audit: type=1400 audit(553.840:139): avc: denied { create } for pid=3719 comm="syz.0.102" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 555.356507][ T30] audit: type=1400 audit(553.860:140): avc: denied { ioctl } for pid=3719 comm="syz.0.102" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5203 ioctlcmd=0xaa01 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 557.000028][ T3727] Zero length message leads to an empty skb [ 572.686276][ T30] audit: type=1400 audit(571.190:141): avc: denied { open } for pid=3776 comm="syz.0.130" path="/dev/ptyq4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 574.287293][ T30] audit: type=1400 audit(572.770:142): avc: denied { read } for pid=3783 comm="syz.1.133" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 574.306670][ T30] audit: type=1400 audit(572.810:143): avc: denied { open } for pid=3783 comm="syz.1.133" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 576.590834][ T30] audit: type=1400 audit(575.090:144): avc: denied { read write } for pid=3798 comm="syz.0.140" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 576.618418][ T30] audit: type=1400 audit(575.120:145): avc: denied { open } for pid=3798 comm="syz.0.140" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 596.178173][ T30] audit: type=1400 audit(594.680:146): avc: denied { read append } for pid=3898 comm="syz.0.189" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 596.195665][ T30] audit: type=1400 audit(594.690:147): avc: denied { open } for pid=3898 comm="syz.0.189" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 596.229122][ T30] audit: type=1400 audit(594.730:148): avc: denied { map } for pid=3898 comm="syz.0.189" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 596.274781][ T30] audit: type=1400 audit(594.770:149): avc: denied { write execute } for pid=3898 comm="syz.0.189" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 602.582461][ T30] audit: type=1400 audit(601.080:150): avc: denied { create } for pid=3928 comm="syz.1.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 605.129025][ T30] audit: type=1400 audit(603.630:151): avc: denied { read write } for pid=3364 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 605.164294][ T30] audit: type=1400 audit(603.640:152): avc: denied { open } for pid=3364 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 605.165338][ T30] audit: type=1400 audit(603.650:153): avc: denied { ioctl } for pid=3364 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 613.723506][ T30] audit: type=1400 audit(612.220:154): avc: denied { read } for pid=3975 comm="syz.0.227" dev="nsfs" ino=4026532627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 613.763359][ T30] audit: type=1400 audit(612.260:155): avc: denied { open } for pid=3975 comm="syz.0.227" path="net:[4026532627]" dev="nsfs" ino=4026532627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 613.778396][ T30] audit: type=1400 audit(612.280:156): avc: denied { create } for pid=3975 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 613.805561][ T30] audit: type=1400 audit(612.310:157): avc: denied { write } for pid=3975 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 638.117168][ T30] audit: type=1400 audit(636.620:158): avc: denied { create } for pid=4081 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 638.198065][ T30] audit: type=1400 audit(636.700:159): avc: denied { write } for pid=4081 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 639.254748][ T30] audit: type=1400 audit(637.750:160): avc: denied { prog_load } for pid=4086 comm="syz.0.283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 639.317636][ T30] audit: type=1400 audit(637.780:161): avc: denied { bpf } for pid=4086 comm="syz.0.283" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 639.318519][ T30] audit: type=1400 audit(637.810:162): avc: denied { perfmon } for pid=4086 comm="syz.0.283" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 646.769643][ T30] audit: type=1400 audit(645.270:163): avc: denied { read write } for pid=4117 comm="syz.0.298" name="userio" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 646.798230][ T30] audit: type=1400 audit(645.300:164): avc: denied { open } for pid=4117 comm="syz.0.298" path="/dev/userio" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 652.089881][ T30] audit: type=1400 audit(650.590:165): avc: denied { create } for pid=4139 comm="syz.0.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 652.156860][ T30] audit: type=1400 audit(650.660:166): avc: denied { ioctl } for pid=4139 comm="syz.0.310" path="socket:[6301]" dev="sockfs" ino=6301 ioctlcmd=0x54ce scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 654.611818][ T30] audit: type=1400 audit(653.100:167): avc: denied { create } for pid=4153 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 654.645196][ T30] audit: type=1400 audit(653.150:168): avc: denied { setopt } for pid=4153 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 662.996345][ T30] audit: type=1400 audit(661.500:169): avc: denied { map_create } for pid=4192 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 663.032989][ T30] audit: type=1400 audit(661.530:170): avc: denied { map_write } for pid=4192 comm="syz.0.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 669.313331][ T30] audit: type=1400 audit(667.810:171): avc: denied { mount } for pid=4220 comm="syz.1.349" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 673.253099][ T30] audit: type=1400 audit(671.750:172): avc: denied { create } for pid=4239 comm="syz.1.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 673.357526][ T30] audit: type=1400 audit(671.860:173): avc: denied { write } for pid=4239 comm="syz.1.358" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 675.870188][ T30] audit: type=1400 audit(674.370:174): avc: denied { map_read } for pid=4252 comm="syz.1.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 678.790144][ T30] audit: type=1400 audit(677.290:175): avc: denied { append } for pid=4266 comm="syz.0.372" name="loop4" dev="devtmpfs" ino=642 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 680.746251][ T30] audit: type=1400 audit(679.250:176): avc: denied { write } for pid=4274 comm="syz.0.376" name="mcfilter" dev="proc" ino=4026532647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 680.797491][ T30] audit: type=1400 audit(679.290:177): avc: denied { setattr } for pid=4275 comm="syz.1.377" name="" dev="pipefs" ino=3365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 681.545197][ T30] audit: type=1400 audit(680.050:178): avc: denied { create } for pid=4278 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 681.604738][ T30] audit: type=1400 audit(680.080:179): avc: denied { setopt } for pid=4278 comm="syz.1.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 683.676612][ T30] audit: type=1400 audit(682.180:180): avc: denied { execute } for pid=4287 comm="syz.1.382" name="file0" dev="tmpfs" ino=949 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 685.589153][ T30] audit: type=1400 audit(684.090:181): avc: denied { connect } for pid=4294 comm="syz.1.386" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 685.719255][ T30] audit: type=1400 audit(684.220:182): avc: denied { create } for pid=4296 comm="syz.0.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 685.759876][ T30] audit: type=1400 audit(684.260:183): avc: denied { write } for pid=4296 comm="syz.0.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 685.774893][ T30] audit: type=1400 audit(684.280:184): avc: denied { module_request } for pid=4296 comm="syz.0.387" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 686.408384][ T30] audit: type=1400 audit(684.900:185): avc: denied { read } for pid=4296 comm="syz.0.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 690.350511][ T30] audit: type=1400 audit(688.850:186): avc: denied { setopt } for pid=4306 comm="syz.1.