last executing test programs: 24m53.679056573s ago: executing program 1 (id=2649): r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = dup(r0) sendmsg$kcm(r1, &(0x7f0000003980)={0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000002280)="9cef0ffbcb71", 0x6}], 0x1}, 0x40000c0) 24m53.167590363s ago: executing program 1 (id=2651): r0 = socket(0xa, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x8, 0x0, &(0x7f00000004c0)) 24m52.687504713s ago: executing program 1 (id=2653): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$TUNGETFILTER(r1, 0x5421, &(0x7f0000000200)=""/46) 24m52.119900165s ago: executing program 1 (id=2654): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) 24m51.603785366s ago: executing program 1 (id=2657): r0 = socket$inet_tcp(0x2, 0x1, 0x0) close(0xffffffffffffffff) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x5450, 0x0) 24m50.332170376s ago: executing program 1 (id=2659): creat(&(0x7f0000000000)='./file0\x00', 0x21) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@sha1={0x1, "27e5aa2ddb4256a682457a97adfee454ee559ae1"}, 0x15, 0x0) lsetxattr$security_ima(&(0x7f0000008f40)='./file0\x00', &(0x7f0000008f80), &(0x7f0000008fc0)=@ng={0x4, 0x6}, 0x2, 0x2) 24m50.328693056s ago: executing program 32 (id=2659): creat(&(0x7f0000000000)='./file0\x00', 0x21) setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@sha1={0x1, "27e5aa2ddb4256a682457a97adfee454ee559ae1"}, 0x15, 0x0) lsetxattr$security_ima(&(0x7f0000008f40)='./file0\x00', &(0x7f0000008f80), &(0x7f0000008fc0)=@ng={0x4, 0x6}, 0x2, 0x2) 23m13.046575833s ago: executing program 2 (id=2892): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) 23m12.729473596s ago: executing program 2 (id=2894): r0 = openat$sequencer2(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, 0x0) 23m12.444352947s ago: executing program 2 (id=2895): capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000240)) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000004240)={'sit0\x00', 0x0}) 23m12.065851463s ago: executing program 2 (id=2896): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$NFULNL_MSG_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000010) 23m11.834948241s ago: executing program 2 (id=2897): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1e80c2, 0x0) 23m11.587048281s ago: executing program 2 (id=2898): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$nl_netfilter(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 22m26.518869233s ago: executing program 33 (id=2898): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$nl_netfilter(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 4.306403897s ago: executing program 3 (id=6926): r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = dup2(r0, r1) ioctl$KDSETLED(r2, 0x5450, 0x0) 3.674056263s ago: executing program 0 (id=6928): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x2) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x8800) 3.618808575s ago: executing program 3 (id=6929): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.log\x00', 0x1d10c2, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), r0) 3.243938451s ago: executing program 0 (id=6930): r0 = openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$vcsu(0xffffff9c, &(0x7f00000008c0), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$PAGEMAP_SCAN(r1, 0xc0606610, &(0x7f0000000240)={0x60, 0x0, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0}) 2.982005821s ago: executing program 3 (id=6931): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000280)='/sys/class/pps', 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000100), 0x4) 2.466433151s ago: executing program 0 (id=6932): r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 2.154176464s ago: executing program 3 (id=6933): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 1.666875733s ago: executing program 0 (id=6934): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0xc1, 0x1]}, 0x8) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NL80211_CMD_SET_NOACK_MAP(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)={0x1c, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4010) 1.527426089s ago: executing program 3 (id=6935): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r0, 0x5201) 725.970291ms ago: executing program 3 (id=6936): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f00000008c0)='wg0\x00', 0x4) sendmmsg$inet6(r0, &(0x7f0000000e40)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x20040000) sendmmsg$inet6(r0, &(0x7f00000029c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20004040) 429.711033ms ago: executing program 0 (id=6937): pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 0s ago: executing program 0 (id=6938): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000a80)={0x48, r1, 0x1, 0xfffffffe, 0x0, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}]}, 0x48}}, 0x20000000) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:20506' (ED25519) to the list of known hosts. [ 201.560965][ T30] audit: type=1400 audit(201.070:46): avc: denied { name_bind } for pid=3315 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 201.978962][ T30] audit: type=1400 audit(201.490:47): avc: denied { execute } for pid=3316 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 201.987127][ T30] audit: type=1400 audit(201.500:48): avc: denied { execute_no_trans } for pid=3316 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 208.805185][ T30] audit: type=1400 audit(208.310:49): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 208.818813][ T30] audit: type=1400 audit(208.330:50): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 208.865112][ T3316] cgroup: Unknown subsys name 'net' [ 208.888889][ T30] audit: type=1400 audit(208.400:51): avc: denied { unmount } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 209.163715][ T3316] cgroup: Unknown subsys name 'cpuset' [ 209.241490][ T3316] cgroup: Unknown subsys name 'rlimit' [ 209.566224][ T30] audit: type=1400 audit(209.080:52): avc: denied { setattr } for pid=3316 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 209.571478][ T30] audit: type=1400 audit(209.080:53): avc: denied { mounton } for pid=3316 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 209.577405][ T30] audit: type=1400 audit(209.090:54): avc: denied { mount } for pid=3316 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 210.148288][ T3318] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 210.159104][ T30] audit: type=1400 audit(209.670:55): avc: denied { relabelto } for pid=3318 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 210.170126][ T30] audit: type=1400 audit(209.680:56): avc: denied { write } for pid=3318 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 210.248630][ T30] audit: type=1400 audit(209.760:57): avc: denied { read } for pid=3316 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 210.253760][ T30] audit: type=1400 audit(209.760:58): avc: denied { open } for pid=3316 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 210.265882][ T3316] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 224.049130][ T30] audit: type=1400 audit(223.560:59): avc: denied { execmem } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 224.183613][ T30] audit: type=1400 audit(223.690:60): avc: denied { read } for pid=3321 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 224.194535][ T30] audit: type=1400 audit(223.700:61): avc: denied { read } for pid=3322 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 224.195279][ T30] audit: type=1400 audit(223.700:62): avc: denied { open } for pid=3322 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 224.213171][ T30] audit: type=1400 audit(223.720:63): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 224.274306][ T30] audit: type=1400 audit(223.790:64): avc: denied { module_request } for pid=3322 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 224.578902][ T30] audit: type=1400 audit(224.090:65): avc: denied { sys_module } for pid=3322 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 232.010691][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.057812][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 232.563842][ T3322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 232.597613][ T3322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 235.761020][ T3321] hsr_slave_0: entered promiscuous mode [ 235.774729][ T3321] hsr_slave_1: entered promiscuous mode [ 236.330810][ T3322] hsr_slave_0: entered promiscuous mode [ 236.339130][ T3322] hsr_slave_1: entered promiscuous mode [ 236.345196][ T3322] debugfs: 'hsr0' already exists in 'hsr' [ 236.346899][ T3322] Cannot create hsr debugfs directory [ 238.863696][ T30] audit: type=1400 audit(238.370:66): avc: denied { create } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 238.883172][ T30] audit: type=1400 audit(238.390:67): avc: denied { write } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 238.899566][ T30] audit: type=1400 audit(238.410:68): avc: denied { read } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 238.942716][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 239.042516][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 239.240691][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 239.289329][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 239.783493][ T3322] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 239.830456][ T3322] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 239.882345][ T3322] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 239.945201][ T3322] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 242.848334][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.158751][ T3322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.158165][ T3321] veth0_vlan: entered promiscuous mode [ 255.269547][ T3321] veth1_vlan: entered promiscuous mode [ 255.560348][ T3321] veth0_macvtap: entered promiscuous mode [ 255.638667][ T3321] veth1_macvtap: entered promiscuous mode [ 256.058741][ T1018] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.167979][ T1018] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.169000][ T1018] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.169289][ T1018] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.400084][ T3322] veth0_vlan: entered promiscuous mode [ 256.686443][ T30] audit: type=1400 audit(256.200:69): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 256.740386][ T30] audit: type=1400 audit(256.250:70): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.CyqSkl/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 256.783028][ T30] audit: type=1400 audit(256.290:71): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 256.853479][ T30] audit: type=1400 audit(256.350:72): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.CyqSkl/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 256.866679][ T30] audit: type=1400 audit(256.360:73): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzkaller.CyqSkl/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3839 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 256.904726][ T3322] veth1_vlan: entered promiscuous mode [ 256.938203][ T30] audit: type=1400 audit(256.450:74): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 256.985878][ T30] audit: type=1400 audit(256.490:75): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 256.986905][ T30] audit: type=1400 audit(256.500:76): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="gadgetfs" ino=3840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 257.041538][ T30] audit: type=1400 audit(256.550:77): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 257.056116][ T30] audit: type=1400 audit(256.560:78): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 257.414019][ T3321] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 257.578689][ T3322] veth0_macvtap: entered promiscuous mode [ 257.783181][ T3322] veth1_macvtap: entered promiscuous mode [ 258.887306][ T1018] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.889440][ T1018] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.890511][ T1018] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 258.891435][ T1018] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.164185][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 263.164880][ T30] audit: type=1400 audit(262.680:85): avc: denied { create } for pid=3488 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 267.217210][ T30] audit: type=1400 audit(266.730:86): avc: denied { read write } for pid=3521 comm="syz.1.25" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 267.225933][ T30] audit: type=1400 audit(266.730:87): avc: denied { open } for pid=3521 comm="syz.1.25" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 268.841266][ T30] audit: type=1400 audit(268.350:88): avc: denied { mount } for pid=3529 comm="syz.0.29" name="/" dev="autofs" ino=4262 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 269.044301][ T30] audit: type=1400 audit(268.550:89): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 269.882460][ T30] audit: type=1400 audit(269.380:90): avc: denied { prog_load } for pid=3537 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 269.896521][ T30] audit: type=1400 audit(269.410:91): avc: denied { bpf } for pid=3537 comm="syz.0.33" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 269.925252][ T30] audit: type=1400 audit(269.430:92): avc: denied { map_create } for pid=3537 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 269.946419][ T30] audit: type=1400 audit(269.460:93): avc: denied { map_read map_write } for pid=3537 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 270.210230][ T30] audit: type=1400 audit(269.720:94): avc: denied { create } for pid=3539 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 270.276589][ T30] audit: type=1400 audit(269.780:95): avc: denied { ioctl } for pid=3539 comm="syz.1.34" path="socket:[4272]" dev="sockfs" ino=4272 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 271.999239][ T3555] Zero length message leads to an empty skb [ 273.726216][ T3567] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3567 comm=syz.0.47 [ 283.159759][ T30] audit: type=1400 audit(282.670:96): avc: denied { perfmon } for pid=3618 comm="syz.1.73" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 283.344583][ T30] audit: type=1400 audit(282.860:97): avc: denied { prog_run } for pid=3618 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 283.375301][ T30] audit: type=1400 audit(282.890:98): avc: denied { create } for pid=3618 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 283.385850][ T30] audit: type=1400 audit(282.900:99): avc: denied { setopt } for pid=3618 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 283.702536][ T3623] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3623 comm=syz.0.75 [ 286.285874][ T30] audit: type=1400 audit(285.800:100): avc: denied { create } for pid=3637 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 286.328323][ T30] audit: type=1400 audit(285.840:101): avc: denied { write } for pid=3637 comm="syz.1.82" path="socket:[4418]" dev="sockfs" ino=4418 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 287.076965][ T30] audit: type=1400 audit(286.590:102): avc: denied { setopt } for pid=3643 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 287.158196][ T30] audit: type=1400 audit(286.670:103): avc: denied { write } for pid=3643 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 287.600431][ T30] audit: type=1400 audit(287.110:104): avc: denied { write } for pid=3645 comm="syz.0.86" name="arp" dev="proc" ino=4026532631 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 291.023109][ T30] audit: type=1400 audit(290.530:105): avc: denied { name_bind } for pid=3675 comm="syz.1.102" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 291.023880][ T30] audit: type=1400 audit(290.530:106): avc: denied { node_bind } for pid=3675 comm="syz.1.102" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 298.414135][ T3745] capability: warning: `syz.1.133' uses deprecated v2 capabilities in a way that may be insecure [ 299.763132][ T30] audit: type=1400 audit(299.270:107): avc: denied { nlmsg_write } for pid=3752 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 320.884107][ T30] audit: type=1400 audit(320.390:108): avc: denied { read write } for pid=3932 comm="syz.0.224" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 320.893674][ T30] audit: type=1400 audit(320.400:109): avc: denied { open } for pid=3932 comm="syz.0.224" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 320.983931][ T30] audit: type=1400 audit(320.470:110): avc: denied { ioctl } for pid=3932 comm="syz.0.224" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 321.160052][ T3933] input: syz0 as /devices/virtual/input/input1 [ 323.911173][ T30] audit: type=1400 audit(323.420:111): avc: denied { execute } for pid=3950 comm="syz.1.233" name="file1" dev="tmpfs" ino=626 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 323.934956][ T3951] process 'syz.1.233' launched './file1' with NULL argv: empty string added [ 323.941039][ T30] audit: type=1400 audit(323.450:112): avc: denied { execute_no_trans } for pid=3950 comm="syz.1.233" path="/120/file1" dev="tmpfs" ino=626 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 327.197544][ T30] audit: type=1400 audit(326.710:113): avc: denied { create } for pid=3979 comm="syz.1.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 327.253354][ T30] audit: type=1400 audit(326.760:114): avc: denied { connect } for pid=3979 comm="syz.1.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 327.803672][ T30] audit: type=1400 audit(327.310:115): avc: denied { write } for pid=3979 comm="syz.1.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 333.834028][ T30] audit: type=1400 audit(333.340:116): avc: denied { allowed } for pid=4022 comm="syz.0.268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 333.886082][ T30] audit: type=1400 audit(333.400:117): avc: denied { create } for pid=4022 comm="syz.0.268" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 340.431414][ T30] audit: type=1400 audit(339.940:118): avc: denied { create } for pid=4070 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 340.608489][ T30] audit: type=1400 audit(340.120:119): avc: denied { write } for pid=4072 comm="syz.1.293" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 340.615505][ T30] audit: type=1400 audit(340.130:120): avc: denied { open } for pid=4072 comm="syz.1.293" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 340.627779][ T30] audit: type=1400 audit(340.140:121): avc: denied { ioctl } for pid=4072 comm="syz.1.293" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 340.899859][ T30] audit: type=1400 audit(340.400:122): avc: denied { open } for pid=4074 comm="syz.1.295" path="/dev/ptyq7" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 340.976518][ T30] audit: type=1400 audit(340.490:123): avc: denied { ioctl } for pid=4074 comm="syz.1.295" path="/dev/ttyq7" dev="devtmpfs" ino=374 ioctlcmd=0x5401 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 343.973352][ T30] audit: type=1400 audit(343.490:124): avc: denied { read } for pid=4091 comm="syz.0.302" name="userfaultfd" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 343.977300][ T30] audit: type=1400 audit(343.490:125): avc: denied { open } for pid=4091 comm="syz.0.302" path="/dev/userfaultfd" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 364.268633][ T30] audit: type=1400 audit(363.780:126): avc: denied { mounton } for pid=4226 comm="syz.1.368" path="/186/file0" dev="tmpfs" ino=967 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 364.298470][ T30] audit: type=1400 audit(363.810:127): avc: denied { mount } for pid=4226 comm="syz.1.368" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 364.311455][ T30] audit: type=1400 audit(363.820:128): avc: denied { remount } for pid=4226 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 364.642896][ T30] audit: type=1400 audit(364.140:129): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 366.064234][ T4240] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=4240 comm=syz.0.374 [ 387.180831][ T30] audit: type=1400 audit(386.690:130): avc: denied { ioctl } for pid=4406 comm="syz.0.458" path="socket:[6776]" dev="sockfs" ino=6776 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 392.291435][ T30] audit: type=1400 audit(391.800:131): avc: denied { read } for pid=4443 comm="syz.1.476" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 392.297401][ T30] audit: type=1400 audit(391.800:132): avc: denied { open } for pid=4443 comm="syz.1.476" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 392.308644][ T30] audit: type=1400 audit(391.820:133): avc: denied { ioctl } for pid=4443 comm="syz.1.476" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 395.495454][ T30] audit: type=1400 audit(395.010:134): avc: denied { write } for pid=4474 comm="syz.0.491" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 395.509661][ T30] audit: type=1400 audit(395.020:135): avc: denied { ioctl } for pid=4474 comm="syz.0.491" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 395.876040][ T941] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 396.133925][ T941] usb 1-1: Using ep0 maxpacket: 32 [ 396.227940][ T941] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 396.233162][ T941] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 396.236176][ T941] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 396.242675][ T941] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 396.245014][ T941] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 396.247898][ T941] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 396.250115][ T941] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 396.279605][ T941] usb 1-1: config 0 descriptor?? [ 396.667046][ T941] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 2 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 397.860684][ T30] audit: type=1400 audit(397.370:136): avc: denied { create } for pid=4487 comm="syz.1.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 397.876195][ T30] audit: type=1400 audit(397.390:137): avc: denied { connect } for pid=4487 comm="syz.1.497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 399.584621][ T30] audit: type=1400 audit(399.090:138): avc: denied { associate } for pid=4497 comm="syz.1.502" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 402.578272][ T30] audit: type=1400 audit(402.090:139): avc: denied { read write } for pid=4512 comm="syz.1.509" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 402.600096][ T30] audit: type=1400 audit(402.090:140): avc: denied { open } for pid=4512 comm="syz.1.509" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 402.634284][ T30] audit: type=1400 audit(402.090:141): avc: denied { setattr } for pid=4512 comm="syz.1.509" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 406.837753][ T941] usb 1-1: USB disconnect, device number 2 [ 407.298767][ T941] usblp0: removed [ 411.788227][ T30] audit: type=1400 audit(411.300:142): avc: denied { read } for pid=4577 comm="syz.0.542" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 411.807262][ T30] audit: type=1400 audit(411.320:143): avc: denied { open } for pid=4577 comm="syz.0.542" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 411.824474][ T30] audit: type=1400 audit(411.340:144): avc: denied { ioctl } for pid=4577 comm="syz.0.542" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x1262 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 413.303078][ T30] audit: type=1400 audit(412.780:145): avc: denied { write } for pid=4589 comm="syz.0.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 413.303564][ T30] audit: type=1400 audit(412.810:146): avc: denied { nlmsg_read } for pid=4589 comm="syz.0.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 413.308176][ T30] audit: type=1400 audit(412.820:147): avc: denied { read } for pid=4589 comm="syz.0.548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 424.140450][ T30] audit: type=1400 audit(423.650:148): avc: denied { create } for pid=4673 comm="syz.0.589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 424.150733][ T30] audit: type=1400 audit(423.660:149): avc: denied { ioctl } for pid=4673 comm="syz.0.589" path="socket:[7896]" dev="sockfs" ino=7896 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 424.533050][ T30] audit: type=1400 audit(424.040:150): avc: denied { create } for pid=4678 comm="syz.0.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 424.548861][ T30] audit: type=1400 audit(424.060:151): avc: denied { read } for pid=4678 comm="syz.0.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 425.142661][ T30] audit: type=1400 audit(424.650:152): avc: denied { write } for pid=4686 comm="syz.1.595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 425.168024][ T30] audit: type=1400 audit(424.680:153): avc: denied { read } for pid=4686 comm="syz.1.595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 428.394482][ T30] audit: type=1400 audit(427.910:154): avc: denied { read write } for pid=4720 comm="syz.1.612" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 428.397330][ T30] audit: type=1400 audit(427.910:155): avc: denied { open } for pid=4720 comm="syz.1.612" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 428.462846][ T30] audit: type=1400 audit(427.950:156): avc: denied { ioctl } for pid=4720 comm="syz.1.612" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0x552d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 430.163743][ T4736] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 430.188956][ T30] audit: type=1400 audit(429.690:157): avc: denied { create } for pid=4734 comm="syz.1.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 430.190061][ T30] audit: type=1400 audit(429.700:158): avc: denied { ioctl } for pid=4735 comm="syz.0.619" path="socket:[8022]" dev="sockfs" ino=8022 ioctlcmd=0x89f6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 430.252436][ T30] audit: type=1400 audit(429.760:159): avc: denied { write } for pid=4734 comm="syz.1.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 430.255881][ T30] audit: type=1400 audit(429.770:160): avc: denied { read } for pid=4734 comm="syz.1.620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 439.347355][ T30] audit: type=1400 audit(438.860:161): avc: denied { bind } for pid=4797 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 439.365739][ T30] audit: type=1400 audit(438.870:162): avc: denied { node_bind } for pid=4797 comm="syz.1.649" saddr=127.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 440.006265][ T30] audit: type=1400 audit(439.490:163): avc: denied { create } for pid=4801 comm="syz.1.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 440.069324][ T30] audit: type=1400 audit(439.580:164): avc: denied { write } for pid=4801 comm="syz.1.651" path="socket:[8454]" dev="sockfs" ino=8454 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 450.658674][ T4877] netlink: 56 bytes leftover after parsing attributes in process `syz.0.687'. [ 450.697145][ T4877] netlink: 56 bytes leftover after parsing attributes in process `syz.0.687'. [ 451.444463][ T30] audit: type=1400 audit(450.950:165): avc: denied { read } for pid=4885 comm="syz.0.692" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 451.445542][ T30] audit: type=1400 audit(450.960:166): avc: denied { open } for pid=4885 comm="syz.0.692" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 451.485989][ T30] audit: type=1400 audit(450.990:167): avc: denied { ioctl } for pid=4885 comm="syz.0.692" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 456.745083][ T30] audit: type=1400 audit(456.260:168): avc: denied { connect } for pid=4928 comm="syz.1.713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 458.505295][ T4939] mmap: syz.0.717 (4939) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 459.907845][ T4949] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4949 comm=syz.1.722 [ 465.542641][ T30] audit: type=1400 audit(465.050:169): avc: denied { append } for pid=4993 comm="syz.0.744" name="system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 471.199748][ T30] audit: type=1400 audit(470.710:170): avc: denied { name_bind } for pid=5039 comm="syz.0.768" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 475.020805][ T30] audit: type=1400 audit(474.530:171): avc: denied { block_suspend } for pid=5070 comm="syz.1.781" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 475.152711][ T30] audit: type=1400 audit(474.630:172): avc: denied { create } for pid=5071 comm="syz.0.