last executing test programs: 7m43.65655936s ago: executing program 1 (id=984): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0x5451, 0x0) 7m42.658094595s ago: executing program 1 (id=986): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x14, 0x3, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}}, 0x14}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) 7m40.618955008s ago: executing program 1 (id=990): r0 = fsopen(&(0x7f0000000000)='bpf\x00', 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)='*\\&^\'\x00', &(0x7f0000000040)='./file0\x00', r1) 7m40.030085421s ago: executing program 1 (id=992): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x2151090, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) 7m39.306060581s ago: executing program 1 (id=994): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x2, 0x0, &(0x7f0000000540), 0x2, 0x0) ptrace(0x10, r0) 7m37.763396086s ago: executing program 1 (id=997): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x40}) setsockopt$inet6_int(r0, 0x29, 0xd1, 0x0, 0x0) 7m37.763227676s ago: executing program 32 (id=997): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x40}) setsockopt$inet6_int(r0, 0x29, 0xd1, 0x0, 0x0) 22.017697117s ago: executing program 2 (id=1753): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) r1 = dup(r0) sendto$l2tp6(r1, &(0x7f0000000040), 0x0, 0xf29241bf607a9f32, 0x0, 0x0) 21.217077793s ago: executing program 2 (id=1754): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) write$tun(r0, 0x0, 0x0) 18.017487553s ago: executing program 2 (id=1759): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') ioctl$TCSETSF(r0, 0x5451, 0x0) 17.330647672s ago: executing program 2 (id=1760): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount(&(0x7f0000000040)=@rnullb, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='ramfs\x00', 0x1200800, &(0x7f0000000240)='\x00') 16.515574948s ago: executing program 2 (id=1762): pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/mnt\x00') 16.446114292s ago: executing program 2 (id=1763): r0 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup(r0) ioctl$SNDCTL_SYNTH_ID(r1, 0xc08c5114, &(0x7f0000000180)={"959447a248d1fab4f162c6fe6e99a80eee65abca7fa2ea952cae40e33646", 0x6, 0x2, 0x1, 0x8, 0x3, 0x6, 0x0, 0x0, [0x7, 0x4, 0xb, 0x7ea, 0x2, 0xe, 0x9, 0x6, 0x8, 0xffff7fff, 0x8, 0xe, 0xfffffffb, 0x65db, 0x7, 0x2, 0x7, 0x8]}) 16.285541991s ago: executing program 33 (id=1763): r0 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup(r0) ioctl$SNDCTL_SYNTH_ID(r1, 0xc08c5114, &(0x7f0000000180)={"959447a248d1fab4f162c6fe6e99a80eee65abca7fa2ea952cae40e33646", 0x6, 0x2, 0x1, 0x8, 0x3, 0x6, 0x0, 0x0, [0x7, 0x4, 0xb, 0x7ea, 0x2, 0xe, 0x9, 0x6, 0x8, 0xffff7fff, 0x8, 0xe, 0xfffffffb, 0x65db, 0x7, 0x2, 0x7, 0x8]}) 5.67462121s ago: executing program 0 (id=1774): socketpair(0x1, 0x5, 0x0, &(0x7f0000000a00)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b80)={0x0}, 0x1, 0x0, 0x0, 0x81}, 0x80) 4.305989237s ago: executing program 0 (id=1775): mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file4\x00', 0x0) setresuid(0x0, 0xee00, 0x0) getxattr(&(0x7f0000000080)='./file4/file0\x00', &(0x7f0000000340)=@random={'os2.', '\x10\xd8\x00\x00\x16\x00\xc5H\xac\x84\xb7\xd9\xb1\x91\x14\xed'}, 0x0, 0x0) 3.255533587s ago: executing program 0 (id=1776): r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 2.030885076s ago: executing program 0 (id=1777): r0 = syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) r1 = getpgid(0x0) kcmp(r1, r1, 0x3, 0xffffffffffffffff, r0) 1.104585898s ago: executing program 0 (id=1778): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSCTTY(r1, 0x540e, 0x7e) 0s ago: executing program 0 (id=1779): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1e) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$cgroup2(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20000, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:49327' (ED25519) to the list of known hosts. [ 262.301020][ T30] audit: type=1400 audit(261.630:46): avc: denied { name_bind } for pid=3322 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 262.973925][ T30] audit: type=1400 audit(262.300:47): avc: denied { execute } for pid=3323 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 262.992692][ T30] audit: type=1400 audit(262.320:48): avc: denied { execute_no_trans } for pid=3323 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 273.798988][ T30] audit: type=1400 audit(273.120:49): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 273.838997][ T30] audit: type=1400 audit(273.170:50): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 273.908761][ T3323] cgroup: Unknown subsys name 'net' [ 273.967218][ T30] audit: type=1400 audit(273.290:51): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 274.346070][ T3323] cgroup: Unknown subsys name 'cpuset' [ 274.393870][ T3323] cgroup: Unknown subsys name 'rlimit' [ 274.867276][ T30] audit: type=1400 audit(274.190:52): avc: denied { setattr } for pid=3323 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.874594][ T30] audit: type=1400 audit(274.200:53): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 274.880704][ T30] audit: type=1400 audit(274.210:54): avc: denied { mount } for pid=3323 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 275.562436][ T3325] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 275.568736][ T30] audit: type=1400 audit(274.890:55): avc: denied { relabelto } for pid=3325 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 275.582757][ T30] audit: type=1400 audit(274.900:56): avc: denied { write } for pid=3325 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 275.662933][ T30] audit: type=1400 audit(274.990:57): avc: denied { read } for pid=3323 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 275.673027][ T30] audit: type=1400 audit(275.000:58): avc: denied { open } for pid=3323 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 275.710565][ T3323] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 314.386659][ T30] audit: type=1400 audit(313.710:59): avc: denied { execmem } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 314.497541][ T30] audit: type=1400 audit(313.820:60): avc: denied { read } for pid=3328 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 314.510402][ T30] audit: type=1400 audit(313.840:61): avc: