last executing test programs: 54.587652869s ago: executing program 0 (id=9931): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x40800000000000, 0x800000000000000}}}, 0xb8}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r1, &(0x7f0000000140)={@val={0x0, 0x800}, @val={0x1, 0x0, 0x0, 0x0, 0x14}, @ipv4=@icmp={{0x5, 0x4, 0x0, 0x0, 0x8016, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010100, @local}, @dest_unreach={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @local, @loopback}}}}, 0xfdef) 48.327274588s ago: executing program 0 (id=9932): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x34, 0x24, 0xf0b, 0x0, 0x1000000, {0x60, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r5 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r5, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x11, 0x86dd, r4, 0x1, 0x0, 0x6, @multicast}, 0x14) 45.96260222s ago: executing program 0 (id=9933): socket$vsock_stream(0x28, 0x5, 0x28) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @dev}, 0x10, 0x0}, 0x30004081) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff0000000000010902"], 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100)=r1, 0x4) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0xeafbff3, &(0x7f0000000000)=[{&(0x7f0000000300)="b8", 0xfffffdef}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 34.258804926s ago: executing program 0 (id=9934): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x1c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newnexthop={0x1c, 0x68, 0x5fb9a818fb7378e9, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000380)=ANY=[@ANYBLOB="300000001800dd8d000000000000000002000000000000060000000008001e0002"], 0x30}}, 0x4090) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000180)={0xffffff}, 0x10) write(r3, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00000000000000000000000800040001000000", 0x24) 32.414633327s ago: executing program 0 (id=9935): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x2) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x0) 31.246260107s ago: executing program 0 (id=9936): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='rdma.current\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f00000001c0)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x40, 0x1c, 0x1, 0x101, 0x3}}) 4.82729457s ago: executing program 1 (id=9955): sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.events\x00', 0x26e1, 0x0) close(r0) syz_open_dev$usbfs(&(0x7f0000000140), 0x73, 0x1501) ioctl$TIOCGPTPEER(r0, 0x5441, 0x94) 4.558139861s ago: executing program 1 (id=9956): r0 = socket(0x10, 0x80002, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[], 0x64}, 0x1, 0x0, 0x0, 0x4004001}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000013000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="00000000000000001c001a8018000580140006800800020000000000080001"], 0x3c}, 0x1, 0x0, 0x0, 0x40000000}, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 4.088562587s ago: executing program 1 (id=9957): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xffe0}, {0xffff, 0xffff}, {0xd}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x10, 0x3, 0x1, 0x1}}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x51}, 0x20040000) sendmmsg$inet(r0, &(0x7f0000000cc0)=[{{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000011c0)="93bffce623851797a8dc79018d7716840ffc6941c667f6d345b18bc896d8f016f5f206bb2b0eb2fe32d2f0048678cd35ef833c35225ff95a94770a6845b091e69f243dea0d601c54e9c93ee3568b89a3427c84262ff67b679ccac305b5cea1dcd151d7bb5754603b6b0e362d8041bd", 0x6f}], 0x1}}], 0x1, 0xc0) 3.597509084s ago: executing program 1 (id=9958): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xc}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x6, 0x8003, 0x1, 0x0, 0xffffffff, 0x91b1}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000400}, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0x1000000, 0x0, 0x0) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) mkdirat(0xffffffffffffff9c, 0x0, 0x140) mount(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x50, 0x24, 0xd0f, 0x0, 0x0, {0x60, 0x0, 0x0, r6, {}, {0x10, 0xa}, {0x9}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x1c, 0x2, [@TCA_FQ_CODEL_TARGET={0x8, 0x1, 0x1}, @TCA_FQ_CODEL_INTERVAL={0x8, 0x3, 0x7}, @TCA_FQ_CODEL_LIMIT={0x8, 0x2, 0x2c}]}}]}, 0x50}}, 0x4000) 479.465363ms ago: executing program 1 (id=9959): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581d7"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000001540)={0x24, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00220f"], 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000080), 0x0, 0x0) ioctl$HIDIOCGREPORT(r1, 0x400c4807, &(0x7f0000000040)={0x7, 0x2, 0x6}) 0s ago: executing program 1 (id=9960): r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000480)=""/199) kernel console output (not intermixed with test programs): :sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3148.413862][ T30] audit: type=1400 audit(3148.030:431): avc: denied { write } for pid=18242 comm="syz.0.6437" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3154.661481][T18252] serio: Serial port pts1 [ 3160.151559][ T30] audit: type=1400 audit(3159.770:432): avc: denied { ioctl } for pid=18266 comm="syz.1.6445" path="/dev/vsock" dev="devtmpfs" ino=745 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3168.039445][ T30] audit: type=1400 audit(3167.620:433): avc: denied { write } for pid=18275 comm="syz.1.6448" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3178.482164][ T30] audit: type=1400 audit(3178.100:434): avc: denied { write } for pid=18292 comm="syz.1.6454" name="xfrm_stat" dev="proc" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3179.413914][T18296] serio: Serial port pts0 [ 3186.856626][T18310] serio: Serial port pts0 [ 3188.236209][T18316] serio: Serial port pts1 [ 3224.443737][ T30] audit: type=1400 audit(3224.050:435): avc: denied { create } for pid=18355 comm="syz.1.6469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3224.444310][ T30] audit: type=1400 audit(3224.060:436): avc: denied { ioctl } for pid=18355 comm="syz.1.6469" path="socket:[60572]" dev="sockfs" ino=60572 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3224.447072][T18356] veth0_vlan: left promiscuous mode [ 3226.789979][T18363] serio: Serial port pts0 [ 3227.560884][T18367] serio: Serial port pts1 [ 3233.894429][ T30] audit: type=1400 audit(3233.480:437): avc: denied { create } for pid=18384 comm="syz.0.6473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3235.465911][ T30] audit: type=1400 audit(3235.080:438): avc: denied { write } for pid=18394 comm="syz.1.6476" name="nvme-fabrics" dev="devtmpfs" ino=679 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3238.108912][T18402] serio: Serial port pts0 [ 3244.408260][T18418] serio: Serial port pts0 [ 3245.562885][ T30] audit: type=1400 audit(3245.180:439): avc: denied { create } for pid=18422 comm="syz.0.6482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 3253.889339][ T30] audit: type=1400 audit(3253.500:440): avc: denied { search } for pid=18439 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3253.975212][ T30] audit: type=1400 audit(3253.590:441): avc: denied { read } for pid=18441 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3253.981000][ T30] audit: type=1400 audit(3253.600:442): avc: denied { open } for pid=18441 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3253.986738][ T30] audit: type=1400 audit(3253.600:443): avc: denied { getattr } for pid=18441 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3254.169531][ T30] audit: type=1400 audit(3253.770:444): avc: denied { write } for pid=18439 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=937 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3254.170104][ T30] audit: type=1400 audit(3253.780:445): avc: denied { add_name } for pid=18439 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3254.170538][ T30] audit: type=1400 audit(3253.780:446): avc: denied { create } for pid=18439 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3254.170847][ T30] audit: type=1400 audit(3253.780:447): avc: denied { write open } for pid=18439 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=14497 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3254.171168][ T30] audit: type=1400 audit(3253.780:448): avc: denied { append } for pid=18439 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=14497 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3254.207070][ T30] audit: type=1400 audit(3253.820:449): avc: denied { getattr } for pid=18439 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3263.336573][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 3263.337154][ T30] audit: type=1326 audit(3262.950:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18458 comm="syz.0.6492" exe="/syz-executor" sig=31 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x0 [ 3266.543036][T18469] serio: Serial port pts0 [ 3273.223571][T18487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18487 comm=syz.0.6498 [ 3273.706472][ T30] audit: type=1400 audit(3273.320:457): avc: denied { create } for pid=18488 comm="syz.0.6500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3273.721282][ T30] audit: type=1400 audit(3273.340:458): avc: denied { ioctl } for pid=18488 comm="syz.0.6500" path="socket:[61786]" dev="sockfs" ino=61786 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3273.937583][ T30] audit: type=1400 audit(3273.550:459): avc: denied { ioctl } for pid=18490 comm="syz.1.6499" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3275.432167][ T30] audit: type=1400 audit(3275.050:460): avc: denied { block_suspend } for pid=18492 comm="syz.1.6501" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3280.911126][T18507] serio: Serial port pts0 [ 3281.148279][T18509] serio: Serial port pts1 [ 3290.197522][ T30] audit: type=1400 audit(3289.810:461): avc: denied { create } for pid=18539 comm="syz.1.6510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3291.143660][ T30] audit: type=1400 audit(3290.750:462): avc: denied { execute_no_trans } for pid=18542 comm="syz.1.6511" path="/2975/file1" dev="tmpfs" ino=16070 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3291.732248][ T30] audit: type=1400 audit(3291.350:463): avc: denied { create } for pid=18545 comm="syz.0.6513" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3291.767670][ T30] audit: type=1400 audit(3291.380:464): avc: denied { create } for pid=18545 comm="syz.0.6513" name="file5" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3292.336059][ T30] audit: type=1400 audit(3291.950:465): avc: denied { unlink } for pid=10699 comm="syz-executor" name="file5" dev="tmpfs" ino=9533 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3292.416199][ T30] audit: type=1400 audit(3292.030:466): avc: denied { unlink } for pid=10699 comm="syz-executor" name="file0" dev="tmpfs" ino=9528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3301.611359][ T30] audit: type=1400 audit(3301.230:467): avc: denied { create } for pid=18580 comm="syz.0.6525" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3301.622473][ T30] audit: type=1400 audit(3301.240:468): avc: denied { ioctl } for pid=18580 comm="syz.0.6525" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=60980 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3313.084048][ T30] audit: type=1400 audit(3312.700:469): avc: denied { getattr } for pid=18594 comm="syz.1.6529" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3313.730247][T18597] serio: Serial port pts0 [ 3320.747800][T18609] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3320.753038][T18609] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3321.570626][ T30] audit: type=1400 audit(3321.190:470): avc: denied { read write } for pid=18610 comm="syz.0.6531" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3321.573285][ T30] audit: type=1400 audit(3321.190:471): avc: denied { open } for pid=18610 comm="syz.0.6531" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3321.610975][ T30] audit: type=1400 audit(3321.230:472): avc: denied { ioctl } for pid=18610 comm="syz.0.6531" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0x9408 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3325.940005][ T30] audit: type=1400 audit(3325.560:473): avc: denied { getopt } for pid=18630 comm="syz.1.6542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3326.506115][T18634] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=18634 comm=syz.0.6543 [ 3327.379262][ T30] audit: type=1400 audit(3326.990:474): avc: denied { write } for pid=18636 comm="syz.1.6546" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 3328.179826][ T30] audit: type=1400 audit(3327.790:475): avc: denied { nlmsg_write } for pid=18640 comm="syz.1.6547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3331.401858][ T30] audit: type=1400 audit(3331.020:476): avc: denied { read } for pid=18653 comm="syz.0.6553" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3331.403870][ T30] audit: type=1400 audit(3331.020:477): avc: denied { open } for pid=18653 comm="syz.0.6553" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3331.530345][ T30] audit: type=1400 audit(3331.040:478): avc: denied { ioctl } for pid=18653 comm="syz.0.6553" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x6404 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3331.966185][ T30] audit: type=1400 audit(3331.580:479): avc: denied { read } for pid=18656 comm="syz.1.6555" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3332.001981][ T30] audit: type=1400 audit(3331.620:480): avc: denied { open } for pid=18656 comm="syz.1.6555" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3332.025754][ T30] audit: type=1400 audit(3331.640:481): avc: denied { ioctl } for pid=18656 comm="syz.1.6555" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x127e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3333.749654][ T30] audit: type=1400 audit(3333.330:482): avc: denied { setopt } for pid=18663 comm="syz.1.6559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3334.574627][T18668] sctp: [Deprecated]: syz.1.6560 (pid 18668) Use of int in maxseg socket option. [ 3334.574627][T18668] Use struct sctp_assoc_value instead [ 3334.673762][ T30] audit: type=1400 audit(3334.280:483): avc: denied { create } for pid=18667 comm="syz.0.6561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3334.682574][ T30] audit: type=1400 audit(3334.300:484): avc: denied { write } for pid=18667 comm="syz.0.6561" path="socket:[61169]" dev="sockfs" ino=61169 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3335.397606][ T30] audit: type=1400 audit(3335.010:485): avc: denied { allowed } for pid=18670 comm="syz.1.6562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3335.741399][ T30] audit: type=1400 audit(3335.360:486): avc: denied { create } for pid=18672 comm="syz.0.6563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3335.803953][ T30] audit: type=1400 audit(3335.420:487): avc: denied { ioctl } for pid=18672 comm="syz.0.6563" path="socket:[61180]" dev="sockfs" ino=61180 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3336.594316][ T30] audit: type=1400 audit(3336.210:488): avc: denied { create } for pid=18676 comm="syz.0.6565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3336.710961][ T30] audit: type=1400 audit(3336.330:489): avc: denied { write } for pid=18676 comm="syz.0.6565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3337.013117][ T30] audit: type=1400 audit(3336.620:490): avc: denied { setattr } for pid=18678 comm="syz.1.6566" name="pcmC0D0c" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 3337.669178][ T30] audit: type=1400 audit(3337.280:491): avc: denied { create } for pid=18680 comm="syz.0.6567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3339.161835][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 3339.162385][ T30] audit: type=1400 audit(3338.780:494): avc: denied { read } for pid=18688 comm="syz.1.6571" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3339.187373][ T30] audit: type=1400 audit(3338.780:495): avc: denied { open } for pid=18688 comm="syz.1.6571" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3339.295626][ T30] audit: type=1400 audit(3338.910:496): avc: denied { ioctl } for pid=18688 comm="syz.1.6571" path="/dev/usbmon0" dev="devtmpfs" ino=695 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3339.883813][ T30] audit: type=1400 audit(3339.490:497): avc: denied { getopt } for pid=18690 comm="syz.0.6572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3341.476090][ T30] audit: type=1400 audit(3341.090:498): avc: denied { read } for pid=18696 comm="syz.1.6576" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 3341.478117][ T30] audit: type=1400 audit(3341.090:499): avc: denied { open } for pid=18696 comm="syz.1.6576" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 3344.227988][ T30] audit: type=1400 audit(3343.840:500): avc: denied { mac_admin } for pid=18702 comm="syz.1.6578" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3344.272258][T18703] SELinux: Context system_u:object_r:systemd_tmpfiles_exec_t:s0 is not valid (left unmapped). [ 3344.301357][ T30] audit: type=1400 audit(3343.900:501): avc: denied { relabelto } for pid=18702 comm="syz.1.6578" name="3013" dev="tmpfs" ino=16258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:systemd_tmpfiles_exec_t:s0" [ 3344.303355][ T30] audit: type=1400 audit(3343.920:502): avc: denied { associate } for pid=18702 comm="syz.1.6578" name="3013" dev="tmpfs" ino=16258 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:systemd_tmpfiles_exec_t:s0" [ 3344.544634][ T30] audit: type=1400 audit(3344.150:503): avc: denied { write } for pid=3310 comm="syz-executor" name="3013" dev="tmpfs" ino=16258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:systemd_tmpfiles_exec_t:s0" [ 3344.599544][ T30] audit: type=1400 audit(3344.210:504): avc: denied { remove_name } for pid=3310 comm="syz-executor" name="binderfs" dev="tmpfs" ino=16262 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:systemd_tmpfiles_exec_t:s0" [ 3344.660714][ T30] audit: type=1400 audit(3344.270:505): avc: denied { rmdir } for pid=3310 comm="syz-executor" name="3013" dev="tmpfs" ino=16258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:systemd_tmpfiles_exec_t:s0" [ 3347.919575][ T30] audit: type=1400 audit(3347.530:506): avc: denied { write } for pid=18715 comm="syz.1.6585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3350.332360][ T30] audit: type=1400 audit(3349.950:507): avc: denied { create } for pid=18724 comm="syz.1.6590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3350.351743][ T30] audit: type=1400 audit(3349.960:508): avc: denied { ioctl } for pid=18724 comm="syz.1.6590" path="socket:[61313]" dev="sockfs" ino=61313 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3350.581124][ T30] audit: type=1400 audit(3350.200:509): avc: denied { write } for pid=18725 comm="syz.0.6589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3358.937373][ T30] audit: type=1400 audit(3358.550:510): avc: denied { write } for pid=18758 comm="syz.1.6606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3361.719423][ T30] audit: type=1400 audit(3361.310:511): avc: denied { setopt } for pid=18770 comm="syz.1.6612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3362.236517][ T30] audit: type=1400 audit(3361.850:512): avc: denied { read write } for pid=18772 comm="syz.1.6614" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 3362.241962][ T30] audit: type=1400 audit(3361.860:513): avc: denied { open } for pid=18772 comm="syz.1.6614" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 3362.252420][ T30] audit: type=1400 audit(3361.870:514): avc: denied { setattr } for pid=18772 comm="syz.1.6614" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 3366.609745][ T30] audit: type=1400 audit(3366.220:515): avc: denied { ioctl } for pid=18790 comm="syz.0.6622" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3371.506735][ T30] audit: type=1400 audit(3371.120:516): avc: denied { setattr } for pid=18809 comm="syz.1.6632" name="NETLINK" dev="sockfs" ino=62451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 3372.749821][ T30] audit: type=1400 audit(3372.360:517): avc: denied { write } for pid=18814 comm="syz.0.6634" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3373.877845][ T30] audit: type=1400 audit(3373.490:518): avc: denied { ioctl } for pid=18819 comm="syz.1.6637" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3376.859134][ T30] audit: type=1400 audit(3376.470:519): avc: denied { getopt } for pid=18831 comm="syz.0.6642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3382.390569][ T30] audit: type=1400 audit(3382.000:520): avc: denied { setopt } for pid=18857 comm="syz.1.6656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3382.930728][T18861] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18861 comm=syz.1.6657 [ 3384.349706][ T30] audit: type=1400 audit(3383.960:521): avc: denied { create } for pid=18866 comm="syz.1.6660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3384.383813][ T30] audit: type=1400 audit(3383.990:522): avc: denied { ioctl } for pid=18866 comm="syz.1.6660" path="socket:[62637]" dev="sockfs" ino=62637 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3388.138215][ T30] audit: type=1400 audit(3387.750:523): avc: denied { read } for pid=18884 comm="syz.0.6668" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3391.623688][ T30] audit: type=1400 audit(3391.240:524): avc: denied { write } for pid=18900 