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 475.196019][ T30] audit: type=1400 audit(474.710:173): avc: denied { write } for pid=5071 comm="syz.0.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 482.266282][ T5125] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 482.337507][ T30] audit: type=1400 audit(481.850:174): avc: denied { connect } for pid=5122 comm="syz.0.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 482.380498][ T30] audit: type=1400 audit(481.890:175): avc: denied { setopt } for pid=5122 comm="syz.0.806" laddr=::ffff:172.20.20.10 lport=57467 faddr=::ffff:172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 486.720646][ T30] audit: type=1400 audit(486.230:176): avc: denied { create } for pid=5165 comm="syz.0.827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 487.455226][ T30] audit: type=1400 audit(486.970:177): avc: denied { setopt } for pid=5171 comm="syz.1.829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 488.866655][ T5184] capability: warning: `syz.1.835' uses 32-bit capabilities (legacy support in use) [ 504.439977][ T30] audit: type=1400 audit(503.950:178): avc: denied { bind } for pid=5324 comm="syz.0.905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 504.470515][ T30] audit: type=1400 audit(503.980:179): avc: denied { setopt } for pid=5324 comm="syz.0.905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 532.548270][ T30] audit: type=1400 audit(532.060:180): avc: denied { setopt } for pid=5544 comm="syz.0.1014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 542.524061][ T30] audit: type=1400 audit(542.040:181): avc: denied { create } for pid=5614 comm="syz.1.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 542.625440][ T30] audit: type=1400 audit(542.130:182): avc: denied { write } for pid=5614 comm="syz.1.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 542.689248][ T30] audit: type=1400 audit(542.200:183): avc: denied { read } for pid=5614 comm="syz.1.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 544.235735][ T5627] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1054'. [ 553.050718][ T30] audit: type=1400 audit(552.560:184): avc: denied { append } for pid=5689 comm="syz.1.1086" name="loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 559.459500][ T30] audit: type=1400 audit(558.970:185): avc: denied { read } for pid=5727 comm="syz.0.1104" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 559.469085][ T30] audit: type=1400 audit(558.970:186): avc: denied { open } for pid=5727 comm="syz.0.1104" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 565.949774][ T30] audit: type=1400 audit(565.460:187): avc: denied { create } for pid=5781 comm="syz.1.1131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 565.971171][ T30] audit: type=1400 audit(565.480:188): avc: denied { write } for pid=5781 comm="syz.1.1131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 567.159453][ T5795] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5795 comm=syz.1.1137 [ 569.702330][ T30] audit: type=1400 audit(569.200:189): avc: denied { setattr } for pid=5815 comm="syz.0.1148" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 599.446853][ T30] audit: type=1400 audit(598.960:190): avc: denied { create } for pid=6015 comm="syz.1.1246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 599.465360][ T30] audit: type=1400 audit(598.980:191): avc: denied { write } for pid=6015 comm="syz.1.1246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 599.500867][ T30] audit: type=1400 audit(599.010:192): avc: denied { read } for pid=6015 comm="syz.1.1246" path="socket:[12053]" dev="sockfs" ino=12053 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 607.511411][ T6082] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=6082 comm=syz.0.1278 [ 620.280253][ T30] audit: type=1400 audit(619.790:193): avc: denied { setopt } for pid=6160 comm="syz.0.1317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 623.601347][ T30] audit: type=1400 audit(623.100:194): avc: denied { getopt } for pid=6184 comm="syz.0.1329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 626.675885][ T30] audit: type=1400 audit(626.170:195): avc: denied { read } for pid=6209 comm="syz.1.1341" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 626.678670][ T30] audit: type=1400 audit(626.170:196): avc: denied { open } for pid=6209 comm="syz.1.1341" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 626.713922][ T30] audit: type=1400 audit(626.220:197): avc: denied { ioctl } for pid=6209 comm="syz.1.1341" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 657.005949][ T30] audit: type=1400 audit(656.520:198): avc: denied { setopt } for pid=6423 comm="syz.1.1446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 659.248103][ T30] audit: type=1400 audit(658.760:199): avc: denied { write } for pid=6440 comm="syz.0.1454" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 663.079220][ T30] audit: type=1400 audit(662.590:200): avc: denied { write } for pid=6465 comm="syz.0.1467" path="socket:[14465]" dev="sockfs" ino=14465 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 679.268687][ T6591] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6591 comm=syz.0.1527 [ 684.450466][ T30] audit: type=1400 audit(683.960:201): avc: denied { write } for pid=6637 comm="syz.0.1551" path="socket:[14799]" dev="sockfs" ino=14799 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 687.122992][ T30] audit: type=1400 audit(686.630:202): avc: denied { append } for pid=6649 comm="syz.1.1556" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 687.184582][ T6651] usb usb1: usbfs: process 6651 (syz.1.1556) did not claim interface 0 before use [ 688.330944][ T30] audit: type=1400 audit(687.840:203): avc: denied { ioctl } for pid=6659 comm="syz.0.1561" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=14828 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 692.450053][ T30] audit: type=1400 audit(691.960:204): avc: denied { ioctl } for pid=6693 comm="syz.0.1578" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 713.278419][ T30] audit: type=1400 audit(712.770:205): avc: denied { write } for pid=6861 comm="syz.1.1660" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 713.325537][ T6863] binder: 6861:6863 ioctl 400c620e 0 returned -14 [ 718.515215][ T30] audit: type=1400 audit(718.020:206): avc: denied { execute } for pid=6901 comm="syz.0.1679" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=15239 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 732.337246][ T30] audit: type=1400 audit(731.850:207): avc: denied { name_bind } for pid=7014 comm="syz.0.1734" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 736.530849][ T30] audit: type=1400 audit(736.040:208): avc: denied { getopt } for pid=7054 comm="syz.1.1753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 750.546838][ T7169] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7169 comm=syz.0.1808 [ 763.593736][ T7275] syz.0.1860 uses obsolete (PF_INET,SOCK_PACKET) [ 764.638446][ T30] audit: type=1400 audit(764.150:209): avc: denied { create } for pid=7281 comm="syz.0.1864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 768.297927][ T30] audit: type=1400 audit(767.810:210): avc: denied { bind } for pid=7304 comm="syz.1.1875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 771.877973][ T30] audit: type=1400 audit(771.390:211): avc: denied { accept } for pid=7333 comm="syz.1.1889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 778.406564][ T7376] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7376 comm=syz.0.1909 [ 779.665815][ T30] audit: type=1400 audit(779.160:212): avc: denied { bind } for pid=7387 comm="syz.1.1916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 779.738190][ T30] audit: type=1400 audit(779.250:213): avc: denied { write } for pid=7387 comm="syz.1.1916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 786.957256][ T7446] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7446 comm=syz.0.1944 [ 807.956696][ T30] audit: type=1400 audit(807.470:214): avc: denied { ioctl } for pid=7630 comm="syz.1.2031" path="socket:[18461]" dev="sockfs" ino=18461 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 813.445637][ T30] audit: type=1400 audit(812.940:215): avc: denied { ioctl } for pid=7658 comm="syz.1.2044" path="socket:[17728]" dev="sockfs" ino=17728 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 818.119774][ T30] audit: type=1400 audit(817.630:216): avc: denied { ioctl } for pid=7687 comm="syz.1.2059" path="socket:[17772]" dev="sockfs" ino=17772 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 820.363342][ T30] audit: type=1400 audit(819.870:217): avc: denied { setopt } for pid=7708 comm="syz.1.2069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 824.429710][ T30] audit: type=1400 audit(823.940:218): avc: denied { setattr } for pid=7739 comm="syz.1.2085" name="sequencer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 824.959511][ T30] audit: type=1400 audit(824.470:219): avc: denied { read write } for pid=7745 comm="syz.1.2088" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 824.985131][ T30] audit: type=1400 audit(824.480:220): avc: denied { open } for pid=7745 comm="syz.1.2088" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 825.025353][ T6197] hid-generic 007F:6E8D:0005.0001: item fetching failed at offset 1/5 [ 825.034419][ T6197] hid-generic 007F:6E8D:0005.0001: probe with driver hid-generic failed with error -22 [ 830.565800][ T30] audit: type=1400 audit(830.060:221): avc: denied { create } for pid=7789 comm="syz.1.2109" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 830.574209][ T30] audit: type=1400 audit(830.090:222): avc: denied { read } for pid=7789 comm="syz.1.2109" name="file2" dev="tmpfs" ino=5376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 830.586686][ T30] audit: type=1400 audit(830.100:223): avc: denied { open } for pid=7789 comm="syz.1.2109" path="/1045/file2" dev="tmpfs" ino=5376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 830.600032][ T30] audit: type=1400 audit(830.110:224): avc: denied { ioctl } for pid=7789 comm="syz.1.2109" path="/1045/file2" dev="tmpfs" ino=5376 ioctlcmd=0x4c07 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 830.777965][ T30] audit: type=1400 audit(830.290:225): avc: denied { unlink } for pid=3321 comm="syz-executor" name="file2" dev="tmpfs" ino=5376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 837.677945][ T30] audit: type=1400 audit(837.190:226): avc: denied { nlmsg_read } for pid=7845 comm="syz.1.2137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 843.346478][ T7889] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=7889 comm=syz.0.2156 [ 844.247383][ T7899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=7899 comm=syz.0.2161 [ 849.235511][ T1018] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 849.242633][ T1018] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 849.244082][ T1018] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 849.245210][ T1018] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 866.398784][ T30] audit: type=1400 audit(865.900:227): avc: denied { setattr } for pid=8073 comm="syz.1.2245" name="RAW" dev="sockfs" ino=19277 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 868.998123][ T30] audit: type=1400 audit(868.500:228): avc: denied { map } for pid=8093 comm="syz.0.2255" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18351 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 869.010467][ T30] audit: type=1400 audit(868.520:229): avc: denied { read write } for pid=8093 comm="syz.0.2255" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=18351 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 875.396642][ T30] audit: type=1400 audit(874.910:230): avc: denied { create } for pid=8136 comm="syz.1.2277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 875.404947][ T30] audit: type=1400 audit(874.920:231): avc: denied { setopt } for pid=8136 comm="syz.1.2277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 876.935225][ T30] audit: type=1400 audit(876.440:232): avc: denied { compute_member } for pid=8152 comm="syz.1.2284" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 892.290779][ T30] audit: type=1400 audit(891.800:233): avc: denied { read write } for pid=3322 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 892.297830][ T30] audit: type=1400 audit(891.810:234): avc: denied { open } for pid=3322 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 892.309282][ T30] audit: type=1400 audit(891.810:235): avc: denied { ioctl } for pid=3322 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 896.532500][ T30] audit: type=1400 audit(896.040:236): avc: denied { name_bind } for pid=8301 comm="syz.1.2357" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 896.533079][ T30] audit: type=1400 audit(896.040:237): avc: denied { node_bind } for pid=8301 comm="syz.1.2357" saddr=fe80::aa src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 896.595132][ T30] audit: type=1400 audit(896.110:238): avc: denied { prog_load } for pid=8302 comm="syz.0.2358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 896.599011][ T30] audit: type=1400 audit(896.110:239): avc: denied { bpf } for pid=8302 comm="syz.0.2358" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 896.618880][ T30] audit: type=1400 audit(896.130:240): avc: denied { perfmon } for pid=8302 comm="syz.0.2358" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 