denied { open } for pid=3328 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 314.539564][ T30] audit: type=1400 audit(313.870:62): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 314.634608][ T30] audit: type=1400 audit(313.960:63): avc: denied { module_request } for pid=3328 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 315.033962][ T30] audit: type=1400 audit(314.360:64): avc: denied { sys_module } for pid=3328 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 324.560282][ T3328] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 324.751517][ T3328] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 325.317297][ T3329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 325.372259][ T3329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 329.564158][ T3328] hsr_slave_0: entered promiscuous mode [ 329.583784][ T3328] hsr_slave_1: entered promiscuous mode [ 330.149955][ T3329] hsr_slave_0: entered promiscuous mode [ 330.170495][ T3329] hsr_slave_1: entered promiscuous mode [ 330.191416][ T3329] debugfs: 'hsr0' already exists in 'hsr' [ 330.193800][ T3329] Cannot create hsr debugfs directory [ 333.680459][ T30] audit: type=1400 audit(333.010:65): avc: denied { create } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 333.693551][ T30] audit: type=1400 audit(333.020:66): avc: denied { write } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 333.729017][ T30] audit: type=1400 audit(333.050:67): avc: denied { read } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 333.794348][ T3328] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 333.920948][ T3328] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 334.040573][ T3328] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 334.200877][ T3328] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 334.973746][ T3329] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 335.043424][ T3329] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 335.123588][ T3329] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 335.202328][ T3329] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 337.803405][ T3328] 8021q: adding VLAN 0 to HW filter on device bond0 [ 339.841213][ T3329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 355.220661][ T3328] veth0_vlan: entered promiscuous mode [ 355.357578][ T3328] veth1_vlan: entered promiscuous mode [ 355.989894][ T3328] veth0_macvtap: entered promiscuous mode [ 356.114752][ T3328] veth1_macvtap: entered promiscuous mode [ 356.961172][ T3329] veth0_vlan: entered promiscuous mode [ 357.409880][ T3329] veth1_vlan: entered promiscuous mode [ 357.529517][ T717] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 357.532831][ T717] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 357.581487][ T717] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 357.592681][ T717] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.547139][ T30] audit: type=1400 audit(357.870:68): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.DagbSy/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 358.571112][ T30] audit: type=1400 audit(357.900:69): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 358.607676][ T30] audit: type=1400 audit(357.930:70): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.DagbSy/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 358.656919][ T30] audit: type=1400 audit(357.980:71): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 358.769635][ T3329] veth0_macvtap: entered promiscuous mode [ 358.773841][ T30] audit: type=1400 audit(358.100:72): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.DagbSy/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 358.848628][ T30] audit: type=1400 audit(358.180:73): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/syzkaller.DagbSy/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 358.870969][ T3329] veth1_macvtap: entered promiscuous mode [ 358.991158][ T30] audit: type=1400 audit(358.320:74): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 359.023651][ T30] audit: type=1400 audit(358.350:75): avc: denied { mounton } for pid=3328 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 359.077942][ T30] audit: type=1400 audit(358.390:76): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="gadgetfs" ino=3808 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 359.113901][ T30] audit: type=1400 audit(358.440:77): avc: denied { mount } for pid=3328 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 359.729723][ T3328] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 359.833890][ T40] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.840768][ T40] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.864071][ T40] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.894568][ T40] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.264583][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 366.266728][ T30] audit: type=1400 audit(365.590:83): avc: denied { read } for pid=3491 comm="syz.0.6" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 366.267321][ T30] audit: type=1400 audit(365.590:84): avc: denied { open } for pid=3491 comm="syz.0.6" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 366.322268][ T30] audit: type=1400 audit(365.650:85): avc: denied { ioctl } for pid=3491 comm="syz.0.6" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 373.222285][ T3527] capability: warning: `syz.0.21' uses deprecated v2 capabilities in a way that may be insecure [ 383.994633][ T30] audit: type=1400 audit(383.320:86): avc: denied { open } for pid=3570 comm="syz.0.43" path="/dev/ptyq5" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 387.806595][ T30] audit: type=1400 audit(387.130:87): avc: denied { create } for pid=3587 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 387.909669][ T30] audit: type=1400 audit(387.220:88): avc: denied { bind } for pid=3587 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 387.952931][ T30] audit: type=1400 audit(387.280:89): avc: denied { write } for pid=3587 comm="syz.0.52" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 388.494432][ T30] audit: type=1400 audit(387.820:90): avc: denied { create } for pid=3590 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 388.550654][ T30] audit: type=1400 audit(387.880:91): avc: denied { bind } for pid=3590 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 388.587929][ T30] audit: type=1400 audit(387.910:92): avc: denied { write } for pid=3590 comm="syz.1.53" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 388.859742][ T30] audit: type=1400 audit(388.180:93): avc: denied { read write } for pid=3329 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 388.864220][ T30] audit: type=1400 audit(388.190:94): avc: denied { open } for pid=3329 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 388.901464][ T30] audit: type=1400 audit(388.230:95): avc: denied { ioctl } for pid=3329 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 390.440983][ T30] audit: type=1400 audit(389.770:96): avc: denied { create } for pid=3598 comm="syz.1.