comm="syz.1.6677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 3394.884199][ T30] audit: type=1400 audit(3394.500:525): avc: denied { create } for pid=18914 comm="syz.1.6685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3394.929081][ T30] audit: type=1400 audit(3394.540:526): avc: denied { getopt } for pid=18914 comm="syz.1.6685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3395.768873][ T30] audit: type=1400 audit(3395.380:527): avc: denied { ioctl } for pid=18918 comm="syz.1.6686" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 3396.545309][ T30] audit: type=1400 audit(3396.160:528): avc: denied { write } for pid=18921 comm="syz.1.6688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3397.751050][ T30] audit: type=1400 audit(3397.370:529): avc: denied { ioctl } for pid=18925 comm="syz.0.6690" path="socket:[62750]" dev="sockfs" ino=62750 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3399.623825][ T30] audit: type=1400 audit(3399.180:530): avc: denied { ioctl } for pid=18934 comm="syz.1.6694" path="socket:[62772]" dev="sockfs" ino=62772 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3400.269506][ T30] audit: type=1400 audit(3399.870:531): avc: denied { getopt } for pid=18938 comm="syz.1.6696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3401.765916][ T30] audit: type=1400 audit(3401.380:532): avc: denied { setopt } for pid=18944 comm="syz.1.6699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3402.973594][ T30] audit: type=1400 audit(3402.590:533): avc: denied { read write } for pid=18949 comm="syz.1.6702" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3402.980924][ T30] audit: type=1400 audit(3402.600:534): avc: denied { open } for pid=18949 comm="syz.1.6702" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3407.411358][ T30] audit: type=1400 audit(3407.030:535): avc: denied { read } for pid=18964 comm="syz.0.6709" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 3407.413610][ T30] audit: type=1400 audit(3407.030:536): avc: denied { open } for pid=18964 comm="syz.0.6709" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 3408.183198][ T30] audit: type=1400 audit(3407.800:537): avc: denied { read } for pid=18968 comm="syz.1.6711" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3408.185157][ T30] audit: type=1400 audit(3407.800:538): avc: denied { open } for pid=18968 comm="syz.1.6711" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3408.231660][ T30] audit: type=1400 audit(3407.850:539): avc: denied { ioctl } for pid=18968 comm="syz.1.6711" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x660b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 3410.005365][ T30] audit: type=1400 audit(3409.620:540): avc: denied { write } for pid=18976 comm="syz.0.6714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3410.324447][ T30] audit: type=1400 audit(3409.940:541): avc: denied { ioctl } for pid=18978 comm="syz.1.6716" path="socket:[63830]" dev="sockfs" ino=63830 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3410.919289][T18982] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=18982 comm=syz.1.6718 [ 3410.959543][ T30] audit: type=1400 audit(3410.530:542): avc: denied { write } for pid=18981 comm="syz.1.6718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3413.204036][ T30] audit: type=1400 audit(3412.820:543): avc: denied { setopt } for pid=18991 comm="syz.0.6722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3415.976184][ T30] audit: type=1400 audit(3415.590:544): avc: denied { create } for pid=19004 comm="syz.1.6729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3416.041240][ T30] audit: type=1400 audit(3415.650:545): avc: denied { ioctl } for pid=19004 comm="syz.1.6729" path="socket:[62904]" dev="sockfs" ino=62904 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3419.222890][ T30] audit: type=1400 audit(3418.840:546): avc: denied { setopt } for pid=19016 comm="syz.1.6736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3429.314044][ T30] audit: type=1400 audit(3428.930:547): avc: denied { map } for pid=19059 comm="syz.1.6757" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=63032 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3429.316127][ T30] audit: type=1400 audit(3428.930:548): avc: denied { read write } for pid=19059 comm="syz.1.6757" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=63032 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3432.893007][ T30] audit: type=1400 audit(3432.510:549): avc: denied { append } for pid=19072 comm="syz.1.6764" name="dlm_plock" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3433.619907][T19079] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19079 comm=syz.1.6766 [ 3434.786083][ T30] audit: type=1400 audit(3434.400:550): avc: denied { read } for pid=19082 comm="syz.0.6767" path="socket:[63077]" dev="sockfs" ino=63077 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3436.180678][T19088] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=19088 comm=syz.0.6770 [ 3438.864965][ T30] audit: type=1400 audit(3438.470:551): avc: denied { write } for pid=19097 comm="syz.0.6775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3439.482941][ T30] audit: type=1400 audit(3439.100:552): avc: denied { getopt } for pid=19100 comm="syz.1.6777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3440.329960][ T30] audit: type=1400 audit(3439.920:553): avc: denied { write } for pid=19104 comm="syz.1.6779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3441.250472][ T30] audit: type=1400 audit(3440.870:554): avc: denied { write } for pid=19106 comm="syz.0.6780" name="AF_VSOCK" dev="sockfs" ino=64121 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3450.511678][ T30] audit: type=1400 audit(3450.130:555): avc: denied { ioctl } for pid=19150 comm="syz.1.6803" path="socket:[64253]" dev="sockfs" ino=64253 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3450.951918][ T30] audit: type=1400 audit(3450.570:556): avc: denied { read write } for pid=19152 comm="syz.0.6802" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 3450.961388][ T30] audit: type=1400 audit(3450.580:557): avc: denied { open } for pid=19152 comm="syz.0.6802" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 3454.999410][ T30] audit: type=1400 audit(3454.590:558): avc: denied { setopt } for pid=19173 comm="syz.1.6814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3455.687603][ T30] audit: type=1400 audit(3455.300:559): avc: denied { read } for pid=19176 comm="syz.1.6815" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 3455.701268][ T30] audit: type=1400 audit(3455.320:560): avc: denied { open } for pid=19176 comm="syz.1.6815" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 3455.731275][ T30] audit: type=1400 audit(3455.350:561): avc: denied { ioctl } for pid=19176 comm="syz.1.6815" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 3457.872587][ T30] audit: type=1400 audit(3457.490:562): avc: denied { read } for pid=19186 comm="syz.1.6820" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3457.875288][ T30] audit: type=1400 audit(3457.490:563): avc: denied { open } for pid=19186 comm="syz.1.6820" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3460.553395][ T30] audit: type=1400 audit(3460.170:564): avc: denied { setattr } for pid=19194 comm="syz.0.6823" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 3462.117060][T19203] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=19203 comm=syz.1.6828 [ 3465.454104][T19218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19218 comm=syz.1.6836 [ 3471.715557][ T30] audit: type=1400 audit(3471.330:565): avc: denied { write } for pid=19243 comm="syz.1.6849" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 3483.121426][ T30] audit: type=1400 audit(3482.740:566): avc: denied { read } for pid=19293 comm="syz.1.6874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3487.609322][ T30] audit: type=1400 audit(3487.210:567): avc: denied { write } for pid=19312 comm="syz.1.6883" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 3492.725333][ T30] audit: type=1400 audit(3492.340:568): avc: denied { ioctl } for pid=19336 comm="syz.1.6894" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3313 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 3493.566191][ T30] audit: type=1400 audit(3493.180:569): avc: denied { create } for pid=19340 comm="syz.1.6896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3493.585896][ T30] audit: type=1400 audit(3493.200:570): avc: denied { write } for pid=19340 comm="syz.1.6896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3501.184678][T19373] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=19373 comm=syz.0.6912 [ 3520.649632][T19464] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19464 comm=syz.1.6958 [ 3522.365344][ T30] audit: type=1400 audit(3521.980:571): avc: denied { create } for pid=19471 comm="syz.1.6962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 3522.383928][ T30] audit: type=1400 audit(3522.000:572): avc: denied { write } for pid=19471 comm="syz.1.6962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 3524.303603][ T30] audit: type=1400 audit(3523.920:573): avc: denied { bind } for pid=19481 comm="syz.1.6966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3524.980603][T19486] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=19486 comm=syz.1.6968 [ 3525.731048][ T30] audit: type=1400 audit(3525.350:574): avc: denied { setattr } for pid=19487 comm="syz.1.6970" name="NFC_LLCP" dev="sockfs" ino=64951 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3529.104811][ T30] audit: type=1400 audit(3528.720:575): avc: denied { setattr } for pid=19498 comm="syz.0.6974" name="dlm_plock" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3531.431261][ T30] audit: type=1400 audit(3531.050:576): avc: denied { ioctl } for pid=19510 comm="syz.0.6979" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 3535.839543][T19531] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=19531 comm=syz.1.6991 [ 3536.366243][ T30] audit: type=1400 audit(3535.980:577): avc: denied { write } for pid=19532 comm="syz.0.6990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3538.633189][ T30] audit: type=1400 audit(3538.250:578): avc: denied { getopt } for pid=19543 comm="syz.1.6997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3549.477639][ T30] audit: type=1400 audit(3549.060:579): avc: denied { connect } for pid=19588 comm="syz.1.7019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3551.011168][ T30] audit: type=1400 audit(3550.620:580): avc: denied { ioctl } for pid=19592 comm="syz.1.7022" path="/dev/input/mice" dev="devtmpfs" ino=704 ioctlcmd=0x660b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 3566.053133][T19657] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19657 comm=syz.0.7053 [ 3568.530850][ T30] audit: type=1400 audit(3568.150:581): avc: denied { ioctl } for pid=19666 comm="syz.1.7058" path="socket:[65328]" dev="sockfs" ino=65328 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3574.407067][ T30] audit: type=1400 audit(3574.020:582): avc: denied { setattr } for pid=19693 comm="syz.0.7070" name="CAN_RAW" dev="sockfs" ino=65376 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3577.830017][ T30] audit: type=1400 audit(3577.440:583): avc: denied { setattr } for pid=19707 comm="syz.0.7077" name="[io_uring]" dev="anon_inodefs" ino=66480 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3578.341978][ T30] audit: type=1400 audit(3577.960:584): avc: denied { getopt } for pid=19709 comm="syz.1.7079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3581.610667][ T30] audit: type=1400 audit(3581.220:585): avc: denied { connect } for pid=19723 comm="syz.0.7084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3582.655975][ T30] audit: type=1400 audit(3582.270:586): avc: denied { watch watch_reads } for pid=19727 comm="syz.1.7088" path="/3330" dev="tmpfs" ino=17843 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3591.090653][ T30] audit: type=1400 audit(3590.710:587): avc: denied { getopt } for pid=19763 comm="syz.1.7105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3596.764620][ T30] audit: type=1400 audit(3596.380:588): avc: denied { bind } for pid=19788 comm="syz.1.7118" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3596.766383][ T30] audit: type=1400 audit(3596.380:589): avc: denied { node_bind } for pid=19788 comm="syz.1.7118" saddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 3602.867808][ T30] audit: type=1400 audit(3602.480:590): avc: denied { mount } for pid=19815 comm="syz.1.7132" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3603.080312][ T30] audit: type=1400 audit(3602.680:591): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3605.520091][ T30] audit: type=1400 audit(3605.130:592): avc: denied { lock } for pid=19826 comm="syz.0.7136" path="socket:[67698]" dev="sockfs" ino=67698 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3610.091967][ T30] audit: type=1400 audit(3609.710:593): avc: denied { write } for pid=19845 comm="syz.1.7146" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3612.960106][T19859] SELinux: Context system_u:object_r:tetex_data_t:s0 is not valid (left unmapped). [ 3612.969904][ T30] audit: type=1400 audit(3612.580:594): avc: denied { relabelto } for pid=19857 comm="syz.0.7152" name="tty1" dev="devtmpfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tetex_data_t:s0" [ 3612.971992][ T30] audit: type=1400 audit(3612.580:595): avc: denied { associate } for pid=19857 comm="syz.0.7152" name="tty1" dev="devtmpfs" ino=20 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:tetex_data_t:s0" [ 3615.149786][ T30] audit: type=1400 audit(3614.740:596): avc: denied { write } for pid=19866 comm="syz.1.7157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 3622.230712][ T30] audit: type=1400 audit(3621.850:597): avc: denied { getopt } for pid=19893 comm="syz.0.7168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3622.640614][ T30] audit: type=1400 audit(3622.260:598): avc: denied { setattr } for pid=19896 comm="syz.1.7170" name="NETLINK" dev="sockfs" ino=66896 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3624.875654][ T30] audit: type=1400 audit(3624.490:599): avc: denied { lock } for pid=19905 comm="syz.1.7175" path="/dev/iommu" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3627.904900][ T30] audit: type=1400 audit(3627.520:600): avc: denied { read } for pid=19917 comm="syz.1.7180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3634.402604][ T30] audit: type=1400 audit(3634.020:601): avc: denied { setattr } for pid=19947 comm="syz.1.7195" name="cuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 3636.190426][T19956] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=18 sclass=netlink_audit_socket pid=19956 comm=syz.0.7196 [ 3636.699680][ T30] audit: type=1400 audit(3636.300:602): avc: denied { ioctl } for pid=19957 comm="syz.1.7199" path="socket:[67030]" dev="sockfs" ino=67030 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3641.825236][ T30] audit: type=1400 audit(3641.440:603): avc: denied { setattr } for pid=19981 comm="syz.1.7209" name="PING" dev="sockfs" ino=67074 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3651.129178][ T30] audit: type=1400 audit(3650.740:604): avc: denied { lock } for pid=20016 comm="syz.1.7226" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3653.281469][ T30] audit: type=1400 audit(3652.900:605): avc: denied { write } for pid=20022 comm="syz.1.7229" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 3653.930801][ T30] audit: type=1400 audit(3653.540:606): avc: denied { bind } for pid=20024 comm="syz.0.7230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3657.451351][T20039] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=20039 comm=syz.0.7236 [ 3663.891568][ T30] audit: type=1400 audit(3663.510:607): avc: denied { read } for pid=20065 comm="syz.1.7251" path="socket:[68209]" dev="sockfs" ino=68209 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3665.784110][T20075] SELinux: Context system_u:object_r:dhcpc_state_t:s0 is not valid (left unmapped). [ 3665.800725][ T30] audit: type=1400 audit(3665.420:608): avc: denied { relabelto } for pid=20074 comm="syz.0.7255" name="vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcpc_state_t:s0" [ 3665.802528][ T30] audit: type=1400 audit(3665.420:609): avc: denied { associate } for pid=20074 comm="syz.0.7255" name="vcsu" dev="devtmpfs" ino=15 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:dhcpc_state_t:s0" [ 3666.901740][T20080] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20080 comm=syz.1.7258 [ 3677.121741][ T30] audit: type=1400 audit(3676.740:610): avc: denied { setcheckreqprot } for pid=20120 comm="syz.1.7278" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3683.339490][ T30] audit: type=1400 audit(3682.900:611): avc: denied { setattr } for pid=20147 comm="syz.1.7292" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 3696.194980][T20204] SELinux: Context system_u:object_r:systemd_passwd_var_run_t:s0 is not valid (left unmapped). [ 3696.199017][ T30] audit: type=1400 audit(3695.810:612): avc: denied { relabelto } for pid=20203 comm="syz.1.7319" name="vcsa" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_passwd_var_run_t:s0" [ 3696.245673][ T30] audit: type=1400 audit(3695.860:613): avc: denied { associate } for pid=20203 comm="syz.1.7319" name="vcsa" dev="devtmpfs" ino=16 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:systemd_passwd_var_run_t:s0" [ 3697.585771][T20210] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1025 sclass=netlink_route_socket pid=20210 comm=syz.1.7323 [ 3699.115574][ T30] audit: type=1400 audit(3698.730:614): avc: denied { lock } for pid=20217 comm="syz.0.7326" path="socket:[68585]" dev="sockfs" ino=68585 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 3700.080221][T20223] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=20223 comm=syz.1.7329 [ 3705.458996][ T30] audit: type=1400 audit(3705.070:615): avc: denied { setopt } for pid=20243 comm="syz.0.7339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3706.911175][ T30] audit: type=1400 audit(3706.530:616): avc: denied { getopt } for pid=20251 comm="syz.1.7343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3716.381197][T20288] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1539 sclass=netlink_xfrm_socket pid=20288 comm=syz.1.7361 [ 3717.434592][ T30] audit: type=1400 audit(3717.050:617): avc: denied { map } for pid=20289 comm="syz.1.7363" path="/dev/vcs" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 3725.710411][ T30] audit: type=1400 audit(3725.330:618): avc: denied { lock } for pid=20327 comm="syz.1.7380" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3728.291082][ T30] audit: type=1400 audit(3727.910:619): avc: denied { setattr } for pid=20338 comm="syz.1.7384" name="pfkey" dev="proc" ino=4026532786 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 3738.880467][T20381] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5133 sclass=netlink_xfrm_socket pid=20381 comm=syz.1.7406 [ 3740.654536][ T30] audit: type=1400 audit(3740.270:620): avc: denied { write } for pid=20386 comm="syz.1.7408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3740.659594][ T30] audit: type=1400 audit(3740.270:621): avc: denied { connect } for pid=20386 comm="syz.1.7408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3740.660055][ T30] audit: type=1400 audit(3740.270:622): avc: denied { name_connect } for pid=20386 comm="syz.1.7408" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 3742.423388][T20395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20395 comm=syz.0.7411 [ 3746.645451][T20413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20413 comm=syz.1.7421 [ 3752.930297][T20440] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=257 sclass=netlink_route_socket pid=20440 comm=syz.1.7435 [ 3757.040317][ T30] audit: type=1400 audit(3756.660:623): avc: denied { setopt } for pid=20455 comm="syz.1.7443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3758.785879][ T30] audit: type=1400 audit(3758.400:624): avc: denied { unmount } for pid=3310 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 3759.382689][ T30] audit: type=1400 audit(3759.000:625): avc: denied { ioctl } for pid=20464 comm="syz.0.7447" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x660b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3775.386014][ T30] audit: type=1400 audit(3775.000:626): avc: denied { open } for pid=20530 comm="syz.1.7480" path="/dev/ptyq6" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 3775.442348][ T30] audit: type=1400 audit(3775.060:627): avc: denied { ioctl } for pid=20530 comm="syz.1.7480" path="/dev/ptyq6" dev="devtmpfs" ino=117 ioctlcmd=0x5407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 3776.260456][ T30] audit: type=1400 audit(3775.880:628): avc: denied { setattr } for pid=20532 comm="syz.0.7481" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 3778.056052][T20541] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1124 sclass=netlink_xfrm_socket pid=20541 comm=syz.1.7485 [ 3787.570992][T20580] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=20580 comm=syz.0.7503 [ 3794.935500][ T30] audit: type=1400 audit(3794.550:629): avc: denied { setattr } for pid=20603 comm="syz.1.7516" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 3800.254100][ T30] audit: type=1400 audit(3799.850:630): avc: denied { mount } for pid=20625 comm="syz.1.7527" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 3803.814715][ T30] audit: type=1400 audit(3803.360:631): avc: denied { setattr } for pid=20638 