896.685165][ T30] audit: type=1400 audit(896.160:241): avc: denied { prog_run } for pid=8302 comm="syz.0.2358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 897.671503][ T30] audit: type=1400 audit(897.180:242): avc: denied { mounton } for pid=8309 comm="syz.0.2361" path="/1183/bus" dev="tmpfs" ino=6080 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 897.728002][ T30] audit: type=1400 audit(897.240:243): avc: denied { execmem } for pid=8310 comm="syz.1.2362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 897.797175][ T30] audit: type=1400 audit(897.310:244): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 898.106475][ T30] audit: type=1400 audit(897.620:245): avc: denied { allowed } for pid=8313 comm="syz.1.2363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 898.154565][ T30] audit: type=1400 audit(897.660:246): avc: denied { create } for pid=8313 comm="syz.1.2363" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 898.190920][ T30] audit: type=1400 audit(897.700:247): avc: denied { map } for pid=8313 comm="syz.1.2363" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 898.232671][ T30] audit: type=1400 audit(897.730:248): avc: denied { read write } for pid=8313 comm="syz.1.2363" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=19766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 899.183345][ T30] audit: type=1400 audit(898.690:249): avc: denied { create } for pid=8319 comm="syz.0.2366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 899.255379][ T30] audit: type=1400 audit(898.760:250): avc: denied { write } for pid=8319 comm="syz.0.2366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 899.760848][ T30] audit: type=1400 audit(899.270:251): avc: denied { create } for pid=8321 comm="syz.0.2367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 902.898101][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 902.920999][ T30] audit: type=1400 audit(902.410:258): avc: denied { write } for pid=8343 comm="syz.0.2378" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 907.627593][ T30] audit: type=1400 audit(907.130:259): avc: denied { create } for pid=8377 comm="syz.1.2394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 907.640979][ T30] audit: type=1400 audit(907.150:260): avc: denied { write } for pid=8377 comm="syz.1.2394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 907.916835][ T30] audit: type=1400 audit(907.420:261): avc: denied { create } for pid=8379 comm="syz.0.2395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 907.938763][ T30] audit: type=1400 audit(907.450:262): avc: denied { write } for pid=8379 comm="syz.0.2395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 909.269420][ T30] audit: type=1400 audit(908.780:263): avc: denied { read } for pid=8391 comm="syz.1.2401" name="nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 909.276362][ T30] audit: type=1400 audit(908.790:264): avc: denied { open } for pid=8391 comm="syz.1.2401" path="/dev/nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 912.135385][ T30] audit: type=1400 audit(911.650:265): avc: denied { nlmsg_write } for pid=8411 comm="syz.0.2411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 917.533857][ T30] audit: type=1400 audit(917.040:266): avc: denied { mount } for pid=8461 comm="syz.1.2436" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 918.036257][ T30] audit: type=1400 audit(917.550:267): avc: denied { read write } for pid=8466 comm="syz.1.2438" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 918.055972][ T30] audit: type=1400 audit(917.550:268): avc: denied { open } for pid=8466 comm="syz.1.2438" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 919.744307][ T30] audit: type=1400 audit(919.250:269): avc: denied { open } for pid=8479 comm="syz.0.2445" path="/dev/ptyq4" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 920.056788][ T8485] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8485 comm=syz.1.2447 [ 921.014168][ T30] audit: type=1400 audit(920.520:270): avc: denied { read } for pid=8492 comm="syz.0.2451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 922.796356][ T30] audit: type=1400 audit(922.310:271): avc: denied { create } for pid=8508 comm="syz.0.2460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 922.819308][ T30] audit: type=1400 audit(922.330:272): avc: denied { write } for pid=8508 comm="syz.0.2460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 923.551064][ T30] audit: type=1400 audit(923.060:273): avc: denied { write } for pid=8516 comm="syz.1.2463" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 923.797685][ T30] audit: type=1400 audit(923.310:274): avc: denied { ioctl } for pid=8518 comm="syz.0.2464" path="socket:[21088]" dev="sockfs" ino=21088 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 926.817044][ T30] audit: type=1400 audit(926.330:275): avc: denied { read } for pid=8549 comm="syz.1.2479" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 926.818963][ T30] audit: type=1400 audit(926.330:276): avc: denied { open } for pid=8549 comm="syz.1.2479" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 926.855815][ T30] audit: type=1400 audit(926.360:277): avc: denied { ioctl } for pid=8549 comm="syz.1.2479" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 927.346530][ T30] audit: type=1400 audit(926.860:278): avc: denied { execute } for pid=8551 comm="syz.1.2480" path="/dev/dsp" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 929.092899][ T30] audit: type=1400 audit(928.600:279): avc: denied { map_create } for pid=8564 comm="syz.1.2487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 929.144342][ T30] audit: type=1400 audit(928.620:280): avc: denied { map_write } for pid=8564 comm="syz.1.2487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 930.557393][ T30] audit: type=1400 audit(930.070:281): avc: denied { read } for pid=8578 comm="syz.0.2494" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 930.561047][ T30] audit: type=1400 audit(930.070:282): avc: denied { open } for pid=8578 comm="syz.0.2494" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 930.594741][ T30] audit: type=1400 audit(930.110:283): avc: denied { ioctl } for pid=8578 comm="syz.0.2494" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 931.210825][ T30] audit: type=1400 audit(930.720:284): avc: denied { read write } for pid=8582 comm="syz.1.2496" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 931.223730][ T30] audit: type=1400 audit(930.730:285): avc: denied { open } for pid=8582 comm="syz.1.2496" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 932.660806][ T30] audit: type=1400 audit(932.170:286): avc: denied { create } for pid=8593 comm="syz.0.2501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 932.766835][ T30] audit: type=1400 audit(932.280:287): avc: denied { write } for pid=8593 comm="syz.0.2501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 932.789192][ T30] audit: type=1400 audit(932.300:288): avc: denied { nlmsg_read } for pid=8593 comm="syz.0.2501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 934.786490][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 934.789873][ T30] audit: type=1400 audit(934.300:290): avc: denied { connect } for pid=8606 comm="syz.1.2507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 935.870837][ T30] audit: type=1400 audit(935.380:291): avc: denied { read } for pid=8613 comm="syz.1.2511" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 935.884547][ T30] audit: type=1400 audit(935.390:292): avc: denied { open } for pid=8613 comm="syz.1.2511" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 935.923376][ T30] audit: type=1400 audit(935.430:293): avc: denied { write } for pid=8613 comm="syz.1.2511" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 937.259470][ T30] audit: type=1400 audit(936.770:294): avc: denied { sys_module } for pid=8624 comm="syz.1.2516" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 937.267118][ T30] audit: type=1400 audit(936.780:295): avc: denied { module_request } for pid=8624 comm="syz.1.2516" kmod="tty-ldisc-14" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 937.849741][ T8632] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8632 comm=syz.0.2519 [ 939.568239][ T30] audit: type=1400 audit(939.060:296): avc: denied { map_read } for pid=8643 comm="syz.0.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 945.576993][ T8693] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2549'. [ 949.110854][ T30] audit: type=1400 audit(948.620:297): avc: denied { create } for pid=8709 comm="syz.0.2557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 949.137449][ T30] audit: type=1400 audit(948.650:298): avc: denied { setopt } for pid=8709 comm="syz.0.2557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 963.755389][ T30] audit: type=1400 audit(963.250:299): avc: denied { create } for pid=8808 comm="syz.0.2606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 963.781565][ T30] audit: type=1400 audit(963.290:300): avc: denied { setopt } for pid=8808 comm="syz.0.2606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 972.068229][ T8872] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8872 comm=syz.1.2637 [ 977.119470][ T30] audit: type=1400 audit(976.630:301): avc: denied { mounton } for pid=8905 comm="syz.1.2654" path="/1323/file0" dev="tmpfs" ino=6797 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 977.355519][ T30] audit: type=1400 audit(976.860:302): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 978.712997][ T30] audit: type=1400 audit(978.220:303): avc: denied { execute } for pid=8912 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 978.727554][ T30] audit: type=1400 audit(978.240:304): avc: denied { execute_no_trans } for pid=8912 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 979.181289][ T30] audit: type=1400 audit(978.670:305): avc: denied { read } for pid=8915 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 979.183914][ T30] audit: type=1400 audit(978.670:306): avc: denied { open } for pid=8915 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 979.184752][ T30] audit: type=1400 audit(978.680:307): avc: denied { mounton } for pid=8915 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 979.964739][ T30] audit: type=1400 audit(979.470:308): avc: denied { read } for pid=3166 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 980.434756][ T30] audit: type=1400 audit(979.920:309): avc: denied { search } for pid=3166 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 980.438584][ T30] audit: type=1400 audit(979.950:310): avc: denied { search } for pid=3166 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 982.795057][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 982.865572][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 982.924537][ T26] bond0 (unregistering): Released all slaves [ 983.570489][ T26] hsr_slave_0: left promiscuous mode [ 983.610320][ T26] hsr_slave_1: left promiscuous mode [ 985.569663][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 985.570514][ T30] audit: type=1400 audit(985.070:315): avc: denied { read open } for pid=8944 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=931 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 985.571048][ T30] audit: type=1400 audit(985.070:316): avc: denied { getattr } for pid=8944 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=931 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 986.154543][ T30] audit: type=1400 audit(985.660:317): avc: denied { add_name } for pid=8941 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 986.169048][ T30] audit: type=1400 audit(985.670:318): avc: denied { create } for pid=8941 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 986.174238][ T30] audit: type=1400 audit(985.680:319): avc: denied { write } for pid=8941 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=5481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 986.202322][ T30] audit: type=1400 audit(985.700:320): avc: denied { append } for pid=8941 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=5481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 987.891352][ T30] audit: type=1400 audit(987.400:321): avc: denied { remove_name } for pid=8952 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=5481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 987.904763][ T30] audit: type=1400 audit(987.400:322): avc: denied { unlink } for pid=8952 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=5481 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1002.739838][ T8915] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1002.778503][ T8915] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1004.248114][ T30] audit: type=1400 audit(1003.760:323): avc: denied { create } for pid=9037 comm="syz.0.2700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1004.265337][ T30] audit: type=1400 audit(1003.780:324): avc: denied { write } for pid=9037 comm="syz.0.2700" path="socket:[22947]" dev="sockfs" ino=22947 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1007.041175][ T30] audit: type=1400 audit(1006.550:325): avc: denied { mac_admin } for pid=9057 comm="syz.0.2706" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1007.056475][ T9058] SELinux: Context system_u:object_r:hald_var_run_t:s0 is not valid (left unmapped). [ 1007.060986][ T30] audit: type=1400 audit(1006.570:326): avc: denied { relabelto } for pid=9057 comm="syz.0.2706" name="file0" dev="tmpfs" ino=7081 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 1007.067468][ T30] audit: type=1400 audit(1006.580:327): avc: denied { associate } for pid=9057 comm="syz.0.2706" name="file0" dev="tmpfs" ino=7081 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_var_run_t:s0" [ 1007.280772][ T30] audit: type=1400 audit(1006.780:328): avc: denied { unlink } for pid=3322 comm="syz-executor" name="file0" dev="tmpfs" ino=7081 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 1009.530578][ T8915] hsr_slave_0: entered promiscuous mode [ 1009.538940][ T8915] hsr_slave_1: entered