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 390.527018][ T30] audit: type=1400 audit(389.850:97): avc: denied { write } for pid=3598 comm="syz.1.57" path="socket:[4413]" dev="sockfs" ino=4413 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 396.153866][ T30] audit: type=1400 audit(395.480:98): avc: denied { map_create } for pid=3623 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 396.163862][ T30] audit: type=1400 audit(395.480:99): avc: denied { bpf } for pid=3623 comm="syz.0.70" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 396.219382][ T30] audit: type=1400 audit(395.550:100): avc: denied { map_read map_write } for pid=3623 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 401.025947][ T30] audit: type=1400 audit(400.350:101): avc: denied { audit_write } for pid=3643 comm="syz.0.79" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 402.049714][ T3649] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=361 sclass=netlink_audit_socket pid=3649 comm=syz.0.81 [ 402.933379][ T30] audit: type=1400 audit(402.250:102): avc: denied { create } for pid=3651 comm="syz.1.83" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 403.027766][ T30] audit: type=1400 audit(402.350:103): avc: denied { ioctl } for pid=3651 comm="syz.1.83" path="socket:[4508]" dev="sockfs" ino=4508 ioctlcmd=0x937d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 418.091978][ T30] audit: type=1400 audit(417.420:104): avc: denied { write } for pid=3701 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 419.380945][ T30] audit: type=1400 audit(418.700:105): avc: denied { unmount } for pid=3328 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 421.957462][ T30] audit: type=1400 audit(421.280:106): avc: denied { append } for pid=3716 comm="syz.0.112" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 423.086378][ T30] audit: type=1400 audit(422.410:107): avc: denied { create } for pid=3723 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 425.384042][ T30] audit: type=1400 audit(424.710:108): avc: denied { create } for pid=3736 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 425.440218][ T30] audit: type=1400 audit(424.770:109): avc: denied { write } for pid=3736 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 425.502171][ T30] audit: type=1400 audit(424.830:110): avc: denied { read } for pid=3736 comm="syz.0.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 426.853643][ T30] audit: type=1400 audit(426.180:111): avc: denied { read write } for pid=3744 comm="syz.1.126" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 426.876543][ T30] audit: type=1400 audit(426.200:112): avc: denied { open } for pid=3744 comm="syz.1.126" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 431.572665][ T30] audit: type=1400 audit(430.900:113): avc: denied { read } for pid=3770 comm="syz.0.139" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 431.582773][ T30] audit: type=1400 audit(430.910:114): avc: denied { open } for pid=3770 comm="syz.0.139" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 431.686594][ T30] audit: type=1400 audit(431.000:115): avc: denied { ioctl } for pid=3770 comm="syz.0.139" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 433.009047][ T30] audit: type=1400 audit(432.340:116): avc: denied { create } for pid=3778 comm="syz.1.142" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 433.099322][ T30] audit: type=1400 audit(432.430:117): avc: denied { ioctl } for pid=3778 comm="syz.1.142" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4711 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 433.970502][ T30] audit: type=1400 audit(433.300:118): avc: denied { mount } for pid=3784 comm="syz.1.145" name="/" dev="bdev" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bdev_t tclass=filesystem permissive=1 [ 434.233420][ T30] audit: type=1400 audit(433.560:119): avc: denied { write } for pid=3786 comm="syz.0.146" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 435.799348][ T30] audit: type=1400 audit(435.110:120): avc: denied { create } for pid=3792 comm="syz.1.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 435.869191][ T30] audit: type=1400 audit(435.200:121): avc: denied { setopt } for pid=3792 comm="syz.1.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 435.874041][ T30] audit: type=1400 audit(435.200:122): avc: denied { bind } for pid=3792 comm="syz.1.149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 436.443160][ T3797] capability: warning: `syz.1.151' uses 32-bit capabilities (legacy support in use) [ 439.941235][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 439.942260][ T30] audit: type=1400 audit(439.270:126): avc: denied { read write } for pid=3815 comm="syz.0.160" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 439.961736][ T30] audit: type=1400 audit(439.280:127): avc: denied { open } for pid=3815 comm="syz.0.160" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 439.981446][ T3816] ucma_write: process 156 (syz.0.160) changed security contexts after opening file descriptor, this is not allowed. [ 441.876881][ T30] audit: type=1400 audit(441.200:128): avc: denied { setattr } for pid=3822 comm="syz.1.164" name="RAW" dev="sockfs" ino=4786 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 443.226882][ T30] audit: type=1400 audit(442.550:129): avc: denied { create } for pid=3830 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 443.303414][ T30] audit: type=1400 audit(442.630:130): avc: denied { setopt } for pid=3830 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 444.158870][ T3836] Zero length message leads to an empty skb [ 450.600895][ T30] audit: type=1400 audit(449.930:131): avc: denied { write } for pid=3866 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 451.223327][ T30] audit: type=1400 audit(450.550:132): avc: denied { read } for pid=3870 comm="syz.1.