comm="syz.0.7534" name="" dev="pipefs" ino=70455 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 3817.237624][T20697] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1539 sclass=netlink_xfrm_socket pid=20697 comm=syz.0.7560 [ 3818.642852][ T30] audit: type=1400 audit(3818.260:632): avc: denied { wake_alarm } for pid=20701 comm="syz.1.7564" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3821.517755][ T30] audit: type=1400 audit(3821.130:633): avc: denied { setattr } for pid=20712 comm="syz.0.7569" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 3824.213906][T20724] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20724 comm=syz.1.7575 [ 3833.584745][ T30] audit: type=1400 audit(3833.200:634): avc: denied { bind } for pid=20759 comm="syz.1.7593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3833.594427][ T30] audit: type=1400 audit(3833.210:635): avc: denied { node_bind } for pid=20759 comm="syz.1.7593" saddr=172.20.20.0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 3836.619549][T20770] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20770 comm=syz.0.7597 [ 3845.977277][ T30] audit: type=1400 audit(3845.590:636): avc: denied { getattr } for pid=20810 comm="syz.0.7618" name="[io_uring]" dev="anon_inodefs" ino=70906 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3847.696174][T20818] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2051 sclass=netlink_audit_socket pid=20818 comm=syz.1.7622 [ 3852.557889][ T30] audit: type=1400 audit(3852.170:637): avc: denied { append } for pid=20836 comm="syz.0.7631" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 3861.932288][ T30] audit: type=1400 audit(3861.540:638): avc: denied { setopt } for pid=20875 comm="syz.1.7654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3869.269746][T20906] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5122 sclass=netlink_xfrm_socket pid=20906 comm=syz.0.7665 [ 3871.023843][ T30] audit: type=1400 audit(3870.640:639): avc: denied { connect } for pid=20912 comm="syz.1.7669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3873.979804][ T30] audit: type=1400 audit(3873.550:640): avc: denied { setopt } for pid=20924 comm="syz.1.7675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3879.570282][ T30] audit: type=1400 audit(3879.190:641): avc: denied { write } for pid=20944 comm="syz.0.7685" path="socket:[71197]" dev="sockfs" ino=71197 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3889.060056][T20984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20984 comm=syz.0.7703 [ 3898.995706][ T30] audit: type=1400 audit(3898.610:642): avc: denied { connect } for pid=21023 comm="syz.0.7724" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3903.604929][T21048] ./file0: Can't lookup blockdev [ 3910.617381][T21077] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21077 comm=syz.1.7751 [ 3911.359144][ T30] audit: type=1400 audit(3910.970:643): avc: denied { lock } for pid=21079 comm="syz.1.7752" path="socket:[71526]" dev="sockfs" ino=71526 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3919.052917][T21114] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21114 comm=syz.1.7769 [ 3935.825594][T21181] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21181 comm=syz.1.7802 [ 3939.500680][T21197] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21197 comm=syz.0.7809 [ 3953.852354][ T30] audit: type=1400 audit(3953.440:644): avc: denied { read } for pid=21257 comm="syz.1.7841" path="socket:[73831]" dev="sockfs" ino=73831 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3963.316477][T21297] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=21297 comm=syz.1.7860 [ 3977.925626][T21365] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21365 comm=syz.1.7893 [ 3982.899623][ T30] audit: type=1400 audit(3982.510:645): avc: denied { setattr } for pid=21387 comm="syz.1.7905" name="ptyq6" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 3991.967340][T21427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21427 comm=syz.1.7924 [ 4009.690219][ T30] audit: type=1400 audit(4009.310:646): avc: denied { setopt } for pid=21499 comm="syz.0.7958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4015.596563][T21527] raw_sendmsg: syz.1.7971 forgot to set AF_INET. Fix it! [ 4020.237647][T21541] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=21541 comm=syz.0.7978 [ 4023.236630][ T30] audit: type=1400 audit(4022.850:647): avc: denied { lock } for pid=21551 comm="syz.0.7983" path="socket:[74420]" dev="sockfs" ino=74420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 4028.571549][ T30] audit: type=1400 audit(4028.190:648): avc: denied { nlmsg_write } for pid=21575 comm="syz.0.7994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4028.604516][ T30] audit: type=1400 audit(4028.220:649): avc: denied { read } for pid=21575 comm="syz.0.7994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4029.602950][ T30] audit: type=1400 audit(4029.220:650): avc: denied { append } for pid=21579 comm="syz.0.7997" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 4034.319870][ T30] audit: type=1400 audit(4033.930:651): avc: denied { lock } for pid=21599 comm="syz.1.8007" path="socket:[73679]" dev="sockfs" ino=73679 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4036.451225][ T30] audit: type=1400 audit(4036.070:652): avc: denied { read } for pid=21607 comm="syz.0.8015" name="vcsa" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_passwd_var_run_t:s0" [ 4036.453245][ T30] audit: type=1400 audit(4036.070:653): avc: denied { open } for pid=21607 comm="syz.0.8015" path="/dev/vcsa" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_passwd_var_run_t:s0" [ 4036.472038][ T30] audit: type=1400 audit(4036.090:654): avc: denied { setattr } for pid=21607 comm="syz.0.8015" name="vcsa" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_passwd_var_run_t:s0" [ 4037.747269][T21616] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21616 comm=syz.1.8013 [ 4040.159602][ T30] audit: type=1400 audit(4039.760:655): avc: denied { write } for pid=21623 comm="syz.1.8020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4041.624744][ T30] audit: type=1400 audit(4041.240:656): avc: denied { sqpoll } for pid=21629 comm="syz.0.8022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4042.041420][ T30] audit: type=1400 audit(4041.660:657): avc: denied { lock } for pid=21629 comm="syz.0.8022" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=74604 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4043.885243][T21641] SELinux: Context system_u:object_r:user_cron_spool_t:s0 is not valid (left unmapped). [ 4043.930087][ T30] audit: type=1400 audit(4043.530:658): avc: denied { relabelto } for pid=21640 comm="syz.1.8028" name="seq" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:user_cron_spool_t:s0" [ 4043.930724][ T30] audit: type=1400 audit(4043.530:659): avc: denied { associate } for pid=21640 comm="syz.1.8028" name="seq" dev="devtmpfs" ino=717 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:user_cron_spool_t:s0" [ 4051.240240][T21667] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21667 comm=syz.1.8040 [ 4058.977532][T21703] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21703 comm=syz.1.8058 [ 4060.121212][T21707] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1014 sclass=netlink_route_socket pid=21707 comm=syz.0.8059 [ 4060.572498][T21709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21709 comm=syz.1.8061 [ 4063.954138][T21724] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21724 comm=syz.0.8067 [ 4073.331210][ T30] audit: type=1400 audit(4072.950:660): avc: denied { listen } for pid=21755 comm="syz.1.8084" path=2F333934342FE91F7189591E9233614B scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 4074.505518][ T30] audit: type=1400 audit(4074.120:661): avc: denied { ioctl } for pid=21757 comm="syz.0.8085" path="socket:[75051]" dev="sockfs" ino=75051 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4077.334008][ T30] audit: type=1400 audit(4076.950:662): avc: denied { setopt } for pid=21769 comm="syz.0.8091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4079.775687][ T30] audit: type=1400 audit(4079.390:663): avc: denied { shutdown } for pid=21782 comm="syz.1.8097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4081.094602][ T30] audit: type=1400 audit(4080.710:664): avc: denied { bind } for pid=21785 comm="syz.0.8098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4081.152126][ T30] audit: type=1400 audit(4080.770:665): avc: denied { accept } for pid=21785 comm="syz.0.8098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4083.471910][ T30] audit: type=1400 audit(4083.090:666): avc: denied { bind } for pid=21795 comm="syz.0.8103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4083.482231][ T30] audit: type=1400 audit(4083.100:667): avc: denied { name_bind } for pid=21795 comm="syz.0.8103" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 4083.484068][ T30] audit: type=1400 audit(4083.100:668): avc: denied { node_bind } for pid=21795 comm="syz.0.8103" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 4083.500855][ T30] audit: type=1400 audit(4083.120:669): avc: denied { name_connect } for pid=21795 comm="syz.0.8103" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 4087.154061][ T30] audit: type=1400 audit(4086.770:670): avc: denied { setopt } for pid=21809 comm="syz.0.8110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4104.937984][ T30] audit: type=1400 audit(4104.550:671): avc: denied { remount } for pid=21864 comm="syz.1.8137" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4107.141946][ T30] audit: type=1400 audit(4106.760:672): avc: denied { write } for pid=21871 comm="syz.0.8140" name="seq" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:user_cron_spool_t:s0" [ 4107.171610][ T30] audit: type=1400 audit(4106.790:673): avc: denied { open } for pid=21871 comm="syz.0.8140" path="/dev/snd/seq" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:user_cron_spool_t:s0" [ 4111.185855][ T30] audit: type=1400 audit(4110.800:674): avc: denied { bind } for pid=21890 comm="syz.1.8150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4113.845335][ T30] audit: type=1400 audit(4113.460:675): avc: denied { connect } for pid=21898 comm="syz.1.8154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4113.871892][ T30] audit: type=1400 audit(4113.490:676): avc: denied { read } for pid=21898 comm="syz.1.8154" path="socket:[75388]" dev="sockfs" ino=75388 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4118.199451][ T30] audit: type=1400 audit(4117.810:677): avc: denied { read } for pid=21910 comm="syz.1.8161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4122.365227][T21927] sctp: [Deprecated]: syz.0.8168 (pid 21927) Use of int in max_burst socket option. [ 