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 690.428275][ T30] audit: type=1400 audit(688.930:187): avc: denied { read } for pid=4306 comm="syz.1.391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 692.295389][ T30] audit: type=1400 audit(690.780:188): avc: denied { read write } for pid=4311 comm="syz.0.394" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 692.344410][ T30] audit: type=1400 audit(690.810:189): avc: denied { open } for pid=4311 comm="syz.0.394" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 692.474864][ T30] audit: type=1400 audit(690.980:190): avc: denied { ioctl } for pid=4311 comm="syz.0.394" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0xaf83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 702.410702][ T30] audit: type=1400 audit(700.900:191): avc: denied { accept } for pid=4338 comm="syz.0.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 702.439210][ T30] audit: type=1400 audit(700.940:192): avc: denied { ioctl } for pid=4338 comm="syz.0.406" path="socket:[7221]" dev="sockfs" ino=7221 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 709.313416][ T30] audit: type=1400 audit(707.800:193): avc: denied { ioctl } for pid=4359 comm="syz.0.416" path="socket:[7264]" dev="sockfs" ino=7264 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 709.867597][ T30] audit: type=1400 audit(708.370:194): avc: denied { sys_module } for pid=4359 comm="syz.0.416" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 713.409286][ T4377] lo: entered allmulticast mode [ 713.409679][ T30] audit: type=1400 audit(711.910:195): avc: denied { setopt } for pid=4376 comm="syz.1.423" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 713.550636][ T30] audit: type=1400 audit(712.050:196): avc: denied { ioctl } for pid=4376 comm="syz.1.423" path="socket:[6681]" dev="sockfs" ino=6681 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 714.030222][ T30] audit: type=1400 audit(712.530:197): avc: denied { connect } for pid=4378 comm="syz.0.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 714.054164][ T30] audit: type=1400 audit(712.560:198): avc: denied { write } for pid=4378 comm="syz.0.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 714.533186][ T30] audit: type=1400 audit(713.030:199): avc: denied { append } for pid=4380 comm="syz.1.425" name="dlm_plock" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 720.275895][ T30] audit: type=1400 audit(718.780:200): avc: denied { mounton } for pid=4404 comm="syz.1.437" path="/218/file0" dev="tmpfs" ino=1121 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 720.607577][ T30] audit: type=1400 audit(719.110:201): avc: denied { unmount } for pid=3366 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 727.162488][ T30] audit: type=1400 audit(725.660:202): avc: denied { read write } for pid=4432 comm="syz.1.451" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 727.192821][ T30] audit: type=1400 audit(725.690:203): avc: denied { open } for pid=4432 comm="syz.1.451" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 727.211909][ T30] audit: type=1400 audit(725.710:204): avc: denied { ioctl } for pid=4432 comm="syz.1.451" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x450a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 732.352410][ T30] audit: type=1400 audit(730.850:205): avc: denied { ioctl } for pid=4450 comm="syz.1.460" path="/dev/iommu" dev="devtmpfs" ino=615 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 736.668935][ T4465] capability: warning: `syz.1.466' uses 32-bit capabilities (legacy support in use) [ 739.233554][ T30] audit: type=1400 audit(737.730:206): avc: denied { create } for pid=4474 comm="syz.0.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 739.347434][ T30] audit: type=1400 audit(737.850:207): avc: denied { ioctl } for pid=4474 comm="syz.0.471" path="socket:[7429]" dev="sockfs" ino=7429 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 742.664864][ T30] audit: type=1400 audit(741.170:208): avc: denied { read } for pid=4487 comm="syz.0.476" path="socket:[7451]" dev="sockfs" ino=7451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 746.454849][ T30] audit: type=1400 audit(744.950:209): avc: denied { audit_write } for pid=4502 comm="syz.0.484" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 749.331718][ T30] audit: type=1400 audit(747.780:210): avc: denied { open } for pid=4513 comm="syz.0.489" path="/dev/ptyq4" dev="devtmpfs" ino=116 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 754.050506][ T30] audit: type=1400 audit(752.550:211): avc: denied { create } for pid=4528 comm="syz.1.496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 754.128156][ T30] audit: type=1400 audit(752.630:212): avc: denied { ioctl } for pid=4528 comm="syz.1.496" path="socket:[7537]" dev="sockfs" ino=7537 ioctlcmd=0xf504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 758.418198][ T30] audit: type=1400 audit(756.920:213): avc: denied { create } for pid=4549 comm="syz.0.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 758.459618][ T30] audit: type=1400 audit(756.960:214): avc: denied { bind } for pid=4549 comm="syz.0.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 758.510031][ T30] audit: type=1400 audit(757.010:215): avc: denied { write } for pid=4549 comm="syz.0.507" path="socket:[7564]" dev="sockfs" ino=7564 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 761.076788][ T30] audit: type=1400 audit(759.580:216): avc: denied { create } for pid=4561 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 761.100774][ T30] audit: type=1400 audit(759.600:217): avc: denied { setopt } for pid=4561 comm="syz.1.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 773.876913][ T30] audit: type=1400 audit(772.380:218): avc: denied { create } for pid=4614 comm="syz.1.539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 778.594195][ T4634] block nbd1: shutting down sockets [ 782.557563][ T30] audit: type=1400 audit(781.060:219): avc: denied { write } for pid=4652 comm="syz.0.558" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 782.560910][ T30] audit: type=1400 audit(781.060:220): avc: denied { open } for pid=4652 comm="syz.0.558" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 782.599759][ T30] audit: type=1400 audit(781.100:221): avc: denied { ioctl } for pid=4652 comm="syz.0.558" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 788.512741][ T30] audit: type=1400 audit(787.010:222): avc: denied { read write } for pid=4684 comm="syz.1.574" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 788.513825][ T30] audit: type=1400 audit(787.010:223): avc: denied { open } for pid=4684 comm="syz.1.574" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 789.352536][ T30] audit: type=1400 audit(787.850:224): avc: denied { mount } for pid=4686 comm="syz.0.575" name="/" dev="ramfs" ino=8275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 789.480080][ T30] audit: type=1400 audit(787.980:225): avc: denied { unmount } for pid=3364 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 790.754496][ T3452] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 791.303690][ T30] audit: type=1400 audit(789.800:226): avc: denied { execute } for pid=4692 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 791.309495][ T30] audit: type=1400 audit(789.810:227): avc: denied { execute_no_trans } for pid=4692 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 791.336215][ T3452] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 791.839482][ T3452] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 792.254668][ T30] audit: type=1400 audit(790.750:228): avc: denied { execmem } for pid=4692 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 792.312876][ T3452] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 792.560483][ T30] audit: type=1400 audit(791.060:229): avc: denied { mounton } for pid=4697 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 794.824850][ T30] audit: type=1400 audit(793.310:230): avc: denied { read } for pid=3188 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 798.180813][ T3452] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 798.268819][ T3452] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 798.332856][ T3452] bond0 (unregistering): Released all slaves [ 798.627655][ T30] audit: type=1400 audit(797.120:231): avc: denied { search } for pid=3188 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 798.662799][ T30] audit: type=1400 audit(797.160:232): avc: denied { search } for pid=3188 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 798.665722][ T30] audit: type=1400 audit(797.170:233): avc: denied { search } for pid=3188 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 