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 461.008371][ T30] audit: type=1400 audit(460.330:133): avc: denied { create } for pid=3914 comm="syz.1.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 461.072003][ T30] audit: type=1400 audit(460.400:134): avc: denied { write } for pid=3914 comm="syz.1.211" path="socket:[5641]" dev="sockfs" ino=5641 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 461.713313][ T30] audit: type=1400 audit(461.040:135): avc: denied { setopt } for pid=3914 comm="syz.1.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 468.740572][ T30] audit: type=1400 audit(468.070:136): avc: denied { setopt } for pid=3943 comm="syz.0.221" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 477.600937][ T30] audit: type=1400 audit(476.910:137): avc: denied { ioctl } for pid=3987 comm="syz.0.242" path="socket:[5053]" dev="sockfs" ino=5053 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 487.500520][ T30] audit: type=1400 audit(486.830:138): avc: denied { connect } for pid=4037 comm="syz.0.267" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 487.647074][ T30] audit: type=1400 audit(486.970:139): avc: denied { read } for pid=4038 comm="syz.1.268" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 487.659554][ T30] audit: type=1400 audit(486.980:140): avc: denied { open } for pid=4038 comm="syz.1.268" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 490.065933][ T30] audit: type=1400 audit(489.390:141): avc: denied { read write } for pid=4049 comm="syz.0.273" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 490.096842][ T30] audit: type=1400 audit(489.420:142): avc: denied { open } for pid=4049 comm="syz.0.273" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 490.200157][ T30] audit: type=1400 audit(489.520:143): avc: denied { block_suspend } for pid=4049 comm="syz.0.273" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 490.257914][ T30] audit: type=1400 audit(489.590:144): avc: denied { read write } for pid=4051 comm="syz.1.274" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 490.267030][ T30] audit: type=1400 audit(489.590:145): avc: denied { open } for pid=4051 comm="syz.1.274" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 490.278623][ T30] audit: type=1400 audit(489.610:146): avc: denied { ioctl } for pid=4051 comm="syz.1.274" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 490.339839][ T4052] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 490.379749][ T4052] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 491.404817][ T4056] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 491.414156][ T30] audit: type=1400 audit(490.740:147): avc: denied { getopt } for pid=4054 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 493.804536][ T30] audit: type=1400 audit(493.130:148): avc: denied { ioctl } for pid=4065 comm="syz.1.281" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 494.093855][ T30] audit: type=1400 audit(493.420:149): avc: denied { allowed } for pid=4066 comm="syz.0.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 494.937043][ T30] audit: type=1400 audit(494.250:150): avc: denied { write } for pid=4070 comm="syz.1.283" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 494.951985][ T30] audit: type=1400 audit(494.270:151): avc: denied { open } for pid=4070 comm="syz.1.283" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 495.096338][ T30] audit: type=1400 audit(494.420:152): avc: denied { ioctl } for pid=4070 comm="syz.1.283" path="/dev/loop-control" dev="devtmpfs" ino=637 ioctlcmd=0x330b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 496.987392][ T30] audit: type=1400 audit(496.310:153): avc: denied { prog_load } for pid=4078 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 497.022409][ T30] audit: type=1400 audit(496.350:154): avc: denied { perfmon } for pid=4078 comm="syz.0.288" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 497.193219][ T30] audit: type=1400 audit(496.520:155): avc: denied { prog_run } for pid=4078 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 499.114648][ T30] audit: type=1400 audit(498.440:156): avc: denied { create } for pid=4087 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 499.164009][ T30] audit: type=1400 audit(498.490:157): avc: denied { connect } for pid=4087 comm="syz.0.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 499.256534][ T30] audit: type=1400 audit(498.580:158): avc: denied { ioctl } for pid=4087 comm="syz.0.292" path="socket:[6240]" dev="sockfs" ino=6240 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 501.710876][ T4100] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1124 sclass=netlink_route_socket pid=4100 comm=syz.1.297 [ 508.098769][ T4128] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=4128 comm=syz.1.310 [ 508.098965][ T30] audit: type=1400 audit(507.420:159): avc: denied { nlmsg_read } for pid=4126 comm="syz.1.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 510.983642][ T30] audit: type=1400 audit(510.300:160): avc: denied { create } for pid=4140 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 511.080586][ T30] audit: type=1400 audit(510.410:161): avc: denied { write } for pid=4140 comm="syz.1.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 526.878473][ T30] audit: type=1400 audit(526.210:162): avc: denied { create } for pid=4201 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 526.927734][ T30] audit: type=1400 audit(526.210:163): avc: denied { write open } for pid=4201 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1680 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 526.979061][ T30] audit: type=1400 audit(526.310:164): avc: denied { append } for pid=4201 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1680 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 527.148838][ T30] audit: type=1400 audit(526.460:165): avc: denied { getattr } for pid=4201 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 528.527562][ T30] audit: type=1400 audit(527.860:166): avc: denied { read } for pid=4211 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 529.360359][ T30] audit: type=1400 audit(528.690:167): avc: denied { setopt } for pid=4215 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 529.394808][ T30] audit: type=1400 audit(528.720:168): avc: denied { connect } for pid=4215 comm="syz.0.352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 529.772241][ T30] audit: type=1400 audit(529.090:169): avc: denied { unlink } for pid=4216 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1680 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 540.586923][ T30] audit: type=1400 audit(539.910:170): avc: denied { write } for pid=4251 comm="syz.1.368" name="arp" dev="proc" ino=4026532725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 544.471763][ T30] audit: type=1400 audit(543.790:171): avc: denied { create } for pid=4264 comm="syz.0.