4122.365227][T21927] Use struct sctp_assoc_value instead [ 4123.612053][T21932] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=21932 comm=syz.1.8171 [ 4127.229851][T21948] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21948 comm=syz.1.8179 [ 4130.950354][T21957] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21957 comm=syz.1.8184 [ 4133.447774][T21967] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5136 sclass=netlink_audit_socket pid=21967 comm=syz.1.8187 [ 4134.861448][ T30] audit: type=1400 audit(4134.480:678): avc: denied { read } for pid=21972 comm="syz.1.8190" name="vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcpc_state_t:s0" [ 4134.888243][ T30] audit: type=1400 audit(4134.500:679): avc: denied { open } for pid=21972 comm="syz.1.8190" path="/dev/vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcpc_state_t:s0" [ 4134.993212][T21973] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21973 comm=syz.1.8190 [ 4139.231059][ T30] audit: type=1400 audit(4138.850:680): avc: denied { connect } for pid=21984 comm="syz.1.8197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4145.051882][T22000] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2567 sclass=netlink_route_socket pid=22000 comm=syz.0.8203 [ 4155.764934][ T30] audit: type=1400 audit(4155.380:681): avc: denied { set_context_mgr } for pid=22040 comm="syz.1.8224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 4155.792890][T22042] binder: 22040:22042 ioctl c018620c 20000300 returned -1 [ 4160.903232][ T30] audit: type=1400 audit(4160.520:682): avc: denied { map } for pid=22062 comm="syz.0.8232" path="socket:[76806]" dev="sockfs" ino=76806 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4160.913074][ T30] audit: type=1400 audit(4160.530:683): avc: denied { read } for pid=22062 comm="syz.0.8232" path="socket:[76806]" dev="sockfs" ino=76806 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4174.359214][ T30] audit: type=1400 audit(4173.900:684): avc: denied { listen } for pid=22110 comm="syz.1.8256" lport=38468 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4174.360113][ T30] audit: type=1400 audit(4173.910:685): avc: denied { accept } for pid=22110 comm="syz.1.8256" lport=38468 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4178.912500][ T30] audit: type=1400 audit(4178.530:686): avc: denied { read write } for pid=22125 comm="syz.1.8263" name="tty1" dev="devtmpfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tetex_data_t:s0" [ 4178.923638][ T30] audit: type=1400 audit(4178.540:687): avc: denied { open } for pid=22125 comm="syz.1.8263" path="/dev/tty1" dev="devtmpfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tetex_data_t:s0" [ 4178.928319][ T30] audit: type=1400 audit(4178.540:688): avc: denied { ioctl } for pid=22125 comm="syz.1.8263" path="/dev/tty1" dev="devtmpfs" ino=20 ioctlcmd=0x5428 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tetex_data_t:s0" [ 4183.229303][ T30] audit: type=1400 audit(4182.840:689): avc: denied { nlmsg_tty_audit } for pid=22142 comm="syz.1.8272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 4183.912058][T22147] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22147 comm=syz.0.8273 [ 4184.539205][ T30] audit: type=1400 audit(4184.150:690): avc: denied { name_bind } for pid=22149 comm="syz.1.8275" src=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 4201.243256][ T30] audit: type=1400 audit(4200.860:691): avc: denied { append } for pid=22210 comm="syz.1.8305" name="vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcpc_state_t:s0" [ 4219.872027][T22279] pimreg: entered allmulticast mode [ 4219.970577][T22279] pimreg: left allmulticast mode [ 4221.433486][ T30] audit: type=1400 audit(4221.050:692): avc: denied { getopt } for pid=22282 comm="syz.1.8340" lport=34816 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 4225.023425][ T30] audit: type=1400 audit(4224.630:693): avc: denied { mount } for pid=22298 comm="syz.1.8347" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 4232.621388][T18295] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 4232.804163][T18295] usb 1-1: Using ep0 maxpacket: 16 [ 4232.859261][T18295] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 233, using maximum allowed: 30 [ 4232.860784][T18295] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 4232.862116][T18295] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 233 [ 4233.142822][T18295] usb 1-1: New USB device found, idVendor=1870, idProduct=0001, bcdDevice=94.47 [ 4233.144088][T18295] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4233.145866][T18295] usb 1-1: Product: syz [ 4233.147112][T18295] usb 1-1: Manufacturer: syz [ 4233.149721][T18295] usb 1-1: SerialNumber: syz [ 4233.184371][T18295] usb 1-1: config 0 descriptor?? [ 4233.254437][T18295] hub 1-1:0.0: bad descriptor, ignoring hub [ 4233.259689][T18295] hub 1-1:0.0: probe with driver hub failed with error -5 [ 4233.662361][T18295] usb 1-1: USB disconnect, device number 9 [ 4234.116938][T18295] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 4234.303779][T18295] usb 1-1: Using ep0 maxpacket: 16 [ 4234.372059][T18295] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 233, using maximum allowed: 30 [ 4234.373431][T18295] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 4234.374554][T18295] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 233 [ 4234.422227][T18295] usb 1-1: New USB device found, idVendor=1870, idProduct=0001, bcdDevice=94.47 [ 4234.423440][T18295] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4234.424481][T18295] usb 1-1: Product: syz [ 4234.425210][T18295] usb 1-1: Manufacturer: syz [ 4234.425977][T18295] usb 1-1: SerialNumber: syz [ 4234.467226][T18295] usb 1-1: config 0 descriptor?? [ 4234.499875][T18295] hub 1-1:0.0: bad descriptor, ignoring hub [ 4234.501072][T18295] hub 1-1:0.0: probe with driver hub failed with error -5 [ 4234.943158][T11953] usb 1-1: USB disconnect, device number 10 [ 4243.840172][ T30] audit: type=1400 audit(4243.450:694): avc: denied { read } for pid=22369 comm="syz.0.8378" name="seq" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:user_cron_spool_t:s0" [ 4244.411462][ T30] audit: type=1400 audit(4244.030:695): avc: denied { ioctl } for pid=22369 comm="syz.0.8378" path="/dev/snd/seq" dev="devtmpfs" ino=717 ioctlcmd=0x534e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:user_cron_spool_t:s0" [ 4274.762374][T22462] serio: Serial port pts0 [ 4278.965959][T22473] serio: Serial port pts0 [ 4279.071026][T22475] serio: Serial port pts1 [ 4296.365660][ T30] audit: type=1400 audit(4295.980:696): avc: denied { create } for pid=22499 comm="syz.1.8422" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=key permissive=1 [ 4296.442416][ T30] audit: type=1400 audit(4296.060:697): avc: denied { write } for pid=22499 comm="syz.1.8422" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=key permissive=1 [ 4296.561795][ T30] audit: type=1400 audit(4296.180:698): avc: denied { search } for pid=22499 comm="syz.1.8422" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=key permissive=1 [ 4296.563827][ T30] audit: type=1400 audit(4296.180:699): avc: denied { setattr } for pid=22499 comm="syz.1.8422" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=key permissive=1 [ 4298.339617][T22505] serio: Serial port pts0 [ 4298.728211][T22507] serio: Serial port pts1 [ 4305.849990][T22515] serio: Serial port pts0 [ 4307.987465][T22522] serio: Serial port pts1 [ 4321.679280][T22527] serio: Serial port pts0 [ 4328.480005][T22535] serio: Serial port pts0 [ 4330.590915][T22543] serio: Serial port pts1 [ 4337.313297][T22550] serio: Serial port pts0 [ 4340.349709][T22557] serio: Serial port pts1 [ 4343.809254][T22561] serio: Serial port pts0 [ 4348.755537][T22567] serio: Serial port pts1 [ 4350.175964][T22571] serio: Serial port pts0 [ 4358.468259][T22579] serio: Serial port pts1 [ 4365.995221][T22585] serio: Serial port pts0 [ 4382.859538][T22597] serio: Serial port pts0 [ 4399.849844][T22613] serio: Serial port pts0 [ 4406.960613][T22627] serio: Serial port pts0 [ 4418.679448][ T30] audit: type=1400 audit(4418.290:700): avc: denied { setattr } for pid=22646 comm="syz.0.8463" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 4457.000105][ T30] audit: type=1400 audit(4456.610:701): avc: denied { setattr } for pid=22677 comm="syz.1.8478" name="RDS" dev="sockfs" ino=80168 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 4467.421685][T22719] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=22719 comm=syz.0.8498 [ 4467.743555][ T30] audit: type=1400 audit(4467.360:702): avc: denied { create } for pid=22720 comm="syz.1.8499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 4467.766032][ T30] audit: type=1400 audit(4467.370:703): avc: denied { write } for pid=22720 comm="syz.1.8499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 4472.297337][T22739] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=22739 comm=syz.1.8508 [ 4476.946718][ T30] audit: type=1400 audit(4476.560:704): avc: denied { lock } for pid=22756 comm="syz.0.8517" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 4480.990116][T22775] SELinux: syz.1.8526 (22775) set checkreqprot to 1. This is no longer supported. [ 4494.117251][T22836] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=22836 comm=syz.1.8557 [ 4495.842799][ T30] audit: type=1400 audit(4495.430:705): avc: denied { setattr } for pid=22842 comm="syz.0.8559" name="seq" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:user_cron_spool_t:s0" [ 4499.409522][T22860] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22860 comm=syz.0.8567 [ 4502.785163][ T30] audit: type=1400 audit(4502.400:706): avc: denied { lock } for pid=22874 comm="syz.1.8575" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 4506.349650][T22889] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=22889 comm=syz.1.8583 [ 4513.945619][ T30] audit: type=1400 audit(4513.560:707): avc: denied { setopt } for pid=22918 comm="syz.0.8601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 4516.625083][T22930] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=22930 comm=syz.0.8602 [ 4525.487104][ T30] audit: type=1400 audit(4525.100:708): avc: denied { write } for pid=22964 comm="syz.1.8620" name="vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcpc_state_t:s0" [ 4525.573176][ T30] audit: type=1400 audit(4525.190:709): avc: denied { setattr } for pid=22964 comm="syz.1.8620" name="vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcpc_state_t:s0" [ 4529.700607][ T30] audit: type=1400 audit(4529.320:710): avc: denied { getopt } for pid=22980 comm="syz.0.8627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4542.402129][ T30] audit: type=1400 audit(4542.020:711): avc: denied { setattr } for pid=23031 comm="syz.0.8653" name="NETLINK" dev="sockfs" ino=81956 