798.700176][ T30] audit: type=1400 audit(797.190:234): avc: denied { search } for pid=3188 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 798.712901][ T30] audit: type=1400 audit(797.210:235): avc: denied { search } for pid=3188 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 798.713872][ T30] audit: type=1400 audit(797.210:236): avc: denied { search } for pid=3188 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 798.714372][ T30] audit: type=1400 audit(797.210:237): avc: denied { read } for pid=3188 comm="dhcpcd" name="n18" dev="tmpfs" ino=2114 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 798.714828][ T30] audit: type=1400 audit(797.210:238): avc: denied { open } for pid=3188 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=2114 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 798.715193][ T30] audit: type=1400 audit(797.210:239): avc: denied { getattr } for pid=3188 comm="dhcpcd" path="/run/udev/data/n18" dev="tmpfs" ino=2114 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 799.242947][ T3452] hsr_slave_0: left promiscuous mode [ 799.282925][ T3452] hsr_slave_1: left promiscuous mode [ 799.605777][ T3452] veth1_macvtap: left promiscuous mode [ 799.608469][ T3452] veth0_macvtap: left promiscuous mode [ 799.627231][ T3452] veth1_vlan: left promiscuous mode [ 799.634230][ T3452] veth0_vlan: left promiscuous mode [ 810.632625][ T30] audit: type=1400 audit(809.120:240): avc: denied { read } for pid=4735 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=312 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 810.634265][ T30] audit: type=1400 audit(809.120:241): avc: denied { read open } for pid=4735 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=312 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 810.676956][ T30] audit: type=1400 audit(809.150:242): avc: denied { getattr } for pid=4735 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=312 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 811.514683][ T30] audit: type=1400 audit(809.980:243): avc: denied { write } for pid=4732 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 811.515665][ T30] audit: type=1400 audit(810.010:244): avc: denied { add_name } for pid=4732 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 811.516039][ T30] audit: type=1400 audit(810.010:245): avc: denied { create } for pid=4732 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 811.570757][ T30] audit: type=1400 audit(810.010:246): avc: denied { write } for pid=4732 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=2147 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 811.643241][ T30] audit: type=1400 audit(810.130:247): avc: denied { append } for pid=4732 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=2147 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 814.630237][ T30] audit: type=1400 audit(813.130:248): avc: denied { write } for pid=4741 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 814.640878][ T30] audit: type=1400 audit(813.140:249): avc: denied { remove_name } for pid=4741 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=2147 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 816.794746][ T3188] 8021q: adding VLAN 0 to HW filter on device eth1 [ 821.705688][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 821.706573][ T30] audit: type=1400 audit(820.180:251): avc: denied { write } for pid=4761 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 824.553959][ T30] audit: type=1400 audit(823.050:252): avc: denied { write } for pid=4775 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 826.387277][ T3188] 8021q: adding VLAN 0 to HW filter on device eth2 [ 827.783804][ T30] audit: type=1400 audit(826.280:253): avc: denied { create } for pid=4786 comm="syz.1.607" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 827.813840][ T30] audit: type=1400 audit(826.320:254): avc: denied { read } for pid=4786 comm="syz.1.607" name="file0" dev="tmpfs" ino=1643 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 827.816326][ T30] audit: type=1400 audit(826.320:255): avc: denied { open } for pid=4786 comm="syz.1.607" path="/321/file0" dev="tmpfs" ino=1643 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 827.843331][ T30] audit: type=1400 audit(826.340:256): avc: denied { ioctl } for pid=4786 comm="syz.1.607" path="/321/file0" dev="tmpfs" ino=1643 ioctlcmd=0x4c03 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 828.039373][ T30] audit: type=1400 audit(826.540:257): avc: denied { unlink } for pid=3366 comm="syz-executor" name="file0" dev="tmpfs" ino=1643 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 828.263668][ T4697] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 828.335910][ T4697] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 831.547459][ T30] audit: type=1400 audit(830.040:258): avc: denied { setopt } for pid=4797 comm="syz.1.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 833.926093][ T30] audit: type=1400 audit(832.410:259): avc: denied { write } for pid=4800 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 836.724054][ T30] audit: type=1400 audit(835.210:260): avc: denied { write } for pid=4811 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 837.415751][ T4817] netlink: 32 bytes leftover after parsing attributes in process `syz.1.615'. [ 838.859477][ T3188] 8021q: adding VLAN 0 to HW filter on device eth3 [ 839.957040][ T4697] hsr_slave_0: entered promiscuous mode [ 839.984224][ T4697] hsr_slave_1: entered promiscuous mode [ 841.842786][ T30] audit: type=1400 audit(840.340:261): avc: denied { write } for pid=4824 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 843.862259][ T30] audit: type=1400 audit(842.360:262): avc: denied { write } for pid=4834 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 846.310756][ T4697] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 846.416893][ T4697] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 846.433569][ T4697] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 846.608577][ T4697] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 846.648329][ T4697] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 846.756943][ T4697] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 846.809172][ T4697] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 846.973639][ T4697] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 847.180288][ T30] audit: type=1400 audit(845.680:263): avc: denied { setopt } for pid=4846 comm="syz.1.625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 849.062260][ T30] audit: type=1400 audit(847.560:264): avc: denied { create } for pid=4859 comm="syz.1.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 849.133365][ T30] audit: type=1400 audit(847.630:265): avc: denied { ioctl } for pid=4859 comm="syz.1.627" path="socket:[8735]" dev="sockfs" ino=8735 ioctlcmd=0xae41 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 850.823094][ T30] audit: type=1400 audit(849.320:266): avc: denied { write } for pid=4860 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 853.534598][ T30] audit: type=1400 audit(852.030:267): avc: denied { write } for pid=4873 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 855.320887][ T4697] 8021q: adding VLAN 0 to HW filter on device bond0 [ 855.540762][ T3188] 8021q: adding VLAN 0 to HW filter on device eth4 [ 865.118480][ T30] audit: type=1400 audit(863.620:268): avc: denied { write } for pid=4908 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 867.229699][ T30] audit: type=1400 audit(865.660:269): avc: denied { watch } for pid=4917 comm="syz.1.642" path="/356/file1" dev="tmpfs" ino=1822 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 867.230756][ T30] audit: type=1400 audit(865.700:270): avc: denied { watch_sb watch_reads } for pid=4917 comm="syz.1.642" path="/356/file1" dev="tmpfs" ino=1822 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 867.749635][ T30] audit: type=1400 audit(866.250:271): avc: denied { write } for pid=4918 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 877.580587][ T30] audit: type=1400 audit(876.080:272): avc: denied { write } for pid=4944 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 879.608825][ T30] audit: type=1400 audit(878.110:273): avc: denied { mounton } for pid=4960 