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 546.450585][ T30] audit: type=1400 audit(545.780:172): avc: denied { read write } for pid=4273 comm="syz.1.379" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 546.466099][ T30] audit: type=1400 audit(545.780:173): avc: denied { open } for pid=4273 comm="syz.1.379" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 546.764199][ T785] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 546.884389][ T785] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz0 [ 548.166688][ T30] audit: type=1400 audit(547.490:174): avc: denied { map } for pid=4279 comm="syz.1.382" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7296 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 548.168291][ T30] audit: type=1400 audit(547.490:175): avc: denied { read write } for pid=4279 comm="syz.1.382" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7296 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 548.300472][ T30] audit: type=1400 audit(547.620:176): avc: denied { compute_member } for pid=4281 comm="syz.0.383" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 551.809714][ T4284] fido_id[4284]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 559.472874][ T30] audit: type=1400 audit(558.800:177): avc: denied { create } for pid=4332 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 561.495827][ T4342] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 561.866666][ T30] audit: type=1400 audit(561.190:178): avc: denied { create } for pid=4343 comm="syz.0.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 561.991654][ T30] audit: type=1400 audit(561.320:179): avc: denied { read } for pid=4343 comm="syz.0.413" path="socket:[6653]" dev="sockfs" ino=6653 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 569.057367][ T30] audit: type=1400 audit(568.380:180): avc: denied { connect } for pid=4383 comm="syz.1.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 576.033291][ T4418] lo: entered allmulticast mode [ 576.051294][ T30] audit: type=1400 audit(575.380:181): avc: denied { ioctl } for pid=4417 comm="syz.0.450" path="socket:[7539]" dev="sockfs" ino=7539 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 578.809331][ T30] audit: type=1400 audit(578.130:182): avc: denied { write } for pid=4427 comm="syz.1.455" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 584.018252][ T30] audit: type=1400 audit(583.350:183): avc: denied { create } for pid=4450 comm="syz.1.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 585.977431][ T30] audit: type=1400 audit(585.300:184): avc: denied { ioctl } for pid=4459 comm="syz.1.471" path="socket:[6827]" dev="sockfs" ino=6827 ioctlcmd=0x5441 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 595.731740][ T30] audit: type=1400 audit(595.060:185): avc: denied { watch watch_reads } for pid=4498 comm="syz.1.491" path="pipe:[6908]" dev="pipefs" ino=6908 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 612.822410][ T30] audit: type=1400 audit(612.150:186): avc: denied { read } for pid=4565 comm="syz.1.524" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 612.842518][ T30] audit: type=1400 audit(612.170:187): avc: denied { open } for pid=4565 comm="syz.1.524" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 612.901452][ T30] audit: type=1400 audit(612.230:188): avc: denied { ioctl } for pid=4565 comm="syz.1.524" path="/dev/fb0" dev="devtmpfs" ino=620 ioctlcmd=0x4605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 616.169046][ T30] audit: type=1400 audit(615.500:189): avc: denied { read } for pid=4583 comm="syz.1.533" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 641.689679][ T4717] netlink: 45 bytes leftover after parsing attributes in process `syz.0.598'. [ 674.410628][ T30] audit: type=1400 audit(673.700:190): avc: denied { create } for pid=4883 comm="syz.0.675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 674.466149][ T30] audit: type=1400 audit(673.790:191): avc: denied { write } for pid=4883 comm="syz.0.675" path="socket:[9419]" dev="sockfs" ino=9419 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 696.497235][ T5003] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1124 sclass=netlink_route_socket pid=5003 comm=syz.0.733 [ 709.038426][ T30] audit: type=1400 audit(708.370:192): avc: denied { setopt } for pid=5064 comm="syz.0.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 712.566817][ T30] audit: type=1400 audit(711.880:193): avc: denied { ioctl } for pid=5079 comm="syz.1.773" path="socket:[8952]" dev="sockfs" ino=8952 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 712.799641][ T5081] 8021q: VLANs not supported on wg1 [ 717.298660][ T30] audit: type=1400 audit(716.630:194): avc: denied { read write } for pid=5102 comm="syz.1.785" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 717.301684][ T30] audit: type=1400 audit(716.630:195): avc: denied { open } for pid=5102 comm="syz.1.785" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 717.312393][ T30] audit: type=1400 audit(716.640:196): avc: denied { ioctl } for pid=5102 comm="syz.1.785" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x45a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 729.511576][ T30] audit: type=1400 audit(728.840:197): avc: denied { ioctl } for pid=5149 comm="syz.1.806" path="socket:[9832]" dev="sockfs" ino=9832 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 729.566768][ T30] audit: type=1400 audit(728.890:198): avc: denied { bind } for pid=5149 comm="syz.1.