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4544.950268][T23045] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=23045 comm=syz.1.8660 [ 4544.984889][ T30] audit: type=1400 audit(4544.600:712): avc: denied { load_policy } for pid=23042 comm="syz.0.8659" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 4544.991159][T23044] SELinux: failed to load policy [ 4557.196379][ T30] audit: type=1400 audit(4556.810:713): avc: denied { read } for pid=23086 comm="syz.1.8680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 4558.619574][T23094] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1539 sclass=netlink_tcpdiag_socket pid=23094 comm=syz.0.8682 [ 4560.126928][T23100] SELinux: Context system_u:object_r:inetd_log_t:s0 is not valid (left unmapped). [ 4560.132903][ T30] audit: type=1400 audit(4559.750:714): avc: denied { relabelto } for pid=23099 comm="syz.1.8686" name="file1" dev="tmpfs" ino=22763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 4560.136590][ T30] audit: type=1400 audit(4559.750:715): avc: denied { associate } for pid=23099 comm="syz.1.8686" name="file1" dev="tmpfs" ino=22763 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:inetd_log_t:s0" [ 4560.377272][ T30] audit: type=1400 audit(4559.990:716): avc: denied { unlink } for pid=3310 comm="syz-executor" name="file1" dev="tmpfs" ino=22763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:inetd_log_t:s0" [ 4568.613227][T23128] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23128 comm=syz.1.8700 [ 4581.660222][T23175] SELinux: Context system_u:object_r:sshd_key_t:s0 is not valid (left unmapped). [ 4581.669122][ T30] audit: type=1400 audit(4581.280:717): avc: denied { relabelto } for pid=23174 comm="syz.1.8722" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sshd_key_t:s0" [ 4581.671320][ T30] audit: type=1400 audit(4581.280:718): avc: denied { associate } for pid=23174 comm="syz.1.8722" name="fuse" dev="devtmpfs" ino=92 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:sshd_key_t:s0" [ 4583.590093][ T30] audit: type=1400 audit(4583.200:719): avc: denied { read write } for pid=23180 comm="syz.1.8727" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sshd_key_t:s0" [ 4583.629487][ T30] audit: type=1400 audit(4583.220:720): avc: denied { open } for pid=23180 comm="syz.1.8727" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sshd_key_t:s0" [ 4583.630329][ T30] audit: type=1400 audit(4583.240:721): avc: denied { ioctl } for pid=23180 comm="syz.1.8727" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sshd_key_t:s0" [ 4588.349526][ T30] audit: type=1400 audit(4587.950:722): avc: denied { map } for pid=23196 comm="syz.1.8735" path="socket:[81504]" dev="sockfs" ino=81504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 4592.284510][T23211] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=23211 comm=syz.0.8741 [ 4601.376783][T23243] SELinux: Context system_u:object_r:hwdata_t:s0 is not valid (left unmapped). [ 4601.389791][ T30] audit: type=1400 audit(4600.990:723): avc: denied { relabelto } for pid=23242 comm="syz.1.8757" name="ttyprintk" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hwdata_t:s0" [ 4601.393417][ T30] audit: type=1400 audit(4601.000:724): avc: denied { associate } for pid=23242 comm="syz.1.8757" name="ttyprintk" dev="devtmpfs" ino=613 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hwdata_t:s0" [ 4605.419938][ T30] audit: type=1400 audit(4605.030:725): avc: denied { bind } for pid=23259 comm="syz.1.8766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4609.751027][T23276] bond0: (slave veth1_macvtap): Error: Device is in use and cannot be enslaved [ 4615.899320][T23302] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23302 comm=syz.1.8787 [ 4623.921278][T23337] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23337 comm=syz.0.8803 [ 4626.800504][ T30] audit: type=1400 audit(4626.420:726): avc: denied { read } for pid=23349 comm="syz.1.8810" path="socket:[81848]" dev="sockfs" ino=81848 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4640.192846][ T30] audit: type=1400 audit(4639.810:727): avc: denied { lock } for pid=23406 comm="syz.1.8839" path="socket:[82994]" dev="sockfs" ino=82994 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 4642.459511][T23417] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23417 comm=syz.1.8842 [ 4643.752811][ T30] audit: type=1400 audit(4643.370:728): avc: denied { setattr } for pid=23422 comm="syz.1.8846" name="zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 4656.489785][ T30] audit: type=1400 audit(4656.090:729): avc: denied { write } for pid=23477 comm="syz.1.8873" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 4659.827312][T23490] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1539 sclass=netlink_tcpdiag_socket pid=23490 comm=syz.1.8879 [ 4661.699519][ T30] audit: type=1400 audit(4661.310:730): avc: denied { lock } for pid=23495 comm="syz.1.8882" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4678.405687][ T30] audit: type=1400 audit(4678.020:731): avc: denied { setattr } for pid=23565 comm="syz.1.8916" name="tun" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 4683.916465][T23595] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23595 comm=syz.0.8928 [ 4685.103072][T23601] sctp: [Deprecated]: syz.1.8932 (pid 23601) Use of int in maxseg socket option. [ 4685.103072][T23601] Use struct sctp_assoc_value instead [ 4687.205500][ T30] audit: type=1400 audit(4686.820:732): avc: denied { bind } for pid=23610 comm="syz.1.8937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4689.966621][T23625] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23625 comm=syz.1.8944 [ 4692.120738][T23633] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23633 comm=syz.1.8948 [ 4706.915603][T23696] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23696 comm=syz.1.8980 [ 4722.696247][T23753] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23753 comm=syz.1.9008 [ 4739.377398][T23814] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=23814 comm=syz.1.9039 [ 4748.805827][ T30] audit: type=1400 audit(4748.410:733): avc: denied { setattr } for pid=23850 comm="syz.1.9057" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 4761.376964][ T30] audit: type=1400 audit(4760.990:734): avc: denied { bind } for pid=23898 comm="syz.1.9081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4763.108112][ T30] audit: type=1400 audit(4762.700:735): avc: denied { name_bind } for pid=23904 comm="syz.1.9085" src=32 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 4763.810190][T23908] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23908 comm=syz.0.9084 [ 4770.010804][ T30] audit: type=1400 audit(4769.620:736): avc: denied { append } for pid=23924 comm="syz.1.9091" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 4781.979753][T23964] loop6: detected capacity change from 0 to 524287999 [ 4791.875404][T23994] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21 sclass=netlink_audit_socket pid=23994 comm=syz.1.9124 [ 4806.173279][T24022] loop6: detected capacity change from 0 to 524287999 [ 4811.219815][T24034] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1794 sclass=netlink_audit_socket pid=24034 comm=syz.0.9142 [ 4812.544712][T24042] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24042 comm=syz.1.9147 [ 4814.146174][T24048] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24048 comm=syz.1.9150 [ 4824.279789][T24081] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24081 comm=syz.1.9167 [ 4832.945456][ T30] audit: type=1400 audit(4832.560:737): avc: denied { watch watch_reads } for pid=24111 comm="syz.1.9179" path="pipe:[2922]" dev="pipefs" ino=2922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 4839.391613][T24136] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24136 comm=syz.0.9189 [ 4844.781858][ T30] audit: type=1400 audit(4844.400:738): avc: denied { mount } for pid=24155 comm="syz.1.9201" name="/" dev="ramfs" ino=85483 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 4858.885815][T24198] serio: Serial port pts0 [ 4865.210470][T24206] serio: Serial port pts0 [ 4867.043346][T24213] serio: Serial port pts1 [ 4875.053793][T24225] serio: Serial port pts0 [ 4883.277140][T24235] serio: Serial port pts0 [ 4883.438066][ T30] audit: type=1400 audit(4883.040:739): avc: denied { map } for pid=24233 comm="syz.0.9230" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 4883.439494][ T30] audit: type=1400 audit(4883.040:740): avc: denied { execute } for pid=24233 comm="syz.0.9230" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 4885.287498][T24240] serio: Serial port pts1 [ 4891.443164][T24247] serio: Serial port pts0 [ 4901.586801][T24274] serio: Serial port pts0 [ 4922.681192][T24328] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24328 comm=syz.0.9268 [ 4924.420422][T24333] serio: Serial port pts0 [ 4932.336031][ T30] audit: type=1400 audit(4931.950:741): avc: denied { lock } for pid=24356 comm="syz.1.9279" path="socket:[85955]" dev="sockfs" ino=85955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4936.602008][ T30] audit: type=1400 audit(4936.220:742): avc: denied { watch watch_reads } for pid=24374 comm="syz.1.9287" path="/syzcgroup/unified/syz1" dev="cgroup2" ino=33 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 4941.200597][ T30] audit: type=1400 audit(4940.810:743): avc: denied { write } for pid=24390 comm="syz.1.9295" name="ttyprintk" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hwdata_t:s0" [ 4941.201246][ T30] audit: type=1400 audit(4940.810:744): avc: denied { open } for pid=24390 comm="syz.1.9295" path="/dev/ttyprintk" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hwdata_t:s0" [ 4941.311743][ T30] audit: type=1400 audit(4940.930:745): avc: denied { setattr } for pid=24390 comm="syz.1.9295" name="ttyprintk" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hwdata_t:s0" [ 4967.580008][T24498] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24498 comm=syz.1.9349 [ 4974.077064][T24529] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24529 comm=syz.0.9361 [ 4975.989920][ T30] audit: type=1400 audit(4975.600:746): avc: denied { append } for pid=24535 comm="syz.1.9365" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 4997.090092][T24624] SELinux: Context system_u:object_r:systemd_logger_exec_t:s0 is not valid (left unmapped). [ 4997.094879][ T30] audit: type=1400 audit(4996.710:747): avc: denied { relabelto } for pid=24622 comm="syz.1.9408" name="nbd1" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 4997.101969][ T30] audit: type=1400 audit(4996.720:748): avc: denied { associate } for pid=24622 comm="syz.1.9408" name="nbd1" dev="devtmpfs" ino=654 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 4999.369861][T24633] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=24633 