comm="syz.1.652" path="/366/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 880.033113][ T30] audit: type=1400 audit(878.520:275): avc: denied { write } for pid=4959 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 880.080073][ T30] audit: type=1400 audit(878.460:274): avc: denied { unmount } for pid=3366 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 884.417815][ T30] audit: type=1400 audit(882.910:276): avc: denied { write } for pid=4972 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 887.293711][ T30] audit: type=1400 audit(885.790:277): avc: denied { write } for pid=4984 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 888.463819][ T30] audit: type=1400 audit(886.950:278): avc: denied { mount } for pid=4990 comm="syz.1.660" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 891.245651][ T4697] veth0_vlan: entered promiscuous mode [ 891.597673][ T4697] veth1_vlan: entered promiscuous mode [ 892.509316][ T4697] veth0_macvtap: entered promiscuous mode [ 892.690302][ T30] audit: type=1400 audit(891.160:279): avc: denied { write } for pid=4997 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 892.747470][ T4697] veth1_macvtap: entered promiscuous mode [ 894.168231][ T3401] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 894.185187][ T3401] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 894.186277][ T3401] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 894.186776][ T3401] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 895.402790][ T30] audit: type=1400 audit(893.900:280): avc: denied { write } for pid=5008 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 895.667964][ T30] audit: type=1400 audit(894.170:281): avc: denied { mounton } for pid=4697 comm="syz-executor" path="/syzkaller.zdjslu/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 895.733466][ T30] audit: type=1400 audit(894.170:282): avc: denied { mount } for pid=4697 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 895.864253][ T30] audit: type=1400 audit(894.360:283): avc: denied { mount } for pid=4697 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 896.087304][ T30] audit: type=1400 audit(894.580:284): avc: denied { mounton } for pid=4697 comm="syz-executor" path="/syzkaller.zdjslu/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 896.123062][ T30] audit: type=1400 audit(894.600:285): avc: denied { mounton } for pid=4697 comm="syz-executor" path="/syzkaller.zdjslu/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=9372 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 896.202696][ T30] audit: type=1400 audit(894.700:286): avc: denied { unmount } for pid=4697 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 896.348402][ T30] audit: type=1400 audit(894.850:287): avc: denied { mounton } for pid=4697 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 896.359392][ T30] audit: type=1400 audit(894.860:288): avc: denied { mount } for pid=4697 comm="syz-executor" name="/" dev="gadgetfs" ino=3830 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 907.356505][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 907.357401][ T30] audit: type=1400 audit(905.840:292): avc: denied { allowed } for pid=5051 comm="syz.1.684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 907.444947][ T30] audit: type=1400 audit(905.940:293): avc: denied { create } for pid=5051 comm="syz.1.684" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 907.468545][ T30] audit: type=1400 audit(905.970:294): avc: denied { map } for pid=5051 comm="syz.1.684" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9445 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 907.469664][ T30] audit: type=1400 audit(905.970:295): avc: denied { read write } for pid=5051 comm="syz.1.684" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=9445 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 913.719140][ T30] audit: type=1400 audit(912.220:296): avc: denied { bind } for pid=5075 comm="syz.2.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 913.758657][ T30] audit: type=1400 audit(912.260:297): avc: denied { accept } for pid=5075 comm="syz.2.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 915.535713][ T5085] capability: warning: `syz.1.698' uses deprecated v2 capabilities in a way that may be insecure [ 921.678786][ T30] audit: type=1400 audit(920.180:298): avc: denied { write } for pid=5108 comm="syz.1.710" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 930.794403][ T5148] xt_hashlimit: max too large, truncated to 1048576 [ 931.483592][ T30] audit: type=1400 audit(929.970:299): avc: denied { ioctl } for pid=5149 comm="syz.2.730" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 936.322480][ T30] audit: type=1400 audit(934.820:300): avc: denied { read } for pid=5166 comm="syz.2.738" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 940.344465][ T30] audit: type=1400 audit(938.840:301): avc: denied { read } for pid=5177 comm="syz.1.743" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 940.366710][ T30] audit: type=1400 audit(938.870:302): avc: denied { open } for pid=5177 comm="syz.1.743" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 940.425872][ T30] audit: type=1400 audit(938.930:303): avc: denied { ioctl } for pid=5177 comm="syz.1.743" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 942.623713][ T30] audit: type=1400 audit(941.120:304): avc: denied { append } for pid=5186 comm="syz.2.747" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 942.624861][ T30] audit: type=1400 audit(941.120:305): avc: denied { open } for pid=5186 comm="syz.2.747" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 942.737825][ T30] audit: type=1400 audit(941.240:306): avc: denied { ioctl } for pid=5186 comm="syz.2.747" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 953.767332][ T30] audit: type=1400 audit(952.270:307): avc: denied { getopt } for pid=5231 comm="syz.2.770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 954.104007][ T30] audit: type=1400 audit(952.600:308): avc: denied { nlmsg_write } for pid=5232 comm="syz.1.771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 954.109332][ T30] audit: type=1107 audit(952.610:309): pid=5232 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 954.144210][ T30] audit: type=1107 audit(952.640:310): pid=5232 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='TĘ3' [ 964.655008][ T30] audit: type=1400 audit(963.160:311): avc: denied { nlmsg_read } for pid=5279 comm="syz.1.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 979.936620][ T30] audit: type=1400 audit(978.440:312): avc: denied { read write } for pid=5351 comm="syz.1.829" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 979.945281][ T30] audit: type=1400 audit(978.450:313): avc: denied { open } for pid=5351 comm="syz.1.829" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 980.015049][ T3436] hid-generic 0006:0004:0009.0001: unknown main item tag 0x0 [ 980.022230][ T3436] hid-generic 0006:0004:0009.0001: unknown main item tag 0x0 [ 980.025852][ T3436] hid-generic 0006:0004:0009.0001: unknown main item tag 0x0 [ 980.027802][ T3436] hid-generic 0006:0004:0009.0001: unknown main item tag 0x0 [ 980.033642][ T3436] hid-generic 0006:0004:0009.0001: unknown main item tag 0x0 [ 980.036692][ T3436] hid-generic 0006:0004:0009.0001: unknown main item tag 0x0 [ 980.039672][ T3436] hid-generic 0006:0004:0009.0001: unknown main item tag 0x0 [ 980.045319][ T3436] hid-generic 0006:0004:0009.0001: unknown main item tag 0x0 [ 980.046549][ T3436] hid-generic 0006:0004:0009.0001: unknown main item tag 0x0 [ 980.049944][ T3436] hid-generic 0006:0004:0009.0001: unknown main item tag 0x0 [ 980.110296][ T3436] hid-generic 0006:0004:0009.0001: hidraw0: VIRTUAL HID v0.8e Device [syz1] on syz0 [ 984.173868][ T5359] fido_id[5359]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 994.154019][ T30] audit: type=1400 audit(992.650:314): avc: denied { write } for pid=5411 comm="syz.1.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 998.179239][ T30] audit: type=1400 audit(996.680:315): avc: denied { create } for pid=5424 comm="syz.2.862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1000.209325][ T30] audit: type=1400 audit(998.710:316): avc: denied { block_suspend } for pid=5431 comm="syz.2.866" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1014.096112][ T30] audit: type=1400 audit(1012.600:317): avc: denied { prog_run } for pid=5486 comm="syz.2.