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 747.629196][ T30] audit: type=1400 audit(746.950:199): avc: denied { setattr } for pid=5219 comm="syz.1.839" name="ptmx" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 750.511590][ T30] audit: type=1400 audit(749.840:200): avc: denied { create } for pid=5236 comm="syz.0.849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 750.540029][ T30] audit: type=1400 audit(749.860:201): avc: denied { setopt } for pid=5236 comm="syz.0.849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 751.427258][ T30] audit: type=1400 audit(750.750:202): avc: denied { read } for pid=5242 comm="syz.0.851" path="socket:[9200]" dev="sockfs" ino=9200 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 756.219760][ T30] audit: type=1400 audit(755.550:203): avc: denied { read write } for pid=5266 comm="syz.1.863" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 756.237308][ T30] audit: type=1400 audit(755.560:204): avc: denied { open } for pid=5266 comm="syz.1.863" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 756.272955][ T30] audit: type=1400 audit(755.600:205): avc: denied { ioctl } for pid=5266 comm="syz.1.863" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 766.697918][ T30] audit: type=1400 audit(766.020:206): avc: denied { read } for pid=5342 comm="syz.1.901" path="socket:[10160]" dev="sockfs" ino=10160 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 773.704234][ T30] audit: type=1400 audit(773.030:207): avc: denied { ioctl } for pid=5373 comm="syz.1.915" path="socket:[10434]" dev="sockfs" ino=10434 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 774.259672][ T30] audit: type=1400 audit(773.570:208): avc: denied { setopt } for pid=5377 comm="syz.1.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 779.040495][ T30] audit: type=1400 audit(778.370:209): avc: denied { write } for pid=5401 comm="syz.0.929" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 800.352484][ T30] audit: type=1400 audit(799.670:210): avc: denied { remount } for pid=5487 comm="syz.1.971" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 800.536753][ T30] audit: type=1400 audit(799.860:211): avc: denied { unmount } for pid=3329 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 804.188050][ T5506] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=5506 comm=syz.1.980 [ 806.881600][ T30] audit: type=1400 audit(806.210:212): avc: denied { write } for pid=5517 comm="syz.1.986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 810.762315][ T717] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 811.169916][ T717] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 811.653846][ T717] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 812.029920][ T717] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 813.222245][ T30] audit: type=1400 audit(812.550:213): avc: denied { read } for pid=3173 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 816.870028][ T717] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 816.973918][ T717] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 817.039792][ T717] bond0 (unregistering): Released all slaves [ 817.789731][ T717] hsr_slave_0: left promiscuous mode [ 817.858628][ T717] hsr_slave_1: left promiscuous mode [ 818.102406][ T717] veth1_macvtap: left promiscuous mode [ 818.103358][ T717] veth0_macvtap: left promiscuous mode [ 818.105740][ T717] veth1_vlan: left promiscuous mode [ 818.128139][ T717] veth0_vlan: left promiscuous mode [ 824.089434][ T30] audit: type=1400 audit(823.420:214): avc: denied { bind } for pid=5572 comm="syz.0.1010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 841.057175][ T5541] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 841.119431][ T5541] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 847.782609][ T5541] hsr_slave_0: entered promiscuous mode [ 847.794314][ T5541] hsr_slave_1: entered promiscuous mode [ 847.803672][ T5541] debugfs: 'hsr0' already exists in 'hsr' [ 847.809766][ T5541] Cannot create hsr debugfs directory [ 851.308978][ T5541] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 851.364710][ T5541] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 851.455993][ T5541] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 851.550401][ T5541] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 856.218890][ T5541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 871.071071][ T5541] veth0_vlan: entered promiscuous mode [ 871.361211][ T5541] veth1_vlan: entered promiscuous mode [ 871.993164][ T5541] veth0_macvtap: entered promiscuous mode [ 872.141482][ T5541] veth1_macvtap: entered promiscuous mode [ 873.049598][ T40] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 873.053819][ T40] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 873.076716][ T40] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 873.083564][ T40] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 873.938101][ T30] audit: type=1400 audit(873.260:215): avc: denied { mounton } for pid=5541 comm="syz-executor" path="/syzkaller.2UcMJL/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=12359 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 893.413344][ T30] audit: type=1400 audit(892.740:216): avc: denied { checkpoint_restore } for pid=5766 comm="syz.0.1044" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 897.466824][ C1] [drm:vkms_crtc_handle_vblank_timeout] *ERROR* vkms failure on handling vblank [ 907.771426][ T30] audit: type=1400 audit(907.100:217): avc: denied { ioctl } for pid=5824 comm="syz.0.1068" path="socket:[11965]" dev="sockfs" ino=11965 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 907.804571][ T30] audit: type=1400 audit(907.130:218): avc: denied { write } for pid=5824 comm="syz.0.1068" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 929.899241][ T30] audit: type=1400 audit(929.230:219): avc: denied { create } for pid=5920 comm="syz.2.1115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 929.967389][ T30] audit: type=1400 audit(929.280:220): avc: denied { write } for pid=5920 comm="syz.2.1115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 934.033881][ T5922] infiniband syz2: set active [ 934.034497][ T5922] infiniband syz2: added bond0 [ 934.080553][ T5922] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 934.107399][ T5922] infiniband syz2: Couldn't open port 1 [ 934.244537][ T5922] RDS/IB: syz2: added [ 934.248325][ T5922] smc: adding ib device syz2 with port count 1 [ 934.271405][ T5922] smc: ib device syz2 port 1 has no pnetid [ 993.402133][ T30] audit: type=1400 audit(992.730:221): avc: denied { bind } for pid=6177 comm="syz.2.