promiscuous mode [ 1012.189017][ T30] audit: type=1400 audit(1011.700:329): avc: denied { ioctl } for pid=9086 comm="syz.0.2716" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1013.417325][ T8915] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1013.535309][ T8915] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1013.619491][ T8915] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1013.691503][ T8915] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1019.796461][ T8915] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1026.352940][ T30] audit: type=1400 audit(1025.860:330): avc: denied { read } for pid=9167 comm="syz.0.2740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1039.180300][ T8915] veth0_vlan: entered promiscuous mode [ 1039.470171][ T8915] veth1_vlan: entered promiscuous mode [ 1040.192553][ T8915] veth0_macvtap: entered promiscuous mode [ 1040.248801][ T8915] veth1_macvtap: entered promiscuous mode [ 1040.659019][ T7624] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1040.660180][ T7624] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1040.660530][ T7624] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1040.660840][ T7624] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1041.659375][ T30] audit: type=1400 audit(1041.160:331): avc: denied { mounton } for pid=8915 comm="syz-executor" path="/syzkaller.m0cw72/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1041.678836][ T30] audit: type=1400 audit(1041.170:332): avc: denied { mount } for pid=8915 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1041.747089][ T30] audit: type=1400 audit(1041.250:333): avc: denied { mount } for pid=8915 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1041.883576][ T30] audit: type=1400 audit(1041.390:334): avc: denied { mounton } for pid=8915 comm="syz-executor" path="/syzkaller.m0cw72/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1041.924841][ T30] audit: type=1400 audit(1041.420:335): avc: denied { mounton } for pid=8915 comm="syz-executor" path="/syzkaller.m0cw72/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=23369 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1042.124244][ T30] audit: type=1400 audit(1041.630:336): avc: denied { unmount } for pid=8915 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1042.148547][ T30] audit: type=1400 audit(1041.660:337): avc: denied { mounton } for pid=8915 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1042.174098][ T30] audit: type=1400 audit(1041.680:338): avc: denied { mount } for pid=8915 comm="syz-executor" name="/" dev="gadgetfs" ino=3840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1042.196072][ T30] audit: type=1400 audit(1041.700:339): avc: denied { mount } for pid=8915 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1042.255575][ T30] audit: type=1400 audit(1041.730:340): avc: denied { mounton } for pid=8915 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1044.452608][ T9282] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9282 comm=syz.0.2774 [ 1048.847695][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1048.848638][ T30] audit: type=1400 audit(1048.360:342): avc: denied { audit_write } for pid=9320 comm="syz.2.2794" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1052.760929][ T30] audit: type=1400 audit(1052.270:343): avc: denied { unlink } for pid=8915 comm="syz-executor" name="file1" dev="tmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1058.839348][ T30] audit: type=1400 audit(1058.350:344): avc: denied { read } for pid=9392 comm="syz.2.2828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1061.733110][ T9415] netlink: 'syz.0.2839': attribute type 29 has an invalid length. [ 1061.737562][ T9415] netlink: 'syz.0.2839': attribute type 29 has an invalid length. [ 1070.433792][ T30] audit: type=1400 audit(1069.940:345): avc: denied { setattr } for pid=9481 comm="syz.0.2871" name="nbd0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1071.296476][ T30] audit: type=1400 audit(1070.810:346): avc: denied { create } for pid=9491 comm="syz.2.2876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1071.325766][ T30] audit: type=1400 audit(1070.840:347): avc: denied { setopt } for pid=9491 comm="syz.2.2876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1071.328891][ T30] audit: type=1400 audit(1070.840:348): avc: denied { bind } for pid=9491 comm="syz.2.2876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1072.814158][ T9502] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9502 comm=syz.2.2881 [ 1076.663285][ T30] audit: type=1400 audit(1076.170:349): avc: denied { connect } for pid=9527 comm="syz.0.2893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1077.353055][ T30] audit: type=1400 audit(1076.860:350): avc: denied { setattr } for pid=8915 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1100.728397][ T30] audit: type=1400 audit(1100.240:351): avc: denied { getopt } for pid=9645 comm="syz.0.2953" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1123.103385][ T26] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1123.386963][ T26] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1123.685135][ T26] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1124.071340][ T26] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1127.739140][ T26] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1127.807872][ T26] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1127.869954][ T26] bond0 (unregistering): Released all slaves [ 1128.185093][ T26] hsr_slave_0: left promiscuous mode [ 1128.189683][ T26] hsr_slave_1: left promiscuous mode [ 1128.279468][ T26] veth1_macvtap: left promiscuous mode [ 1128.280850][ T26] veth0_macvtap: left promiscuous mode [ 1128.286353][ T26] veth1_vlan: left promiscuous mode [ 1128.289793][ T26] veth0_vlan: left promiscuous mode [ 1139.787823][ T9676] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1139.825126][ T9676] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1146.328348][ T9676] hsr_slave_0: entered promiscuous mode [ 1146.341341][ T9676] hsr_slave_1: entered promiscuous mode [ 1148.893524][ T9676] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1148.969560][ T9676] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1149.058300][ T9676] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1149.207412][ T9676] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1152.641419][ T9676] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1164.882673][ T9676] veth0_vlan: entered promiscuous mode [ 1164.977182][ T9676] veth1_vlan: entered promiscuous mode [ 1165.309828][ T9676] veth0_macvtap: entered promiscuous mode [ 1165.385301][ T9676] veth1_macvtap: entered promiscuous mode [ 1165.884275][ T26] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1165.916012][ T26] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1165.918636][ T26] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1165.921077][ T26] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1172.254690][ T30] audit: type=1400 audit(1171.760:352): avc: denied { create } for pid=9834 comm="syz.3.2980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1172.363505][ T30] audit: type=1400 audit(1171.860:353): avc: denied { write } for pid=9834 comm="syz.3.2980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1178.666389][ T30] audit: type=1400 audit(1178.180:354): avc: denied { create } for pid=9881 comm="syz.0.2999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1178.679405][ T30] audit: type=1400 audit(1178.190:355): avc: denied { ioctl } for pid=9881 comm="syz.0.2999" path="socket:[25441]" dev="sockfs" ino=25441 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1191.715672][ T9964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=9964 comm=syz.0.3037 [ 1192.068993][ T30] audit: type=1400 audit(1191.540:356): avc: denied { setopt } for pid=9965 comm="syz.3.3038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1193.234082][ T30] audit: type=1400 audit(1192.740:357): avc: denied { bind } for pid=9975 comm="syz.0.3043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1193.247440][ T30] audit: type=1400 audit(1192.760:358): avc: denied { setopt } for pid=9975 comm="syz.0.3043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1193.486550][ T30] audit: type=1400 audit(1193.000:359): avc: denied { create } for pid=9977 comm="syz.0.3044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1195.585445][ T30] audit: type=1400 audit(1195.090:360): avc: denied { read } for pid=9986 comm="syz.3.3048" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1195.600010][ T30] audit: type=1400 audit(1195.110:361): avc: denied { open } for pid=9986 comm="syz.3.3048" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1196.105005][ T30] audit: type=1400 audit(1195.600:362): avc: denied { getopt } for pid=9988 comm="syz.0.3049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1199.327820][ T30] audit: type=1400 audit(1198.830:363): avc: denied { bind } for pid=10008 comm="syz.0.3058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1199.328615][ T30] audit: type=1400 audit(1198.840:364): avc: denied { node_bind } for pid=10008 comm="syz.0.3058" saddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1202.714276][T10029] binder: 10027:10029 ioctl c0306201 0 returned -14 [ 1202.719517][T10029] binder: 10027:10029 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1202.723003][T10029] binder: 10029 RLIMIT_NICE not set [ 1202.738256][ T30] audit: type=1400 audit(1202.220:365): avc: denied { ioctl } for pid=10027 comm="syz.3.3068" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1205.891454][ T30] audit: type=1400 audit(1205.390:366): avc: denied { ioctl } for pid=10043 comm="syz.3.3076" path="/dev/dma_heap/system" dev="devtmpfs" ino=674 ioctlcmd=0xf000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1209.323362][ T30] audit: type=1400 audit(1208.830:367): avc: denied { write } for pid=10065 comm="syz.3.3087" name="arp" dev="proc" ino=4026532886 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1217.309311][ T30] audit: type=1400 audit(1216.820:368): avc: denied { write } for pid=10116 comm="syz.0.3112" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1218.624940][ T30] audit: type=1400 audit(1218.120:369): avc: denied { create } for pid=10124 comm="syz.3.3116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1218.663015][ T30] audit: type=1400 audit(1218.170:370): avc: denied { setopt } for pid=10124 comm="syz.3.3116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1218.752383][ T30] audit: type=1400 audit(1218.260:371): avc: denied { getopt } for pid=10124 comm="syz.3.3116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1220.809059][ T30] audit: type=1400 audit(1220.320:372): avc: denied { connect } for pid=10137 comm="syz.0.3123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1222.813899][ T30] audit: type=1400 audit(1222.320:373): avc: denied { create } for pid=10152 comm="syz.3.3130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1222.847899][ T30] audit: type=1400 audit(1222.360:374): avc: denied { getopt } for pid=10152 comm="syz.3.3130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1227.030064][ T30] audit: type=1400 audit(1226.540:375): avc: denied { write } for pid=10185 comm="syz.0.3146" name="udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1237.154256][ T30] audit: type=1400 audit(1236.670:376): avc: denied { read write } for pid=10260 comm="syz.0.3183" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1237.159778][ T30] audit: type=1400 audit(1236.670:377): avc: denied { open } for pid=10260 comm="syz.0.3183" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1237.543834][T10267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=10267 comm=syz.3.3185 [ 1247.494674][ T30] audit: type=1400 audit(1247.010:378): avc: denied { ioctl } for pid=10353 comm="syz.0.3228" path="socket:[27224]" dev="sockfs" ino=27224 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1248.116802][ T30] audit: type=1400 audit(1247.620:379): avc: denied { read } for pid=10360 comm="syz.3.3231" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1248.125803][ T30] audit: type=1400 audit(1247.640:380): avc: denied { open } for pid=10360 comm="syz.3.3231" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1248.173053][ T30] audit: type=1400 audit(1247.680:381): avc: denied { ioctl } for pid=10360 comm="syz.3.3231" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1248.274633][ T30] audit: type=1400 audit(1247.790:382): avc: denied { ioctl } for pid=10361 comm="syz.0.3232" path="socket:[27722]" dev="sockfs" ino=27722 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1253.036453][ T30] audit: type=1400 audit(1252.550:383): avc: denied { remount } for pid=10389 comm="syz.3.3245" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1260.868673][ T30] audit: type=1400 audit(1260.360:384): avc: denied { read } for pid=10446 comm="syz.3.3271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1271.917440][ T30] audit: type=1400 audit(1271.410:385): avc: denied { write } for pid=10521 comm="syz.3.3308" path="socket:[27991]" dev="sockfs" ino=27991 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1279.879038][ T30] audit: type=1400 audit(1279.370:386): avc: denied { mount } for pid=10569 comm="syz.0.3331" name="/" dev="autofs" ino=28068 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1279.945802][ T30] audit: type=1400 audit(1279.460:387): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1288.845427][T10626] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3358'. [ 1289.883051][ T30] audit: type=1400 audit(1289.390:388): avc: denied { ioctl } for pid=10628 comm="syz.3.3359" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=28178 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1293.824775][T10660] SELinux: syz.0.3374 (10660) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1295.338402][ T30] audit: type=1400 audit(1294.850:389): avc: denied { write } for pid=10667 comm="syz.3.3378" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1298.598158][ T30] audit: type=1400 audit(1298.110:390): avc: denied { read } for pid=10683 comm="syz.3.3386" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1298.608469][ T30] audit: type=1400 audit(1298.120:391): avc: denied { open } for pid=10683 comm="syz.3.3386" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1306.540616][ T30] audit: type=1400 audit(1306.050:392): avc: denied { ioctl } for pid=10729 comm="syz.0.3408" path="/dev/ttyq4" dev="devtmpfs" ino=371 ioctlcmd=0x5412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1311.729652][ T30] audit: type=1400 audit(1311.240:393): avc: denied { ioctl } for pid=10766 comm="syz.3.3426" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x9203 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1312.653275][ T30] audit: type=1400 audit(1312.160:394): avc: denied { setattr } for pid=10773 comm="syz.3.3429" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1315.564231][ T30] audit: type=1400 audit(1315.060:395): avc: denied { read write } for pid=10791 comm="syz.3.3438" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1315.579102][ T30] audit: type=1400 audit(1315.090:396): avc: denied { open } for pid=10791 comm="syz.3.3438" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1316.003038][ T30] audit: type=1400 audit(1315.510:397): avc: denied { unmount } for pid=9676 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1323.015132][ T30] audit: type=1400 audit(1322.530:398): avc: denied { write } for pid=10839 comm="syz.3.3462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1329.980036][T10888] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10888 comm=syz.0.3486 [ 1337.852890][ T30] audit: type=1400 audit(1337.360:399): avc: denied { append } for pid=10951 comm="syz.3.3517" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1337.968613][T10953] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1339.240466][ T30] audit: type=1400 audit(1338.750:400): avc: denied { bind } for pid=10963 comm="syz.3.3523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1348.814808][ T30] audit: type=1400 audit(1348.310:401): avc: denied { remount } for pid=11034 comm="syz.0.3559" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1348.965019][ T30] audit: type=1400 audit(1348.470:402): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1349.264975][T11039] ======================================================= [ 1349.264975][T11039] WARNING: The mand mount option has been deprecated and [ 1349.264975][T11039] and is ignored by this kernel. Remove the mand [ 1349.264975][T11039] option from the mount to silence this warning. [ 1349.264975][T11039] ======================================================= [ 1350.003023][ T30] audit: type=1400 audit(1349.510:403): avc: denied { checkpoint_restore } for pid=11041 comm="syz.3.3562" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1351.498353][ T30] audit: type=1400 audit(1351.010:404): avc: denied { read write } for pid=11055 comm="syz.3.3569" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1351.500349][ T30] audit: type=1400 audit(1351.010:405): avc: denied { open } for pid=11055 comm="syz.3.3569" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1360.697780][T11127] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=11127 comm=syz.0.3602 [ 1375.260798][ T30] audit: type=1400 audit(1374.770:406): avc: denied { mount } for pid=11251 comm="syz.0.3665" name="/" dev="pstore" ino=2261 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1384.633980][ T30] audit: type=1400 audit(1384.140:407): avc: denied { create } for pid=11331 comm="syz.0.3701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1384.671020][ T30] audit: type=1400 audit(1384.180:408): avc: denied { write } for pid=11331 comm="syz.0.3701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1397.118371][T11412] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11412 comm=syz.0.3740 [ 1400.810258][ T30] audit: type=1400 audit(1400.320:409): avc: denied { ioctl } for pid=11442 comm="syz.3.3756" path="socket:[30942]" dev="sockfs" ino=30942 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1407.083691][ T30] audit: type=1400 audit(1406.590:410): avc: denied { getopt } for pid=11484 comm="syz.0.3777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1410.144720][T11505] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 1410.144720][T11505] The task syz.0.3786 (11505) triggered the difference, watch for misbehavior. [ 1411.856619][ T30] audit: type=1400 audit(1411.370:411): avc: denied { read } for pid=11512 comm="syz.3.3790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1417.053839][ T30] audit: type=1400 audit(1416.560:412): avc: denied { create } for pid=11546 comm="syz.3.3807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1417.125987][ T30] audit: type=1400 audit(1416.640:413): avc: denied { setopt } for pid=11546 comm="syz.3.3807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1417.688544][T11550] SELinux: syz.3.3808 (11550) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1441.553238][ T30] audit: type=1400 audit(1441.060:414): avc: denied { accept } for pid=11693 comm="syz.3.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_selinux_socket permissive=1 [ 1449.830352][T11749] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=11749 comm=syz.3.3908 [ 1467.217850][ T30] audit: type=1400 audit(1466.730:415): avc: denied { validate_trans } for pid=11868 comm="syz.3.3962" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1471.575739][ T30] audit: type=1400 audit(1471.080:416): avc: denied { write } for pid=11899 comm="syz.3.3978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1476.624447][T11557] udevd[11557]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 1476.790713][T11938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11938 comm=syz.0.3996 [ 1477.045843][ T30] audit: type=1400 audit(1476.560:417): avc: denied { create } for pid=11939 comm="syz.3.3997" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1477.067608][ T30] audit: type=1400 audit(1476.580:418): avc: denied { write } for pid=11939 comm="syz.3.3997" name="file0" dev="tmpfs" ino=2685 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1477.084988][ T30] audit: type=1400 audit(1476.580:419): avc: denied { open } for pid=11939 comm="syz.3.3997" path="/520/file0" dev="tmpfs" ino=2685 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1477.112987][ T30] audit: type=1400 audit(1476.620:420): avc: denied { ioctl } for pid=11939 comm="syz.3.3997" path="/520/file0" dev="tmpfs" ino=2685 ioctlcmd=0x1260 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1477.327659][ T30] audit: type=1400 audit(1476.830:421): avc: denied { unlink } for pid=9676 comm="syz-executor" name="file0" dev="tmpfs" ino=2685 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1521.514090][ T30] audit: type=1400 audit(1521.020:422): avc: denied { read } for pid=12248 comm="syz.3.4147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1526.426408][T12289] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12289 comm=syz.0.4166 [ 1535.327565][ T30] audit: type=1400 audit(1534.840:423): avc: denied { create } for pid=12360 comm="syz.3.4201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1535.372345][ T30] audit: type=1400 audit(1534.880:424): avc: denied { write } for pid=12360 comm="syz.3.4201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1535.387458][ T30] audit: type=1400 audit(1534.900:425): avc: denied { read } for pid=12360 comm="syz.3.4201" path="socket:[34311]" dev="sockfs" ino=34311 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1545.754406][ T30] audit: type=1400 audit(1545.260:426): avc: denied { read } for pid=12425 comm="syz.3.4232" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1550.033024][ T30] audit: type=1400 audit(1549.540:427): avc: denied { bind } for pid=12456 comm="syz.3.4247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1568.223218][ T30] audit: type=1400 audit(1567.730:428): avc: denied { create } for pid=12575 comm="syz.0.4305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1568.289429][ T30] audit: type=1400 audit(1567.800:429): avc: denied { ioctl } for pid=12575 comm="syz.0.4305" path="socket:[33782]" dev="sockfs" ino=33782 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1586.301216][ T30] audit: type=1400 audit(1585.810:430): avc: denied { read } for pid=12703 comm="syz.0.4367" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1586.302233][ T30] audit: type=1400 audit(1585.810:431): avc: denied { open } for pid=12703 comm="syz.0.4367" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1586.336321][ T30] audit: type=1400 audit(1585.840:432): avc: denied { block_suspend } for pid=12703 comm="syz.0.4367" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1597.850323][ T30] audit: type=1400 audit(1597.360:433): avc: denied { read } for pid=12772 comm="syz.3.4400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1614.967074][ T30] audit: type=1400 audit(1614.480:434): avc: denied { lock } for pid=12892 comm="syz.3.4459" path="socket:[36253]" dev="sockfs" ino=36253 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1642.695020][ T969] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1642.702450][ T969] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1642.702958][ T969] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1642.703165][ T969] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1642.703365][ T969] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1642.703550][ T969] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1642.703733][ T969] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1642.703914][ T969] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1642.704096][ T969] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1642.704342][ T969] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1642.783889][ T969] hid-generic 0003:0004:0000.0002: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 1645.460759][T13079] fido_id[13079]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1658.259483][T13186] lo speed is unknown, defaulting to 1000 [ 1658.278236][T13186] lo speed is unknown, defaulting to 1000 [ 1658.327410][T13186] lo speed is unknown, defaulting to 1000 [ 1658.451605][T13186] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 1658.590953][T13186] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 1659.006472][T13186] lo speed is unknown, defaulting to 1000 [ 1659.138156][T13186] lo speed is unknown, defaulting to 1000 [ 1660.694445][ T30] audit: type=1400 audit(1660.190:435): avc: denied { sqpoll } for pid=13201 comm="syz.3.4608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1661.814339][T13210] SELinux: Context system_u:object_r:dhcp_etc_t:s0 is not valid (left unmapped). [ 1664.372739][ T30] audit: type=1400 audit(1663.880:436): avc: denied { getopt } for pid=13228 comm="syz.0.4620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1665.034333][ T30] audit: type=1400 audit(1664.540:437): avc: denied { read } for pid=13230 comm="syz.3.4621" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1665.037749][ T30] audit: type=1400 audit(1664.540:438): avc: denied { open } for pid=13230 comm="syz.3.4621" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1689.455386][ T30] audit: type=1400 audit(1688.970:439): avc: denied { bind } for pid=13405 comm="syz.3.4705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1691.445552][T13422] netlink: 'syz.0.4713': attribute type 13 has an invalid length. [ 1699.060432][ T907] lo speed is unknown, defaulting to 1000 [ 1699.076890][ T907] syz0: Port: 1 Link DOWN [ 1699.078945][ T1021] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1699.079460][ T1021] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1699.079714][ T1021] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1699.079998][ T1021] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1720.711106][ T30] audit: type=1400 audit(1720.220:440): avc: denied { getopt } for pid=13622 comm="syz.0.4811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1722.508524][ T30] audit: type=1400 audit(1722.020:441): avc: denied { mount } for pid=13634 comm="syz.0.4817" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1722.531377][ T30] audit: type=1400 audit(1722.040:442): avc: denied { remount } for pid=13634 comm="syz.0.4817" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1722.725821][ T30] audit: type=1400 audit(1722.230:443): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1727.089838][T13681] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4840'. [ 1729.506220][T13693] block device autoloading is deprecated and will be removed. [ 1739.676641][ T30] audit: type=1400 audit(1739.190:444): avc: denied { setopt } for pid=13753 comm="syz.3.4875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1740.045251][T13757] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13757 comm=syz.3.4876 [ 1744.462262][ T30] audit: type=1400 audit(1743.970:445): avc: denied { ioctl } for pid=13785 comm="syz.3.4890" path="socket:[38772]" dev="sockfs" ino=38772 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1744.753186][T13788] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13788 comm=syz.0.4891 [ 1778.170026][ T30] audit: type=1400 audit(1777.680:446): avc: denied { read } for pid=13983 comm="syz.3.4988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1778.690801][ T30] audit: type=1400 audit(1778.200:447): avc: denied { write } for pid=13983 comm="syz.3.4988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1784.414383][T14016] ucma_write: process 5208 (syz.0.5002) changed security contexts after opening file descriptor, this is not allowed. [ 1794.454743][T14065] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14065 comm=syz.0.5026 [ 1801.945560][T14104] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14104 comm=syz.0.5044 [ 1805.764697][T14130] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14130 comm=syz.3.5058 [ 1827.566782][ T30] audit: type=1400 audit(1827.080:448): avc: denied { bind } for pid=14231 comm="syz.0.5107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1827.603844][ T30] audit: type=1400 audit(1827.110:449): avc: denied { connect } for pid=14231 comm="syz.0.5107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1834.427297][ T30] audit: type=1400 audit(1833.940:450): avc: denied { name_bind } for pid=14271 comm="syz.3.5128" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1843.007073][ T30] audit: type=1400 audit(1842.510:451): avc: denied { ioctl } for pid=14324 comm="syz.3.5155" path="socket:[40767]" dev="sockfs" ino=40767 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1848.310582][T14357] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=14357 comm=syz.0.5170 [ 1850.812842][ T30] audit: type=1400 audit(1850.320:452): avc: denied { execute } for pid=14371 comm="syz.0.5177" name="file1" dev="tmpfs" ino=13484 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1855.378523][ T30] audit: type=1400 audit(1854.890:453): avc: denied { ioctl } for pid=14397 comm="syz.0.5189" path="socket:[40889]" dev="sockfs" ino=40889 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1864.024196][T14451] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=14451 comm=syz.3.5214 [ 1890.208167][T14582] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14582 comm=syz.0.5276 [ 1898.045676][T14632] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14632 comm=syz.3.5303 [ 1901.213748][ T30] audit: type=1400 audit(1900.730:454): avc: denied { setattr } for pid=14650 comm="syz.0.5311" name="CAN_J1939" dev="sockfs" ino=41309 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1903.404400][ T30] audit: type=1400 audit(1902.910:455): avc: denied { setopt } for pid=14667 comm="syz.0.5319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1905.025736][ T30] audit: type=1400 audit(1904.540:456): avc: denied { connect } for pid=14681 comm="syz.3.5327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1909.914506][ T30] audit: type=1400 audit(1909.420:457): avc: denied { shutdown } for pid=14708 comm="syz.3.5341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1913.915256][T14732] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=14732 comm=syz.3.5349 [ 1922.835319][T14784] loop7: detected capacity change from 0 to 7 [ 1945.071495][T14856] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5408'. [ 1945.986579][ T30] audit: type=1400 audit(1945.490:458): avc: denied { write } for pid=14860 comm="syz.3.5412" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1948.351491][T14880] usb usb1: usbfs: process 14880 (syz.3.5421) did not claim interface 0 before use [ 1955.085831][T14921] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=14921 comm=syz.3.5442 [ 1969.616111][ T30] audit: type=1400 audit(1969.130:459): avc: denied { create } for pid=15002 comm="syz.3.5482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1969.651514][ T30] audit: type=1400 audit(1969.160:460): avc: denied { setopt } for pid=15002 comm="syz.3.5482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1973.451504][ T30] audit: type=1400 audit(1972.960:461): avc: denied { accept } for pid=15037 comm="syz.0.5500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1977.675567][ T30] audit: type=1400 audit(1977.180:462): avc: denied { create } for pid=15062 comm="syz.3.5512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1977.774265][ T30] audit: type=1400 audit(1977.280:463): avc: denied { write } for pid=15062 comm="syz.3.5512" path="socket:[41968]" dev="sockfs" ino=41968 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1993.076434][ T30] audit: type=1400 audit(1992.590:464): avc: denied { ioctl } for pid=15162 comm="syz.0.5561" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2000.817418][ T30] audit: type=1400 audit(2000.330:465): avc: denied { map } for pid=15204 comm="syz.3.5582" path="socket:[44213]" dev="sockfs" ino=44213 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 2015.419443][ T30] audit: type=1400 audit(2014.930:466): avc: denied { write } for pid=15291 comm="syz.0.5625" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2037.904735][T15426] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15426 comm=syz.3.5689 [ 2050.406088][ T30] audit: type=1400 audit(2049.920:467): avc: denied { execute } for pid=15498 comm="syz.0.5725" path=2F6D656D66643A25202864656C6574656429 dev="hugetlbfs" ino=44706 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 2054.977254][T15521] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=15521 comm=syz.3.5735 [ 2055.354510][ T30] audit: type=1400 audit(2054.860:468): avc: denied { setattr } for pid=15522 comm="syz.0.5736" name="fd" dev="proc" ino=44738 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2057.576013][T15536] block nbd0: shutting down sockets [ 2095.580066][ T30] audit: type=1400 audit(2095.090:469): avc: denied { write } for pid=15748 comm="syz.3.5846" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2100.122700][ T30] audit: type=1400 audit(2099.630:470): avc: denied { write } for pid=15776 comm="syz.3.5859" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2100.130631][ T30] audit: type=1400 audit(2099.640:471): avc: denied { open } for pid=15776 comm="syz.3.5859" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2100.145841][T15777] random: crng reseeded on system resumption [ 2100.319848][ T30] audit: type=1400 audit(2099.830:472): avc: denied { ioctl } for pid=15776 comm="syz.3.5859" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3314 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2133.297318][ T30] audit: type=1400 audit(2132.790:473): avc: denied { mount } for pid=15967 comm="syz.0.5953" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2133.409818][ T30] audit: type=1400 audit(2132.900:474): avc: denied { remount } for pid=15967 comm="syz.0.5953" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2133.565660][ T30] audit: type=1400 audit(2133.070:475): avc: denied { unmount } for pid=3322 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2147.726595][T16083] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16083 comm=syz.0.6010 [ 2147.786072][T16083] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2147.794297][ T9366] lo speed is unknown, defaulting to 1000 [ 2147.795051][ T9366] syz0: Port: 1 Link ACTIVE [ 2156.730190][ T30] audit: type=1400 audit(2156.240:476): avc: denied { ioctl } for pid=16133 comm="syz.0.6035" path="socket:[46772]" dev="sockfs" ino=46772 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2157.459598][ T30] audit: type=1400 audit(2156.970:477): avc: denied { getopt } for pid=16138 comm="syz.3.6038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2158.373828][ T30] audit: type=1400 audit(2157.870:478): avc: denied { ioctl } for pid=16141 comm="syz.0.6039" path="socket:[45866]" dev="sockfs" ino=45866 ioctlcmd=0x89f5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2159.060582][ T30] audit: type=1400 audit(2158.570:479): avc: denied { connect } for pid=16147 comm="syz.3.6043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2171.361179][T16228] ptrace attach of "/syz-executor exec"[16229] was attempted by "/syz-executor exec"[16228] [ 2188.936790][T16326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16326 comm=syz.3.6128 [ 2205.028737][T16431] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2205.046743][T16431] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2216.898039][ T30] audit: type=1400 audit(2216.410:480): avc: denied { setopt } for pid=16500 comm="syz.0.6213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2245.331496][T16674] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2245.339254][T16674] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2303.644177][T17009] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17009 comm=syz.0.6455 [ 2309.593529][ T30] audit: type=1400 audit(2309.090:481): avc: denied { write } for pid=17048 comm="syz.3.6476" path="socket:[50312]" dev="sockfs" ino=50312 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2317.230320][ T30] audit: type=1400 audit(2316.730:482): avc: denied { write } for pid=17099 comm="syz.3.6501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2323.294279][ T30] audit: type=1400 audit(2322.800:483): avc: denied { bind } for pid=17135 comm="syz.0.6519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2324.565726][T17144] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17144 comm=syz.3.6523 [ 2353.648037][ T30] audit: type=1400 audit(2353.160:484): avc: denied { write } for pid=17315 comm="syz.0.6607" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2353.739422][ T30] audit: type=1400 audit(2353.250:485): avc: denied { ioctl } for pid=17315 comm="syz.0.6607" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9376 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2354.327102][ T30] audit: type=1400 audit(2353.830:486): avc: denied { name_bind } for pid=17320 comm="syz.3.6610" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 2354.383229][ T30] audit: type=1400 audit(2353.890:487): avc: denied { getopt } for pid=17319 comm="syz.0.6609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2380.500368][ T30] audit: type=1400 audit(2380.010:488): avc: denied { read } for pid=17492 comm="syz.3.6696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2395.869251][T17583] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=17583 comm=syz.0.6738 [ 2398.996850][ T30] audit: type=1400 audit(2398.510:489): avc: denied { execute_no_trans } for pid=17606 comm="syz.0.6751" path="/3249/file0" dev="tmpfs" ino=16700 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2399.387938][ T30] audit: type=1400 audit(2398.900:490): avc: denied { watch watch_reads } for pid=17611 comm="syz.0.6754" path="/3250" dev="tmpfs" ino=16701 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2408.299790][ T30] audit: type=1400 audit(2407.810:491): avc: denied { remount } for pid=17653 comm="syz.3.6774" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2408.821436][T17658] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17658 comm=syz.3.6775 [ 2427.765823][ T30] audit: type=1400 audit(2427.270:492): avc: denied { lock } for pid=17765 comm="syz.3.6828" path="socket:[52608]" dev="sockfs" ino=52608 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 2443.311070][ T30] audit: type=1400 audit(2442.820:493): avc: denied { write } for pid=17835 comm="syz.0.6861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2443.930275][ T30] audit: type=1400 audit(2443.440:494): avc: denied { watch watch_reads } for pid=17838 comm="syz.3.6863" path="pipe:[24963]" dev="pipefs" ino=24963 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 2445.230873][ T30] audit: type=1400 audit(2444.740:495): avc: denied { ioctl } for pid=17846 comm="syz.3.6867" path="cgroup:[4026532780]" dev="nsfs" ino=4026532780 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2456.167875][T17908] cgroup: Unknown subsys name 'cpuset' [ 2469.850931][T17990] nbd0: detected capacity change from 0 to 127 [ 2469.877091][T17992] block nbd0: Receive control failed (result -32) [ 2469.877131][ T49] block nbd0: Receive control failed (result -32) [ 2469.977810][T12713] [ 2469.980214][T12713] ====================================================== [ 2469.980619][T12713] WARNING: possible circular locking dependency detected [ 2469.981486][T12713] syzkaller #0 Not tainted [ 2469.981996][T12713] ------------------------------------------------------ [ 2469.982400][T12713] udevd/12713 is trying to acquire lock: [ 2469.982850][T12713] ffff000017387c70 (&nsock->tx_lock){+.+.}-{4:4}, at: nbd_queue_rq+0x2cc/0xb54 [ 2469.986741][T12713] [ 2469.986741][T12713] but task is already holding lock: [ 2469.987303][T12713] ffff0000284451f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 2469.988293][T12713] [ 2469.988293][T12713] which lock already depends on the new lock. [ 2469.988293][T12713] [ 2469.989028][T12713] [ 2469.989028][T12713] the existing dependency chain (in reverse order) is: [ 2469.989629][T12713] [ 2469.989629][T12713] -> #6 (&cmd->lock){+.+.}-{4:4}: [ 2469.990403][T12713] __mutex_lock+0x144/0xffc [ 2469.990804][T12713] mutex_lock_nested+0x24/0x30 [ 2469.991144][T12713] nbd_queue_rq+0xa8/0xb54 [ 2469.991490][T12713] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 2469.991906][T12713] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 2469.992492][T12713] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 2469.992881][T12713] blk_mq_run_hw_queue+0x1e4/0x500 [ 2469.993252][T12713] blk_mq_dispatch_list+0x348/0xa50 [ 2469.993601][T12713] blk_mq_flush_plug_list+0xe8/0x508 [ 2469.993936][T12713] __blk_flush_plug+0x208/0x3b8 [ 2469.994357][T12713] __submit_bio+0x3a4/0x4ac [ 2469.994710][T12713] submit_bio_noacct_nocheck+0x59c/0xa8c [ 2469.995091][T12713] submit_bio_noacct+0x858/0x18f8 [ 2469.995497][T12713] submit_bio+0x32c/0x5f0 [ 2469.995883][T12713] submit_bh_wbc+0x310/0x480 [ 2469.996285][T12713] block_read_full_folio+0x26c/0x640 [ 2469.996630][T12713] blkdev_read_folio+0x1c/0x28 [ 2469.996999][T12713] filemap_read_folio+0xac/0x1fc [ 2469.997377][T12713] do_read_cache_folio+0x1c4/0x480 [ 2469.997736][T12713] read_cache_folio+0x44/0x6c [ 2469.998099][T12713] read_part_sector+0xac/0x5f4 [ 2469.998435][T12713] read_lba+0x15c/0x2ec [ 2469.998773][T12713] efi_partition+0x1dc/0x2154 [ 2469.999200][T12713] bdev_disk_changed+0x508/0xf0c [ 2469.999592][T12713] blkdev_get_whole+0x144/0x1e4 [ 2470.000067][T12713] bdev_open+0x1dc/0xa84 [ 2470.000544][T12713] blkdev_open+0x1d4/0x324 [ 2470.000939][T12713] do_dentry_open+0x6a4/0x103c [ 2470.001330][T12713] vfs_open+0x5c/0x2fc [ 2470.001864][T12713] path_openat+0x1490/0x24b4 [ 2470.002198][T12713] do_filp_open+0x184/0x360 [ 2470.002607][T12713] do_sys_openat2+0xe0/0x160 [ 2470.002935][T12713] __arm64_sys_openat+0x12c/0x1bc [ 2470.003318][T12713] invoke_syscall+0x6c/0x258 [ 2470.003686][T12713] el0_svc_common.constprop.0+0xac/0x230 [ 2470.004103][T12713] do_el0_svc+0x40/0x58 [ 2470.004459][T12713] el0_svc+0x50/0x1a0 [ 2470.004771][T12713] el0t_64_sync_handler+0xa0/0xe4 [ 2470.005148][T12713] el0t_64_sync+0x198/0x19c [ 2470.005638][T12713] [ 2470.005638][T12713] -> #5 (set->srcu){.