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1014.170036][ T30] audit: type=1400 audit(1012.670:318): avc: denied { setopt } for pid=5486 comm="syz.2.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1029.036090][ T5550] netlink: 'syz.1.923': attribute type 29 has an invalid length. [ 1029.818335][ T30] audit: type=1400 audit(1028.320:319): avc: denied { read } for pid=5552 comm="syz.2.925" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1038.537000][ T30] audit: type=1400 audit(1037.030:320): avc: denied { map } for pid=5589 comm="syz.2.943" path="socket:[11338]" dev="sockfs" ino=11338 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1038.537554][ T30] audit: type=1400 audit(1037.030:321): avc: denied { read } for pid=5589 comm="syz.2.943" path="socket:[11338]" dev="sockfs" ino=11338 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1043.427308][ T30] audit: type=1400 audit(1041.920:322): avc: denied { create } for pid=5609 comm="syz.1.953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1044.676608][ T30] audit: type=1400 audit(1043.180:323): avc: denied { ioctl } for pid=5614 comm="syz.2.955" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=11367 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1061.223847][ T30] audit: type=1400 audit(1059.720:324): avc: denied { write } for pid=5668 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1064.697753][ T30] audit: type=1400 audit(1063.190:325): avc: denied { write } for pid=5680 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1080.216160][ T30] audit: type=1400 audit(1078.710:326): avc: denied { bind } for pid=5751 comm="syz.1.1017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1093.459367][ T5806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=115 sclass=netlink_route_socket pid=5806 comm=syz.1.1043 [ 1096.248269][ T5817] loop2: detected capacity change from 0 to 8 [ 1122.354652][ T30] audit: type=1400 audit(1120.790:327): avc: denied { ioctl } for pid=5904 comm="syz.1.1091" path="socket:[11877]" dev="sockfs" ino=11877 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1133.240453][ T30] audit: type=1400 audit(1131.740:328): avc: denied { unlink } for pid=4697 comm="syz-executor" name="file0" dev="tmpfs" ino=1197 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1164.633645][ T30] audit: type=1400 audit(1163.130:329): avc: denied { read } for pid=6024 comm="syz.2.1147" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1164.659199][ T30] audit: type=1400 audit(1163.160:330): avc: denied { open } for pid=6024 comm="syz.2.1147" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1164.763284][ T30] audit: type=1400 audit(1163.260:331): avc: denied { ioctl } for pid=6024 comm="syz.2.1147" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1185.747982][ T30] audit: type=1400 audit(1184.250:332): avc: denied { write } for pid=6089 comm="syz.2.1179" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1188.058189][ T30] audit: type=1400 audit(1186.560:333): avc: denied { create } for pid=6098 comm="syz.1.1184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1188.088684][ T30] audit: type=1400 audit(1186.590:334): avc: denied { setopt } for pid=6098 comm="syz.1.1184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1188.169676][ T30] audit: type=1400 audit(1186.670:335): avc: denied { getopt } for pid=6098 comm="syz.1.1184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1190.093548][ T30] audit: type=1400 audit(1188.590:336): avc: denied { write } for pid=6105 comm="syz.1.1188" path="socket:[12814]" dev="sockfs" ino=12814 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1190.318510][ T6108] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6108 comm=syz.2.1187 [ 1192.210594][ T30] audit: type=1400 audit(1190.690:337): avc: denied { name_bind } for pid=6113 comm="syz.1.1191" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1192.211960][ T30] audit: type=1400 audit(1190.690:338): avc: denied { node_bind } for pid=6113 comm="syz.1.1191" saddr=255.255.255.255 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1207.182468][ T30] audit: type=1400 audit(1205.670:339): avc: denied { mount } for pid=6174 comm="syz.2.1221" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1212.188588][ T30] audit: type=1400 audit(1210.690:340): avc: denied { bind } for pid=6194 comm="syz.1.1231" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1212.200174][ T30] audit: type=1400 audit(1210.700:341): avc: denied { name_bind } for pid=6194 comm="syz.1.1231" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 1212.210435][ T30] audit: type=1400 audit(1210.710:342): avc: denied { node_bind } for pid=6194 comm="syz.1.1231" saddr=ff01::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1216.389677][ T30] audit: type=1400 audit(1214.890:343): avc: denied { mount } for pid=6210 comm="syz.2.1239" name="/" dev="hugetlbfs" ino=13438 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1216.417804][ T30] audit: type=1400 audit(1214.920:344): avc: denied { remount } for pid=6210 comm="syz.2.1239" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1216.634455][ T30] audit: type=1400 audit(1215.110:345): avc: denied { unmount } for pid=4697 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1225.736118][ T30] audit: type=1400 audit(1224.230:346): avc: denied { mount } for pid=6247 comm="syz.2.1257" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1225.826457][ T30] audit: type=1400 audit(1224.320:347): avc: denied { remount } for pid=6247 comm="syz.2.1257" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1226.099696][ T30] audit: type=1400 audit(1224.600:348): avc: denied { unmount } for pid=4697 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1240.088679][ T30] audit: type=1400 audit(1238.590:349): avc: denied { write } for pid=6300 comm="syz.1.1283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1250.794232][ T30] audit: type=1400 audit(1249.290:350): avc: denied { create } for pid=6322 comm="syz.2.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1251.139100][ T6301] infiniband syz2: set active [ 1251.170545][ T6301] infiniband syz2: added bond0 [ 1252.634514][ T6301] RDS/IB: syz2: added [ 1252.666812][ T6301] smc: adding ib device syz2 with port count 1 [ 1252.669650][ T6301] smc: ib device syz2 port 1 has no pnetid [ 1281.868533][ T3320] hid_parser_main: 7 callbacks suppressed [ 1281.883625][ T3320] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 1281.885478][ T3320] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 1281.888104][ T3320] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 1281.889786][ T3320] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 1281.892759][ T3320] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 1281.896434][ T3320] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 1281.899477][ T3320] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 1281.901942][ T3320] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 1281.903579][ T3320] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 1281.905268][ T3320] hid-generic 0000:3000000:0000.0002: unknown main item tag 0x0 [ 1281.948401][ T3320] hid-generic 0000:3000000:0000.0002: hidraw0: HID v0.00 Device [sy] on syz0 [ 1285.390750][ T6436] fido_id[6436]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1314.686705][ T30] audit: type=1400 audit(1313.190:351): avc: denied { read } for pid=6536 comm="syz.1.1394" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1314.708295][ T30] audit: type=1400 audit(1313.190:352): avc: denied { open } for pid=6536 comm="syz.1.1394" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1318.935948][ T30] audit: type=1400 audit(1317.420:353): avc: denied { read write } for pid=6552 comm="syz.2.1401" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1318.989364][ T30] audit: type=1400 audit(1317.490:354): avc: denied { open } for pid=6552 comm="syz.2.1401" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1319.076751][ T30] audit: type=1400 audit(1317.580:355): avc: denied { ioctl } for pid=6552 comm="syz.2.1401" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1352.137186][ T30] audit: type=1400 audit(1350.640:356): avc: denied { read write } for pid=6691 comm="syz.1.1469" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1352.186387][ T30] audit: type=1400 audit(1350.680:357): avc: denied { open } for pid=6691 comm="syz.1.1469" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1352.293012][ T30] audit: type=1400 audit(1350.790:358): avc: denied { ioctl } for pid=6691 comm="syz.1.1469" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1352.308969][ T6692] binder: 6691:6692 ioctl c0306201 0 returned -14 [ 1352.365949][ T6692] binder: 6691:6692 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1352.373107][ T6692] binder: 6692 RLIMIT_NICE not set [ 1352.376626][ T6692] binder: 6691:6692 ioctl c0306201 20000300 returned -11 [ 1361.239966][ T6626] hid_parser_main: 22 callbacks suppressed [ 1361.246822][ T6626] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 1361.279580][ T6626] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1367.626653][ T6735] fido_id[6735]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1384.869986][ T30] audit: type=1400 audit(1383.370:359): avc: denied { read append } for pid=6813 comm="syz.1.1527" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1384.887439][ T30] audit: type=1400 audit(1383.390:360): avc: denied { open } for pid=6813 comm="syz.1.1527" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1384.923657][ T30] audit: type=1400 audit(1383.410:361): avc: denied { ioctl } for pid=6813 comm="syz.1.1527" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x6615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1390.080001][ T30] audit: type=1400 audit(1388.570:362): avc: denied { setopt } for pid=6832 comm="syz.1.1536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1405.035287][ T6874] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1556'. [ 1405.040148][ T6874] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1556'. [ 1406.196396][ T6878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6878 comm=syz.1.1558 [ 1407.294529][ T6883] SELinux: Context system_u:object_r:inetd_log_t:s0 is not valid (left unmapped). [ 1407.299503][ T30] audit: type=1400 audit(1405.790:363): avc: denied { mac_admin } for pid=6882 comm="syz.1.1560" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1407.393915][ T30] audit: type=1400 audit(1405.880:364): avc: denied { relabelto } for pid=6882 comm="syz.1.1560" name="793" dev="tmpfs" ino=4050 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 1407.445902][ T30] audit: type=1400 audit(1405.940:365): avc: denied { associate } for pid=6882 comm="syz.1.1560" name="793" dev="tmpfs" ino=4050 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:inetd_log_t:s0" [ 1407.820730][ T30] audit: type=1400 audit(1406.320:366): avc: denied { write } for pid=3366 comm="syz-executor" name="793" dev="tmpfs" ino=4050 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 1407.855634][ T30] audit: type=1400 audit(1406.340:367): avc: denied { remove_name } for pid=3366 comm="syz-executor" name="binderfs" dev="tmpfs" ino=4054 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 1407.914546][ T30] audit: type=1400 audit(1406.400:368): avc: denied { write } for pid=3366 comm="syz-executor" name="793" dev="tmpfs" ino=4050 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 1407.936262][ T30] audit: type=1400 audit(1406.430:369): avc: denied { write } for pid=3366 comm="syz-executor" name="793" dev="tmpfs" ino=4050 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 1407.973638][ T30] audit: type=1400 audit(1406.460:370): avc: denied { write } for pid=3366 comm="syz-executor" name="793" dev="tmpfs" ino=4050 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 1408.052739][ T30] audit: type=1400 audit(1406.540:371): avc: denied { rmdir } for pid=3366 comm="syz-executor" name="793" dev="tmpfs" ino=4050 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 1415.914262][ T30] audit: type=1400 audit(1414.420:372): avc: denied { ioctl } for pid=6919 comm="syz.1.1579" path="socket:[15612]" dev="sockfs" ino=15612 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1419.158209][ T30] audit: type=1400 audit(1417.660:373): avc: denied { append } for pid=6932 comm="syz.1.1584" name="pfkey" dev="proc" ino=4026532774 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1428.712129][ T30] audit: type=1400 audit(1427.210:374): avc: denied { getattr } for pid=6984 comm="syz.1.1611" name="/" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1429.143904][ T30] audit: type=1400 audit(1427.640:375): avc: denied { append } for pid=6988 comm="syz.1.1612" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1429.183773][ T30] audit: type=1400 audit(1427.680:376): avc: denied { wake_alarm } for pid=6988 comm="syz.1.1612" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1433.809503][ T30] audit: type=1400 audit(1432.310:377): avc: denied { read } for pid=7011 comm="syz.2.1624" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1433.830651][ T30] audit: type=1400 audit(1432.330:378): avc: denied { open } for pid=7011 comm="syz.2.1624" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1433.875984][ T30] audit: type=1400 audit(1432.380:379): avc: denied { map } for pid=7011 comm="syz.2.1624" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1445.564450][ T7082] ucma_write: process 1076 (syz.2.1658) changed security contexts after opening file descriptor, this is not allowed. [ 1449.417220][ T30] audit: type=1400 audit(1447.920:380): avc: denied { setattr } for pid=7113 comm="syz.2.1674" name="tun" dev="devtmpfs" ino=690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 1451.760113][ T30] audit: type=1400 audit(1450.260:381): avc: denied { append } for pid=7135 comm="syz.1.1685" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1476.630383][ T30] audit: type=1400 audit(1475.130:382): avc: denied { remount } for pid=7271 comm="syz.2.1751" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1476.727544][ T30] audit: type=1400 audit(1475.220:383): avc: denied { unmount } for pid=4697 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1477.098820][ T3452] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1477.099861][ T3452] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1477.100181][ T3452] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1477.100483][ T3452] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1494.784601][ T7378] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7378 comm=syz.2.1803 [ 1516.796337][ T30] audit: type=1400 audit(1515.300:384): avc: denied { bind } for pid=7503 comm="syz.1.1862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1517.136554][ T7506] nbd: must specify at least one socket [ 1553.556748][ T30] audit: type=1400 audit(1552.060:385): avc: denied { ioctl } for pid=7713 comm="syz.2.1966" path="socket:[18817]" dev="sockfs" ino=18817 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1553.564358][ T7714] syz_tun: entered promiscuous mode [ 1553.585929][ T7713] syz_tun: left promiscuous mode [ 1563.226356][ T30] audit: type=1400 audit(1561.730:386): avc: denied { write } for pid=7760 comm="syz.1.1989" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1571.464539][ T30] audit: type=1400 audit(1569.960:387): avc: denied { connect } for pid=7805 comm="syz.1.2011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1578.315733][ T3428] hid-generic 0062:0008:0005.0004: unexpected long global item [ 1578.328142][ T3428] hid-generic 0062:0008:0005.0004: probe with driver hid-generic failed with error -22 [ 1594.296915][ T30] audit: type=1400 audit(1592.800:388): avc: denied { setopt } for pid=7948 comm="syz.1.2080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1607.632133][ T30] audit: type=1400 audit(1606.130:389): avc: denied { read } for pid=8013 comm="syz.1.2112" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1607.636156][ T30] audit: type=1400 audit(1606.140:390): avc: denied { open } for pid=8013 comm="syz.1.2112" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1607.675168][ T30] audit: type=1400 audit(1606.160:391): avc: denied { ioctl } for pid=8013 comm="syz.1.2112" path="/dev/fb0" dev="devtmpfs" ino=620 ioctlcmd=0x4606 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1613.286042][ T8040] ======================================================= [ 1613.286042][ T8040] WARNING: The mand mount option has been deprecated and [ 1613.286042][ T8040] and is ignored by this kernel. Remove the mand [ 1613.286042][ T8040] option from the mount to silence this warning. [ 1613.286042][ T8040] ======================================================= [ 1613.569735][ T30] audit: type=1400 audit(1612.060:392): avc: denied { unmount } for pid=4697 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1619.224620][ T30] audit: type=1400 audit(1617.730:393): avc: denied { write } for pid=8065 comm="syz.1.2138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1621.167369][ T30] audit: type=1400 audit(1619.670:394): avc: denied { write } for pid=8075 comm="syz.2.2142" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1621.434643][ T8078] raw_sendmsg: syz.1.2143 forgot to set AF_INET. Fix it! [ 1628.617583][ T30] audit: type=1400 audit(1627.110:395): avc: denied { watch } for pid=8109 comm="syz.2.2159" path="pipe:[19587]" dev="pipefs" ino=19587 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1629.523164][ T30] audit: type=1400 audit(1628.020:396): avc: denied { read } for pid=8113 comm="syz.1.2161" path="socket:[19590]" dev="sockfs" ino=19590 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1631.676396][ T30] audit: type=1400 audit(1630.180:397): avc: denied { write } for pid=8117 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1634.127460][ T30] audit: type=1400 audit(1632.620:398): avc: denied { write } for pid=8132 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1644.192710][ T30] audit: type=1400 audit(1642.690:399): avc: denied { ioctl } for pid=8179 comm="syz.2.2191" path="/dev/ptyq8" dev="devtmpfs" ino=120 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1659.452834][ T30] audit: type=1400 audit(1657.950:400): avc: denied { write } for pid=8255 comm="syz.2.2228" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1676.656033][ T30] audit: type=1400 audit(1675.160:401): avc: denied { bind } for pid=8331 comm="syz.1.2266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1693.312153][ T30] audit: type=1400 audit(1691.810:402): avc: denied { ioctl } for pid=8420 comm="syz.1.2310" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1693.839003][ T8423] usb usb1: usbfs: process 8423 (syz.1.2312) did not claim interface 0 before use [ 1717.604065][ T8539] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8539 comm=syz.1.2368 [ 1732.695613][ T30] audit: type=1400 audit(1731.180:403): avc: denied { read } for pid=8607 comm="syz.2.2402" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1732.696542][ T30] audit: type=1400 audit(1731.180:404): avc: denied { open } for pid=8607 comm="syz.2.2402" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1736.470824][ T30] audit: type=1400 audit(1734.970:405): avc: denied { write } for pid=8619 comm="syz.1.2408" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1738.827909][ T30] audit: type=1400 audit(1737.330:406): avc: denied { write } for pid=8629 comm="syz.2.2413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1741.114325][ T8638] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1741.155193][ T8638] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1800.200242][ T8871] __vm_enough_memory: pid: 8871, comm: syz.2.2529, bytes: 4503599627366400 not enough memory for the allocation [ 1812.686850][ T30] audit: type=1400 audit(1811.190:407): avc: denied { setattr } for pid=8926 comm="syz.2.2556" name="dlm-control" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1822.692731][ T30] audit: type=1400 audit(1821.190:408): avc: denied { read } for pid=8967 comm="syz.1.2575" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1829.788759][ T30] audit: type=1400 audit(1828.290:409): avc: denied { setopt } for pid=8997 comm="syz.2.2589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1863.482984][ T9137] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 1863.785866][ T9137] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 1882.712882][ T30] audit: type=1400 audit(1881.210:410): avc: denied { write } for pid=9220 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1882.725467][ T30] audit: type=1400 audit(1881.230:411): avc: denied { nlmsg_read } for pid=9220 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1882.755876][ T30] audit: type=1400 audit(1881.260:412): avc: denied { read } for pid=9220 comm="syz.2.2696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1890.935807][ T9256] 8021q: VLANs not supported on wg1 [ 1894.267198][ T9273] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=9273 comm=syz.2.2721 [ 1914.672404][ T30] audit: type=1400 audit(1913.160:413): avc: denied { write } for pid=9358 comm="syz.1.2761" path="socket:[23765]" dev="sockfs" ino=23765 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1931.946906][ T30] audit: type=1400 audit(1930.450:414): avc: denied { ioctl } for pid=9430 comm="syz.1.2797" path="socket:[23928]" dev="sockfs" ino=23928 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1936.146290][ T9455] netlink: 24 bytes leftover after parsing attributes in process `syz.2.2808'. [ 1964.314489][ T30] audit: type=1400 audit(1962.810:415): avc: denied { create } for pid=9577 comm="syz.2.2870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1964.407252][ T30] audit: type=1400 audit(1962.900:416): avc: denied { ioctl } for pid=9577 comm="syz.2.2870" path="socket:[25142]" dev="sockfs" ino=25142 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1978.213988][ T30] audit: type=1400 audit(1976.700:417): avc: denied { write } for pid=9633 comm="syz.1.2898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1993.630810][ T30] audit: type=1400 audit(1992.130:418): avc: denied { getopt } for pid=9700 comm="syz.1.2930" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1998.835638][ T30] audit: type=1400 audit(1997.340:419): avc: denied { unmount } for pid=3366 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2007.777412][ T30] audit: type=1400 audit(2006.280:420): avc: denied { bind } for pid=9762 comm="syz.2.2958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2014.836906][ T30] audit: type=1400 audit(2013.340:421): avc: denied { getopt } for pid=9789 comm="syz.2.2971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2024.270830][ T30] audit: type=1400 audit(2022.770:422): avc: denied { append } for pid=9833 comm="syz.2.2993" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 2033.638454][ T30] audit: type=1400 audit(2032.140:423): avc: denied { mount } for pid=9876 comm="syz.1.3013" name="/" dev="configfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 2058.346997][ T30] audit: type=1400 audit(2056.850:424): avc: denied { lock } for pid=9963 comm="syz.1.3054" path="socket:[25956]" dev="sockfs" ino=25956 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2073.236948][ T30] audit: type=1400 audit(2071.730:425): avc: denied { append } for pid=10023 comm="syz.1.3084" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2073.275965][ T30] audit: type=1400 audit(2071.780:426): avc: denied { write } for pid=10023 comm="syz.1.3084" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2073.292540][ T30] audit: type=1400 audit(2071.790:427): avc: denied { ioctl } for pid=10023 comm="syz.1.3084" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2079.124969][ T30] audit: type=1400 audit(2077.620:428): avc: denied { ioctl } for pid=10048 comm="syz.2.3097" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x9207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2092.407662][ T30] audit: type=1400 audit(2090.910:429): avc: denied { getopt } for pid=10101 comm="syz.2.3122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2099.329817][ T30] audit: type=1400 audit(2097.830:430): avc: denied { lock } for pid=10121 comm="syz.2.3131" path="socket:[26193]" dev="sockfs" ino=26193 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2123.155959][ T30] audit: type=1400 audit(2121.660:431): avc: denied { ioctl } for pid=10205 comm="syz.1.3171" path="socket:[26323]" dev="sockfs" ino=26323 ioctlcmd=0x89b0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2165.006514][ T30] audit: type=1400 audit(2163.510:432): avc: denied { read } for pid=10380 comm="syz.2.3255" path="socket:[27655]" dev="sockfs" ino=27655 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2175.084942][ T30] audit: type=1400 audit(2173.590:433): avc: denied { write } for pid=10414 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2178.294771][ T30] audit: type=1400 audit(2176.790:434): avc: denied { write } for pid=10427 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2229.724106][T10662] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10662 comm=syz.1.3386 [ 2240.396505][ T30] audit: type=1400 audit(2238.900:435): avc: denied { connect } for pid=10707 comm="syz.2.3408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2247.587234][ T30] audit: type=1400 audit(2246.090:436): avc: denied { setopt } for pid=10741 comm="syz.2.3425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2250.819576][ T30] audit: type=1400 audit(2249.320:437): avc: denied { read } for pid=10760 comm="syz.1.3435" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2260.646372][ T30] audit: type=1400 audit(2259.120:438): avc: denied { append } for pid=10815 comm="syz.2.3461" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 2279.586616][ T30] audit: type=1400 audit(2278.080:439): avc: denied { create } for pid=10902 comm="syz.1.3502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2309.988178][ T30] audit: type=1400 audit(2308.490:440): avc: denied { read } for pid=11047 comm="syz.2.3572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2331.303728][T11140] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11140 comm=syz.1.3617 [ 2334.360486][ T30] audit: type=1400 audit(2332.860:441): avc: denied { shutdown } for pid=11145 comm="syz.1.3620" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2351.516189][ T30] audit: type=1400 audit(2350.010:442): avc: denied { append } for pid=11219 comm="syz.2.3656" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2362.417944][ T30] audit: type=1400 audit(2360.920:443): avc: denied { setattr } for pid=11261 comm="syz.1.3675" name="vcsa" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 2368.328265][ T30] audit: type=1400 audit(2366.830:444): avc: denied { write } for pid=11292 comm="syz.2.3690" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2378.089032][ T30] audit: type=1400 audit(2376.590:445): avc: denied { bind } for pid=11339 comm="syz.1.3713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2385.619657][T11368] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3726'. [ 2403.452958][ T30] audit: type=1400 audit(2401.950:446): avc: denied { remount } for pid=11455 comm="syz.2.3767" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2412.265286][T11510] cgroup: fork rejected by pids controller in /syz1 [ 2416.527557][ T3401] lo: left allmulticast mode [ 2418.623771][ T30] audit: type=1400 audit(2417.130:447): avc: denied { watch watch_reads } for pid=11538 comm="syz.2.3804" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=30574 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2419.414821][ T8710] smc: removing ib device syz2 [ 2419.698914][ T3401] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2419.830622][ T3401] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2419.910027][ T3401] bond0 (unregistering): Released all slaves [ 2424.663217][ T30] audit: type=1400 audit(2423.160:448): avc: denied { write } for pid=11559 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2425.884725][ T30] audit: type=1400 audit(2424.390:449): avc: denied { write } for pid=11567 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2426.679680][ T3188] 8021q: adding VLAN 0 to HW filter on device eth5 [ 2431.263745][ T3401] unregister_netdevice: waiting for bond0 to become free. Usage count = 2 [ 2431.266841][ T3401] ref_tracker: netdev@0000000010491ea9 has 1/1 users at [ 2431.266841][ T3401] ib_device_set_netdev+0x1c8/0x5b8 [ 2431.266841][ T3401] rxe_register_device+0x208/0x300 [ 2431.266841][ T3401] rxe_add+0xd78/0x1118 [ 2431.266841][ T3401] rxe_net_add+0x9c/0x100 [ 2431.266841][ T3401] rxe_newlink+0x80/0x148 [ 2431.266841][ T3401] nldev_newlink+0x278/0x490 [ 2431.266841][ T3401] rdma_nl_rcv_msg+0x288/0x594 [ 2431.266841][ T3401] rdma_nl_rcv_skb.constprop.0.isra.0+0x1fc/0x340 [ 2431.266841][ T3401] rdma_nl_rcv+0x10/0x20 [ 2431.266841][ T3401] netlink_unicast+0x40c/0x6d0 [ 2431.266841][ T3401] netlink_sendmsg+0x638/0xa4c [ 2431.266841][ T3401] __sock_sendmsg+0xc8/0x174 [ 2431.266841][ T3401] ____sys_sendmsg+0x524/0x730 [ 2431.266841][ T3401] ___sys_sendmsg+0x124/0x1a4 [ 2431.266841][ T3401] __sys_sendmsg+0x118/0x1a4 [ 2431.266841][ T3401] __arm64_sys_sendmsg+0x70/0xa0 [ 2431.266841][ T3401] [ 2431.306005][ T30] audit: type=1400 audit(2429.800:450): avc: denied { write } for pid=3353 comm="syz-executor" path="pipe:[2595]" dev="pipefs" ino=2595 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2431.306835][ T30] audit: type=1400 audit(2429.800:451): avc: denied { read } for pid=3145 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2431.385646][ T30] audit: type=1400 audit(2429.860:452): avc: denied { search } for pid=3145 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2431.454207][ T30] audit: type=1400 audit(2429.940:453): avc: denied { write search } for pid=3145 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2431.503127][ T30] audit: type=1400 audit(2429.990:454): avc: denied { add_name } for pid=3145 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2431.504236][ T30] audit: type=1400 audit(2430.000:455): avc: denied { create } for pid=3145 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2431.533581][ T30] audit: type=1400 audit(2430.030:456): avc: denied { append open } for pid=3145 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2431.574358][ T30] audit: type=1400 audit(2430.070:457): avc: denied { getattr } for pid=3145 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2433.029299][ T30] audit: type=1400 audit(2431.530:458): avc: denied { write } for pid=11587 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2435.787704][ T30] audit: type=1400 audit(2434.290:459): avc: denied { write } for pid=11593 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2437.099874][ T3188] 8021q: adding VLAN 0 to HW filter on device eth6 [ 2438.996101][ T30] audit: type=1400 audit(2437.500:460): avc: denied { write } for pid=11597 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2439.315910][ T3401] hsr_slave_0: left promiscuous mode [ 2439.356809][ T3401] hsr_slave_1: left promiscuous mode [ 2440.463604][ T30] audit: type=1400 audit(2438.960:461): avc: denied { write } for pid=11601 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2443.973342][ T3188] 8021q: adding VLAN 0 to HW filter on device eth7 [ 2444.957004][ T3401] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2445.433593][ T3401] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2445.788850][ T3401] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2446.115855][ T3401] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2446.447055][ T30] audit: type=1400 audit(2444.950:462): avc: denied { write } for pid=11606 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2447.641912][ T30] audit: type=1400 audit(2446.140:463): avc: denied { write } for pid=11611 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2449.019847][ T3401] bond0 (unregistering): Released all slaves [ 2450.450258][ T3401] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2450.534106][ T3401] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2450.589140][ T3401] bond0 (unregistering): Released all slaves [ 2450.753380][ T3188] 8021q: adding VLAN 0 to HW filter on device eth8 [ 2451.317939][ T3401] hsr_slave_0: left promiscuous mode [ 2451.338218][ T3401] hsr_slave_1: left promiscuous mode [ 2451.423102][ T3401] veth1_macvtap: left promiscuous mode [ 2451.424331][ T3401] veth0_macvtap: left promiscuous mode [ 2451.425906][ T3401] veth1_vlan: left promiscuous mode [ 2451.427244][ T3401] veth0_vlan: left promiscuous mode [ 2458.709169][ T30] audit: type=1400 audit(2457.210:464): avc: denied { write } for pid=11619 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2459.608932][ T30] audit: type=1400 audit(2458.110:465): avc: denied { write } for pid=11622 comm="rm" name="hook-state" dev="tmpfs" ino=311 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2460.276100][ T3188] 8021q: adding VLAN 0 to HW filter on device eth9