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 993.442766][ T30] audit: type=1400 audit(992.770:222): avc: denied { setopt } for pid=6177 comm="syz.2.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1010.334284][ T30] audit: type=1400 audit(1009.660:223): avc: denied { lock } for pid=6249 comm="syz.2.1273" path="socket:[13241]" dev="sockfs" ino=13241 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1013.340566][ T30] audit: type=1400 audit(1012.640:224): avc: denied { create } for pid=6261 comm="syz.0.1279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1013.441916][ T30] audit: type=1400 audit(1012.770:225): avc: denied { connect } for pid=6261 comm="syz.0.1279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1014.007343][ T30] audit: type=1400 audit(1013.330:226): avc: denied { ioctl } for pid=6261 comm="syz.0.1279" path="socket:[13252]" dev="sockfs" ino=13252 ioctlcmd=0x9411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1027.968328][ T30] audit: type=1400 audit(1027.290:227): avc: denied { read write } for pid=6321 comm="syz.0.1307" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1027.991787][ T30] audit: type=1400 audit(1027.320:228): avc: denied { open } for pid=6321 comm="syz.0.1307" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1028.117469][ T30] audit: type=1400 audit(1027.420:229): avc: denied { ioctl } for pid=6321 comm="syz.0.1307" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1029.257426][ T6327] loop2: detected capacity change from 0 to 8 [ 1045.857582][ T30] audit: type=1400 audit(1045.190:230): avc: denied { setopt } for pid=6404 comm="syz.2.1349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1046.429240][ T30] audit: type=1400 audit(1045.760:231): avc: denied { write } for pid=6404 comm="syz.2.1349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1049.532982][ T30] audit: type=1400 audit(1048.860:232): avc: denied { getopt } for pid=6426 comm="syz.2.1358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1060.312737][ T30] audit: type=1400 audit(1059.640:233): avc: denied { append } for pid=6484 comm="syz.0.1386" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1062.047531][ T30] audit: type=1400 audit(1061.360:234): avc: denied { read append } for pid=6492 comm="syz.0.1390" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1062.048997][ T30] audit: type=1400 audit(1061.370:235): avc: denied { open } for pid=6492 comm="syz.0.1390" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1062.080135][ T30] audit: type=1400 audit(1061.410:236): avc: denied { write } for pid=6492 comm="syz.0.1390" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1062.097300][ T30] audit: type=1400 audit(1061.420:237): avc: denied { ioctl } for pid=6492 comm="syz.0.1390" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1073.914285][ T30] audit: type=1400 audit(1073.240:238): avc: denied { ioctl } for pid=6550 comm="syz.2.1419" path="socket:[14280]" dev="sockfs" ino=14280 ioctlcmd=0x4d76 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1122.436969][ T30] audit: type=1400 audit(1121.760:239): avc: denied { read } for pid=6742 comm="syz.0.1511" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1122.438094][ T30] audit: type=1400 audit(1121.760:240): avc: denied { open } for pid=6742 comm="syz.0.1511" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1122.657598][ T30] audit: type=1400 audit(1121.970:241): avc: denied { map } for pid=6742 comm="syz.0.1511" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1122.710394][ T30] audit: type=1400 audit(1122.010:242): avc: denied { ioctl } for pid=6742 comm="syz.0.1511" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x9204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1138.051187][ T30] audit: type=1400 audit(1137.380:243): avc: denied { map_create } for pid=6799 comm="syz.0.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1138.071825][ T30] audit: type=1400 audit(1137.400:244): avc: denied { map_read map_write } for pid=6799 comm="syz.0.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1138.102301][ T30] audit: type=1400 audit(1137.430:245): avc: denied { prog_load } for pid=6799 comm="syz.0.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1138.128849][ T30] audit: type=1400 audit(1137.460:246): avc: denied { prog_run } for pid=6799 comm="syz.0.1537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1139.790231][ T30] audit: type=1400 audit(1139.120:247): avc: denied { append } for pid=6805 comm="syz.2.1540" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1140.062161][ T30] audit: type=1400 audit(1139.390:248): avc: denied { getattr } for pid=6807 comm="syz.0.1541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1142.111332][ T30] audit: type=1400 audit(1141.440:249): avc: denied { bind } for pid=6816 comm="syz.2.1546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1142.113659][ T30] audit: type=1400 audit(1141.440:250): avc: denied { node_bind } for pid=6816 comm="syz.2.1546" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1143.780545][ T30] audit: type=1400 audit(1143.100:251): avc: denied { create } for pid=6826 comm="syz.0.1551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1143.840859][ T30] audit: type=1400 audit(1143.170:252): avc: denied { setopt } for pid=6826 comm="syz.0.1551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1150.307587][ T30] audit: type=1400 audit(1149.630:253): avc: denied { getopt } for pid=6849 comm="syz.0.1562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1185.290723][ T6977] ======================================================= [ 1185.290723][ T6977] WARNING: The mand mount option has been deprecated and [ 1185.290723][ T6977] and is ignored by this kernel. Remove the mand [ 1185.290723][ T6977] option from the mount to silence this warning. [ 1185.290723][ T6977] ======================================================= [ 1185.343482][ T30] audit: type=1400 audit(1184.670:254): avc: denied { remount } for pid=6976 comm="syz.0.1623" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1195.251756][ T30] audit: type=1400 audit(1194.580:255): avc: denied { connect } for pid=7018 