+.+}-{0:0}: [ 2470.006493][T12713] __synchronize_srcu+0xa8/0x268 [ 2470.006848][T12713] synchronize_srcu+0x12c/0x370 [ 2470.007199][T12713] blk_mq_quiesce_queue+0xf4/0x15c [ 2470.007601][T12713] elevator_switch+0x11c/0x414 [ 2470.007929][T12713] elevator_change+0x294/0x424 [ 2470.008306][T12713] elevator_set_default+0x22c/0x2ac [ 2470.008652][T12713] blk_register_queue+0x278/0x3ac [ 2470.009002][T12713] __add_disk+0x518/0xb80 [ 2470.009333][T12713] add_disk_fwnode+0x114/0x4c0 [ 2470.009662][T12713] device_add_disk+0x14/0x20 [ 2470.010007][T12713] nbd_dev_add+0x5f0/0x9c0 [ 2470.010337][T12713] nbd_init+0xd4/0x1a8 [ 2470.010660][T12713] do_one_initcall+0x130/0x7f0 [ 2470.011000][T12713] kernel_init_freeable+0x48c/0x70c [ 2470.011633][T12713] kernel_init+0x24/0x1dc [ 2470.011957][T12713] ret_from_fork+0x10/0x20 [ 2470.012456][T12713] [ 2470.012456][T12713] -> #4 (&q->elevator_lock){+.+.}-{4:4}: [ 2470.013348][T12713] __mutex_lock+0x144/0xffc [ 2470.013756][T12713] mutex_lock_nested+0x24/0x30 [ 2470.014082][T12713] elevator_change+0x130/0x424 [ 2470.014468][T12713] elevator_set_none+0x90/0xe4 [ 2470.014810][T12713] __blk_mq_update_nr_hw_queues+0x3b4/0xd38 [ 2470.015331][T12713] blk_mq_update_nr_hw_queues+0x44/0x68 [ 2470.015761][T12713] nbd_start_device+0x128/0xa38 [ 2470.016077][T12713] nbd_genl_connect+0xcb4/0x14c4 [ 2470.016465][T12713] genl_family_rcv_msg_doit+0x1b8/0x280 [ 2470.016823][T12713] genl_rcv_msg+0x3ec/0x5bc [ 2470.017128][T12713] netlink_rcv_skb+0x19c/0x338 [ 2470.017461][T12713] genl_rcv+0x38/0x50 [ 2470.017769][T12713] netlink_unicast+0x424/0x700 [ 2470.018092][T12713] netlink_sendmsg+0x644/0xa54 [ 2470.018429][T12713] __sock_sendmsg+0xc8/0x168 [ 2470.018821][T12713] ____sys_sendmsg+0x500/0x764 [ 2470.019194][T12713] ___sys_sendmsg+0x11c/0x19c [ 2470.019710][T12713] __sys_sendmsg+0x114/0x19c [ 2470.020051][T12713] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 2470.020498][T12713] invoke_syscall+0x6c/0x258 [ 2470.020838][T12713] el0_svc_common.constprop.0+0xac/0x230 [ 2470.021249][T12713] do_el0_svc_compat+0x40/0x68 [ 2470.021744][T12713] el0_svc_compat+0x4c/0x184 [ 2470.022070][T12713] el0t_32_sync_handler+0x88/0xac [ 2470.022470][T12713] el0t_32_sync+0x19c/0x1a0 [ 2470.022792][T12713] [ 2470.022792][T12713] -> #3 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 2470.023600][T12713] blk_alloc_queue+0x538/0x644 [ 2470.024032][T12713] blk_mq_alloc_queue+0x144/0x220 [ 2470.024445][T12713] __blk_mq_alloc_disk+0x20/0x1a4 [ 2470.025089][T12713] nbd_dev_add+0x3c0/0x9c0 [ 2470.025699][T12713] nbd_init+0xd4/0x1a8 [ 2470.026052][T12713] do_one_initcall+0x130/0x7f0 [ 2470.026395][T12713] kernel_init_freeable+0x48c/0x70c [ 2470.026845][T12713] kernel_init+0x24/0x1dc [ 2470.027177][T12713] ret_from_fork+0x10/0x20 [ 2470.027638][T12713] [ 2470.027638][T12713] -> #2 (fs_reclaim){+.+.}-{0:0}: [ 2470.028367][T12713] fs_reclaim_acquire+0x138/0x160 [ 2470.028714][T12713] kmem_cache_alloc_node_noprof+0x64/0x3b8 [ 2470.029084][T12713] __alloc_skb+0x208/0x2f0 [ 2470.029411][T12713] tcp_stream_alloc_skb+0x2c/0x450 [ 2470.029752][T12713] tcp_sendmsg_locked+0xf34/0x39e8 [ 2470.030084][T12713] tcp_sendmsg+0x38/0x60 [ 2470.030397][T12713] inet_sendmsg+0x90/0xd4 [ 2470.030719][T12713] __sock_sendmsg+0xc8/0x168 [ 2470.031113][T12713] sock_write_iter+0x1cc/0x300 [ 2470.031445][T12713] vfs_write+0x7bc/0xb88 [ 2470.031886][T12713] ksys_write+0x18c/0x1d8 [ 2470.032274][T12713] __arm64_sys_write+0x6c/0x9c [ 2470.032707][T12713] invoke_syscall+0x6c/0x258 [ 2470.033082][T12713] el0_svc_common.constprop.0+0xac/0x230 [ 2470.033434][T12713] do_el0_svc+0x40/0x58 [ 2470.033735][T12713] el0_svc+0x50/0x1a0 [ 2470.034030][T12713] el0t_64_sync_handler+0xa0/0xe4 [ 2470.034397][T12713] el0t_64_sync+0x198/0x19c [ 2470.034743][T12713] [ 2470.034743][T12713] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 2470.035446][T12713] lock_sock_nested+0x38/0xe8 [ 2470.035841][T12713] inet_shutdown+0x50/0x348 [ 2470.036193][T12713] kernel_sock_shutdown+0x54/0x84 [ 2470.036556][T12713] nbd_mark_nsock_dead+0x100/0x534 [ 2470.036901][T12713] sock_shutdown+0x134/0x234 [ 2470.037420][T12713] nbd_config_put+0x154/0x5b0 [ 2470.038041][T12713] nbd_release+0x7c/0x128 [ 2470.038418][T12713] blkdev_put_whole+0x98/0xf0 [ 2470.038745][T12713] bdev_release+0x2a4/0x510 [ 2470.039069][T12713] blkdev_release+0x14/0x24 [ 2470.039400][T12713] __fput+0x2c8/0x954 [ 2470.039696][T12713] ____fput+0x14/0x20 [ 2470.039989][T12713] task_work_run+0x128/0x210 [ 2470.040362][T12713] do_notify_resume+0x1d8/0x260 [ 2470.040754][T12713] el0_svc_compat+0x104/0x184 [ 2470.041080][T12713] el0t_32_sync_handler+0x88/0xac [ 2470.041408][T12713] el0t_32_sync+0x19c/0x1a0 [ 2470.042016][T12713] [ 2470.042016][T12713] -> #0 (&nsock->tx_lock){+.+.}-{4:4}: [ 2470.042753][T12713] __lock_acquire+0x1638/0x2380 [ 2470.043093][T12713] lock_acquire+0x310/0x38c [ 2470.043425][T12713] __mutex_lock+0x144/0xffc [ 2470.043738][T12713] mutex_lock_nested+0x24/0x30 [ 2470.044064][T12713] nbd_queue_rq+0x2cc/0xb54 [ 2470.044433][T12713] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 2470.044789][T12713] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 2470.045173][T12713] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 2470.045538][T12713] blk_mq_run_hw_queue+0x1e4/0x500 [ 2470.045885][T12713] blk_mq_dispatch_list+0x348/0xa50 [ 2470.046262][T12713] blk_mq_flush_plug_list+0xe8/0x508 [ 2470.046670][T12713] __blk_flush_plug+0x208/0x3b8 [ 2470.047060][T12713] __submit_bio+0x3a4/0x4ac [ 2470.047426][T12713] submit_bio_noacct_nocheck+0x59c/0xa8c [ 2470.047804][T12713] submit_bio_noacct+0x858/0x18f8 [ 2470.048175][T12713] submit_bio+0x32c/0x5f0 [ 2470.048511][T12713] submit_bh_wbc+0x310/0x480 [ 2470.048833][T12713] block_read_full_folio+0x26c/0x640 [ 2470.049182][T12713] blkdev_read_folio+0x1c/0x28 [ 2470.049573][T12713] filemap_read_folio+0xac/0x1fc [ 2470.049936][T12713] do_read_cache_folio+0x1c4/0x480 [ 2470.050258][T12713] read_cache_folio+0x44/0x6c [ 2470.050554][T12713] read_part_sector+0xac/0x5f4 [ 2470.050863][T12713] read_lba+0x15c/0x2ec [ 2470.051177][T12713] efi_partition+0x1dc/0x2154 [ 2470.051500][T12713] bdev_disk_changed+0x508/0xf0c [ 2470.051990][T12713] blkdev_get_whole+0x144/0x1e4 [ 2470.052551][T12713] bdev_open+0x1dc/0xa84 [ 2470.052896][T12713] blkdev_open+0x1d4/0x324 [ 2470.053244][T12713] do_dentry_open+0x6a4/0x103c [ 2470.053599][T12713] vfs_open+0x5c/0x2fc [ 2470.053919][T12713] path_openat+0x1490/0x24b4 [ 2470.054277][T12713] do_filp_open+0x184/0x360 [ 2470.054617][T12713] do_sys_openat2+0xe0/0x160 [ 2470.055003][T12713] __arm64_sys_openat+0x12c/0x1bc [ 2470.055351][T12713] invoke_syscall+0x6c/0x258 [ 2470.055675][T12713] el0_svc_common.constprop.0+0xac/0x230 [ 2470.056034][T12713] do_el0_svc+0x40/0x58 [ 2470.056390][T12713] el0_svc+0x50/0x1a0 [ 2470.056702][T12713] el0t_64_sync_handler+0xa0/0xe4 [ 2470.057101][T12713] el0t_64_sync+0x198/0x19c [ 2470.057526][T12713] [ 2470.057526][T12713] other info that might help us debug this: [ 2470.057526][T12713] [ 2470.058357][T12713] Chain exists of: [ 2470.058357][T12713] &nsock->tx_lock --> set->srcu --> &cmd->lock [ 2470.058357][T12713] [ 2470.059434][T12713] Possible unsafe locking scenario: [ 2470.059434][T12713] [ 2470.059962][T12713] CPU0 CPU1 [ 2470.060340][T12713] ---- ---- [ 2470.060668][T12713] lock(&cmd->lock); [ 2470.061105][T12713] lock(set->srcu); [ 2470.061783][T12713] lock(&cmd->lock); [ 2470.062509][T12713] lock(&nsock->tx_lock); [ 2470.062952][T12713] [ 2470.062952][T12713] *** DEADLOCK *** [ 2470.062952][T12713] [ 2470.063444][T12713] 3 locks held by udevd/12713: [ 2470.063801][T12713] #0: ffff000014767358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 2470.064952][T12713] #1: ffff0000144faf10 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x19c/0x500 [ 2470.065741][T12713] #2: ffff0000284451f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 2470.066541][T12713] [ 2470.066541][T12713] stack backtrace: [ 2470.067599][T12713] CPU: 0 UID: 0 PID: 12713 Comm: udevd Not tainted syzkaller #0 PREEMPT [ 2470.068174][T12713] Hardware name: linux,dummy-virt (DT) [ 2470.069020][T12713] Call trace: [ 2470.069764][T12713] show_stack+0x18/0x24 (C) [ 2470.070406][T12713] dump_stack_lvl+0xa4/0xf4 [ 2470.070925][T12713] dump_stack+0x1c/0x28 [ 2470.071341][T12713] print_circular_bug+0x28c/0x370 [ 2470.071838][T12713] check_noncircular+0x168/0x17c [ 2470.072370][T12713] __lock_acquire+0x1638/0x2380 [ 2470.072716][T12713] lock_acquire+0x310/0x38c [ 2470.073055][T12713] __mutex_lock+0x144/0xffc [ 2470.073362][T12713] mutex_lock_nested+0x24/0x30 [ 2470.073681][T12713] nbd_queue_rq+0x2cc/0xb54 [ 2470.074015][T12713] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 2470.074386][T12713] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 2470.074793][T12713] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 2470.075161][T12713] blk_mq_run_hw_queue+0x1e4/0x500 [ 2470.075577][T12713] blk_mq_dispatch_list+0x348/0xa50 [ 2470.075922][T12713] blk_mq_flush_plug_list+0xe8/0x508 [ 2470.076308][T12713] __blk_flush_plug+0x208/0x3b8 [ 2470.076645][T12713] __submit_bio+0x3a4/0x4ac [ 2470.076963][T12713] submit_bio_noacct_nocheck+0x59c/0xa8c [ 2470.077321][T12713] submit_bio_noacct+0x858/0x18f8 [ 2470.077737][T12713] submit_bio+0x32c/0x5f0 [ 2470.078075][T12713] submit_bh_wbc+0x310/0x480 [ 2470.078402][T12713] block_read_full_folio+0x26c/0x640 [ 2470.078737][T12713] blkdev_read_folio+0x1c/0x28 [ 2470.079068][T12713] filemap_read_folio+0xac/0x1fc [ 2470.079398][T12713] do_read_cache_folio+0x1c4/0x480 [ 2470.079726][T12713] read_cache_folio+0x44/0x6c [ 2470.080034][T12713] read_part_sector+0xac/0x5f4 [ 2470.080405][T12713] read_lba+0x15c/0x2ec [ 2470.080718][T12713] efi_partition+0x1dc/0x2154 [ 2470.081198][T12713] bdev_disk_changed+0x508/0xf0c [ 2470.081625][T12713] blkdev_get_whole+0x144/0x1e4 [ 2470.082026][T12713] bdev_open+0x1dc/0xa84 [ 2470.082401][T12713] blkdev_open+0x1d4/0x324 [ 2470.082852][T12713] do_dentry_open+0x6a4/0x103c [ 2470.083311][T12713] vfs_open+0x5c/0x2fc [ 2470.083869][T12713] path_openat+0x1490/0x24b4 [ 2470.084245][T12713] do_filp_open+0x184/0x360 [ 2470.084575][T12713] do_sys_openat2+0xe0/0x160 [ 2470.084910][T12713] __arm64_sys_openat+0x12c/0x1bc [ 2470.085269][T12713] invoke_syscall+0x6c/0x258 [ 2470.085593][T12713] el0_svc_common.constprop.0+0xac/0x230 [ 2470.086015][T12713] do_el0_svc+0x40/0x58 [ 2470.086327][T12713] el0_svc+0x50/0x1a0 [ 2470.086628][T12713] el0t_64_sync_handler+0xa0/0xe4 [ 2470.087017][T12713] el0t_64_sync+0x198/0x19c [ 2470.134120][T12713] block nbd0: Dead connection, failed to find a fallback [ 2470.140637][T12713] block nbd0: shutting down sockets [ 2470.146211][T12713] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2470.147267][T12713] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2470.149442][T12713] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2470.149590][T12713] Buffer I/O error on dev nbd0, logical block 1, async page read [ 2470.150210][T12713] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2470.150357][T12713] Buffer I/O error on dev nbd0, logical block 2, async page read [ 2470.150997][T12713] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2470.151119][T12713] Buffer I/O error on dev nbd0, logical block 3, async page read [ 2470.205356][T12713] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2470.205897][T12713] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2470.206992][T12713] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2470.207121][T12713] Buffer I/O error on dev nbd0, logical block 1, async page read [ 2470.207700][T12713] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2470.207822][T12713] Buffer I/O error on dev nbd0, logical block 2, async page read [ 2470.208478][T12713] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2470.208604][T12713] Buffer I/O error on dev nbd0, logical block 3, async page read [ 2470.209234][T12713] nbd0: unable to read partition table [ 2470.425965][T12713] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2470.426626][T12713] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2470.427345][T12713] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2470.427472][T12713] Buffer I/O error on dev nbd0, logical block 1, async page read [ 2470.431033][T12713] nbd0: unable to read partition table VM DIAGNOSIS: 17:32:23 Registers: info registers vcpu 0 CPU#0 PC=ffff80008034fce8 X00=00000000000000c0 X01=00000000ffffe5d5 X02=0000000000000000 X03=ffff80008034fc90 X04=ffff70001450eb31 X05=ffff8000a2875980 X06=ffff70001450eb30 X07=0000000000000001 X08=ffff8000a2875987 X09=dfff800000000000 X10=ffff70001450eb30 X11=1ffff0001450eb30 X12=ffff70001450eb31 X13=ffff800087220e98 X14=0000000000000001 X15=fffffffffffec1d0 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=1ffff0001450eb65 X20=ffff8000a2875b20 X21=ffff8000a2875b28 X22=ffff800087220e60 X23=1ffff0001450eb2c X24=ffff8000a2875980 X25=00000000ffffe5d5 X26=000000000000000d X27=00000000ffffe5d5 X28=1fffe0000d4114b5 X29=ffff8000a2875900 X30=ffff80008034fc90 SP=ffff8000a2875900 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008087a044 X00=0000000000000007 X01=0000000000000001 X02=0000000000000000 X03=1fffe00002790795 X04=0000000000000001 X05=0000000000000000 X06=ffff80008087a0d0 X07=ffff7000142aef62 X08=ffff000013c83c80 X09=dfff800000000000 X10=ffff7000142aef4a X11=1ffff000142aef4a X12=ffff7000142aef4b X13=0000000000000002 X14=00000000000016f0 X15=ffff8000a1577c80 X16=ffff80008d4e0000 X17=ffff7fffe3003000 X18=0000000000000000 X19=ffff8000870b89f0 X20=ffff000013c83c80 X21=ffff8000857f4400 X22=00000000ffcf2e34 X23=0000000000000001 X24=0000000000000000 X25=0000000000000000 X26=ffff000013c83c80 X27=0000000000000020 X28=ffff000013c85594 X29=ffff8000a1577bc0 X30=ffff80008004d3e0 SP=ffff8000a1577cc0 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000