comm="syz.0.1643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1215.283686][ T30] audit: type=1400 audit(1214.610:256): avc: denied { create } for pid=7099 comm="syz.0.1681" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1215.300927][ T30] audit: type=1400 audit(1214.630:257): avc: denied { map } for pid=7099 comm="syz.0.1681" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=16646 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1215.302123][ T30] audit: type=1400 audit(1214.630:258): avc: denied { read write } for pid=7099 comm="syz.0.1681" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=16646 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1228.064542][ T30] audit: type=1400 audit(1227.390:259): avc: denied { read write } for pid=7158 comm="syz.2.1711" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1228.065938][ T30] audit: type=1400 audit(1227.390:260): avc: denied { open } for pid=7158 comm="syz.2.1711" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1228.079917][ T30] audit: type=1400 audit(1227.410:261): avc: denied { ioctl } for pid=7158 comm="syz.2.1711" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1228.106621][ T7159] binder: 7158:7159 ioctl c0306201 0 returned -14 [ 1228.110941][ T7159] binder: 7158:7159 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1228.119730][ T7159] binder: 7159 RLIMIT_NICE not set [ 1228.121299][ T7159] binder: 7158:7159 ioctl c0306201 20000300 returned -11 [ 1233.174676][ T7185] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7185 comm=syz.2.1723 [ 1248.049760][ T30] audit: type=1400 audit(1247.360:262): avc: denied { ioctl } for pid=7247 comm="syz.0.1758" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=16920 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1251.817390][ T30] audit: type=1400 audit(1251.140:263): avc: denied { mount } for pid=7261 comm="syz.2.1760" name="/" dev="ramfs" ino=16951 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1251.887524][ T30] audit: type=1400 audit(1251.210:264): avc: denied { unmount } for pid=5541 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1252.629681][ T30] audit: type=1400 audit(1251.960:265): avc: denied { execute } for pid=7264 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1252.670905][ T30] audit: type=1400 audit(1251.990:266): avc: denied { execute_no_trans } for pid=7264 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1252.762067][ T40] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1253.226586][ T40] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1253.641823][ T40] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1254.022175][ T40] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1255.554693][ T30] audit: type=1400 audit(1254.880:267): avc: denied { ioctl } for pid=7272 comm="syz.0.1766" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1259.123662][ T3466] smc: removing ib device syz2 [ 1259.128804][ T40] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1259.193939][ T40] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1259.250957][ T40] bond0 (unregistering): Released all slaves [ 1269.726995][ T40] unregister_netdevice: waiting for bond0 to become free. Usage count = 2 [ 1269.730906][ T40] ref_tracker: netdev@000000005e1e6f13 has 1/1 users at [ 1269.730906][ T40] ib_device_set_netdev+0x1c8/0x5b8 [ 1269.730906][ T40] rxe_register_device+0x208/0x300 [ 1269.730906][ T40] rxe_add+0xd50/0x10e0 [ 1269.730906][ T40] rxe_net_add+0x9c/0x100 [ 1269.730906][ T40] rxe_newlink+0x58/0x158 [ 1269.730906][ T40] nldev_newlink+0x284/0x4a0 [ 1269.730906][ T40] rdma_nl_rcv_msg+0x280/0x584 [ 1269.730906][ T40] rdma_nl_rcv_skb.constprop.0.isra.0+0x1fc/0x338 [ 1269.730906][ T40] rdma_nl_rcv+0x10/0x1c [ 1269.730906][ T40] netlink_unicast+0x420/0x6f0 [ 1269.730906][ T40] netlink_sendmsg+0x638/0xa4c [ 1269.730906][ T40] __sock_sendmsg+0xc8/0x168 [ 1269.730906][ T40] ____sys_sendmsg+0x524/0x730 [ 1269.730906][ T40] ___sys_sendmsg+0x124/0x1a4 [ 1269.730906][ T40] __sys_sendmsg+0x118/0x1a4 [ 1269.730906][ T40] __arm64_sys_sendmsg+0x70/0xa0 [ 1269.730906][ T40] [ 1269.772904][ T30] audit: type=1400 audit(1269.100:268): avc: denied { read } for pid=3128 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 SYZFAIL: failed to recv rpc [ 1269.861485][ T30] audit: type=1400 audit(1269.190:269): avc: denied { search } for pid=3128 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1269.896340][ T30] audit: type=1400 audit(1269.220:270): avc: denied { search } for pid=3128 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1269.897616][ T30] audit: type=1400 audit(1269.220:271): avc: denied { add_name } for pid=3128 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1269.897997][ T30] audit: type=1400 audit(1269.220:272): avc: denied { create } for pid=3128 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1269.914403][ T30] audit: type=1400 audit(1269.240:273): avc: denied { append open } for pid=3128 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1269.921203][ T30] audit: type=1400 audit(1269.240:274): avc: denied { getattr } for pid=3128 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1278.890618][ T40] hsr_slave_0: left promiscuous mode [ 1278.921333][ T40] hsr_slave_1: left promiscuous mode [ 1279.024227][ T40] veth1_macvtap: left promiscuous mode [ 1279.027882][ T40] veth0_macvtap: left promiscuous mode [ 1279.031052][ T40] veth1_vlan: left promiscuous mode [ 1279.033390][ T40] veth0_vlan: left promiscuous mode [ 1285.839499][ T40] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1286.161831][ T40] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1286.437587][ T40] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1286.700835][ T40] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1291.523866][ T40] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1291.621600][ T40] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1291.689999][ T40] bond0 (unregistering): Released all slaves [ 1292.168969][ T40] hsr_slave_0: left promiscuous mode [ 1292.203711][ T40] hsr_slave_1: left promiscuous mode [ 1292.278870][ T40] veth1_macvtap: left promiscuous mode [ 1292.281136][ T40] veth0_macvtap: left promiscuous mode [ 1292.286306][ T40] veth1_vlan: left promiscuous mode [ 1292.288425][ T40] veth0_vlan: left promiscuous mode [ 1297.037659][ T40] lo (unregistering): left allmulticast mode