comm=syz.0.9412 [ 4999.443862][ T30] audit: type=1400 audit(4999.060:749): avc: denied { read } for pid=24632 comm="syz.1.9413" name="nbd1" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 4999.446248][ T30] audit: type=1400 audit(4999.060:750): avc: denied { open } for pid=24632 comm="syz.1.9413" path="/dev/nbd1" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:systemd_logger_exec_t:s0" [ 5005.094617][T24654] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24654 comm=syz.1.9423 [ 5005.972762][ T30] audit: type=1400 audit(5005.590:751): avc: denied { setattr } for pid=24656 comm="syz.1.9425" name="RAWv6" dev="sockfs" ino=87768 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5009.810057][T24676] misc userio: Invalid payload size [ 5010.891143][T24680] SELinux: Context system_u:object_r:updpwd_exec_t:s0 is not valid (left unmapped). [ 5010.900944][ T30] audit: type=1400 audit(5010.520:752): avc: denied { relabelto } for pid=24678 comm="syz.0.9436" name="udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:updpwd_exec_t:s0" [ 5010.930452][ T30] audit: type=1400 audit(5010.540:753): avc: denied { associate } for pid=24678 comm="syz.0.9436" name="udmabuf" dev="devtmpfs" ino=676 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:updpwd_exec_t:s0" [ 5024.456609][T24743] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=769 sclass=netlink_xfrm_socket pid=24743 comm=syz.1.9466 [ 5041.154184][T24817] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24817 comm=syz.1.9503 [ 5050.456717][T24854] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=24854 comm=syz.1.9522 [ 5056.650335][T24876] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=24876 comm=syz.1.9533 [ 5059.929769][ T30] audit: type=1400 audit(5059.530:754): avc: denied { write } for pid=24885 comm="syz.0.9537" name="vcsa" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:systemd_passwd_var_run_t:s0" [ 5062.472620][T24897] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24897 comm=syz.0.9543 [ 5077.814882][ T30] audit: type=1400 audit(5077.430:755): avc: denied { lock } for pid=24955 comm="syz.0.9572" path="socket:[90264]" dev="sockfs" ino=90264 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 5081.945311][ T30] audit: type=1400 audit(5081.560:756): avc: denied { setattr } for pid=24969 comm="syz.0.9579" name="NETLINK" dev="sockfs" ino=90298 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5088.029910][T24988] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=24988 comm=syz.1.9588 [ 5089.518075][T24994] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=24994 comm=syz.1.9591 [ 5103.792953][ T30] audit: type=1400 audit(5103.400:757): avc: denied { append } for pid=25040 comm="syz.1.9615" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5115.955396][T25099] misc userio: Invalid payload size [ 5119.731136][ T30] audit: type=1400 audit(5119.350:758): avc: denied { setattr } for pid=25113 comm="syz.0.9650" name="tty1" dev="devtmpfs" ino=20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:tetex_data_t:s0" [ 5122.505349][T25128] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=25128 comm=syz.1.9657 [ 5123.323209][T25133] dlm: no local IP address has been set [ 5123.325146][T25133] dlm: cannot start dlm midcomms -107 [ 5137.144299][ T30] audit: type=1400 audit(5136.760:759): avc: denied { append } for pid=25189 comm="syz.1.9687" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 5151.480848][T25238] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=25238 comm=syz.1.9711 [ 5152.184795][ T30] audit: type=1400 audit(5151.800:760): avc: denied { read write } for pid=25239 comm="syz.1.9712" name="udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:updpwd_exec_t:s0" [ 5152.189446][ T30] audit: type=1400 audit(5151.800:761): avc: denied { open } for pid=25239 comm="syz.1.9712" path="/dev/udmabuf" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:updpwd_exec_t:s0" [ 5152.211817][ T30] audit: type=1400 audit(5151.830:762): avc: denied { ioctl } for pid=25239 comm="syz.1.9712" path="/dev/udmabuf" dev="devtmpfs" ino=676 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:updpwd_exec_t:s0" [ 5154.963363][ T30] audit: type=1400 audit(5154.580:763): avc: denied { read } for pid=25252 comm="syz.0.9718" path="socket:[91195]" dev="sockfs" ino=91195 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 5170.721604][T25318] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25318 comm=syz.1.9750 [ 5173.236427][ T30] audit: type=1400 audit(5172.850:764): avc: denied { write } for pid=25327 comm="syz.1.9755" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 5174.109706][ T30] audit: type=1400 audit(5173.720:765): avc: denied { read } for pid=25331 comm="syz.1.9757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5183.382603][ T30] audit: type=1400 audit(5183.000:766): avc: denied { map } for pid=25366 comm="syz.1.9773" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5187.537296][ T30] audit: type=1400 audit(5187.140:767): avc: denied { write } for pid=25379 comm="syz.0.9778" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 5196.096090][T25407] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5125 sclass=netlink_audit_socket pid=25407 comm=syz.1.9792 [ 5203.304532][T25425] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25425 comm=syz.0.9800 [ 5205.134968][ T30] audit: type=1400 audit(5204.750:768): avc: denied { watch watch_reads } for pid=25430 comm="syz.1.9805" path="/5003/file0" dev="tmpfs" ino=26263 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 5206.840899][T25435] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25435 comm=syz.1.9806 [ 5208.579428][ T30] audit: type=1400 audit(5208.180:769): avc: denied { mount } for pid=25440 comm="syz.1.9810" name="/" dev="pipefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 5210.649726][ T30] audit: type=1400 audit(5210.260:770): avc: denied { name_bind } for pid=25446 comm="syz.1.9813" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 5229.791943][T25515] serio: Serial port pts0 [ 5236.503098][T25529] FAULT_INJECTION: forcing a failure. [ 5236.503098][T25529] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 5236.504143][T25529] CPU: 1 UID: 0 PID: 25529 Comm: syz.1.9847 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5236.504212][T25529] Hardware name: linux,dummy-virt (DT) [ 5236.504256][T25529] Call trace: [ 5236.504289][T25529] show_stack+0x18/0x24 (C) [ 5236.504368][T25529] dump_stack_lvl+0xdc/0xf4 [ 5236.504424][T25529] dump_stack+0x1c/0x28 [ 5236.504469][T25529] should_fail_ex+0x5a0/0x6ac [ 5236.504516][T25529] should_fail+0x14/0x20 [ 5236.504560][T25529] should_fail_usercopy+0x1c/0x28 [ 5236.504604][T25529] _inline_copy_from_user+0x34/0x134 [ 5236.504655][T25529] get_compat_msghdr+0x90/0x118 [ 5236.504699][T25529] ___sys_sendmsg+0x184/0x19c [ 5236.504747][T25529] __sys_sendmsg+0x114/0x198 [ 5236.504791][T25529] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 5236.504835][T25529] invoke_syscall+0x6c/0x258 [ 5236.504879][T25529] el0_svc_common.constprop.0+0xac/0x230 [ 5236.504922][T25529] do_el0_svc_compat+0x40/0x68 [ 5236.504962][T25529] el0_svc_compat+0x4c/0x17c [ 5236.505011][T25529] el0t_32_sync_handler+0x98/0x13c [ 5236.505080][T25529] el0t_32_sync+0x19c/0x1a0 [ 5239.234302][ T30] audit: type=1400 audit(5238.850:771): avc: denied { append } for pid=25537 comm="syz.1.9850" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5239.794498][T25540] FAULT_INJECTION: forcing a failure. [ 5239.794498][T25540] name failslab, interval 1, probability 0, space 0, times 1 [ 5239.814242][T25540] CPU: 1 UID: 0 PID: 25540 Comm: syz.0.9851 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5239.814365][T25540] Hardware name: linux,dummy-virt (DT) [ 5239.814401][T25540] Call trace: [ 5239.814431][T25540] show_stack+0x18/0x24 (C) [ 5239.814511][T25540] dump_stack_lvl+0xdc/0xf4 [ 5239.814563][T25540] dump_stack+0x1c/0x28 [ 5239.814607][T25540] should_fail_ex+0x5a0/0x6ac [ 5239.814658][T25540] should_failslab+0xbc/0x11c [ 5239.814705][T25540] __kmalloc_noprof+0xd0/0x4d0 [ 5239.814752][T25540] tomoyo_realpath_from_path+0x90/0x534 [ 5239.814825][T25540] tomoyo_path_number_perm+0x200/0x438 [ 5239.814874][T25540] tomoyo_file_ioctl+0x1c/0x28 [ 5239.814922][T25540] security_file_ioctl_compat+0x8c/0x19c [ 5239.814973][T25540] __arm64_compat_sys_ioctl+0x98/0x214 [ 5239.815026][T25540] invoke_syscall+0x6c/0x258 [ 5239.815071][T25540] el0_svc_common.constprop.0+0xac/0x230 [ 5239.815113][T25540] do_el0_svc_compat+0x40/0x68 [ 5239.815155][T25540] el0_svc_compat+0x4c/0x17c [ 5239.815196][T25540] el0t_32_sync_handler+0x98/0x13c [ 5239.815239][T25540] el0t_32_sync+0x19c/0x1a0 [ 5239.919698][T25540] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5240.375202][T25542] FAULT_INJECTION: forcing a failure. [ 5240.375202][T25542] name failslab, interval 1, probability 0, space 0, times 0 [ 5240.375741][T25542] CPU: 0 UID: 0 PID: 25542 Comm: syz.1.9853 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5240.375814][T25542] Hardware name: linux,dummy-virt (DT) [ 5240.375846][T25542] Call trace: [ 5240.375877][T25542] show_stack+0x18/0x24 (C) [ 5240.375969][T25542] dump_stack_lvl+0xdc/0xf4 [ 5240.376036][T25542] dump_stack+0x1c/0x28 [ 5240.376189][T25542] should_fail_ex+0x5a0/0x6ac [ 5240.376303][T25542] should_failslab+0xbc/0x11c [ 5240.376401][T25542] __kmalloc_cache_noprof+0x74/0x3cc [ 5240.376451][T25542] file_f_owner_allocate+0x80/0x13c [ 5240.376532][T25542] f_setown+0x5c/0x1b8 [ 5240.376575][T25542] do_fcntl+0x98c/0x11a0 [ 5240.376692][T25542] do_compat_fcntl64+0x23c/0x558 [ 5240.376785][T25542] __arm64_compat_sys_fcntl+0x7c/0xc0 [ 5240.376888][T25542] invoke_syscall+0x6c/0x258 [ 5240.376996][T25542] el0_svc_common.constprop.0+0xac/0x230 [ 5240.377160][T25542] do_el0_svc_compat+0x40/0x68 [ 5240.377245][T25542] el0_svc_compat+0x4c/0x17c [ 5240.377294][T25542] el0t_32_sync_handler+0x98/0x13c [ 5240.377337][T25542] el0t_32_sync+0x19c/0x1a0 [ 5241.561872][ T30] audit: type=1400 audit(5241.170:772): avc: denied { setattr } for pid=25545 comm="syz.1.9854" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sshd_key_t:s0" [ 5241.583782][ T30] audit: type=1400 audit(5241.200:773): avc: denied { accept } for pid=25545 comm="syz.1.9854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5242.472254][T25548] FAULT_INJECTION: forcing a failure. [ 5242.472254][T25548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5242.472820][T25548] CPU: 1 UID: 0 PID: 25548 Comm: syz.0.9855 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5242.472889][T25548] Hardware name: linux,dummy-virt (DT) [ 5242.472925][T25548] Call trace: [ 5242.472958][T25548] show_stack+0x18/0x24 (C) [ 5242.473081][T25548] dump_stack_lvl+0xdc/0xf4 [ 5242.473136][T25548] dump_stack+0x1c/0x28 [ 5242.473182][T25548] should_fail_ex+0x5a0/0x6ac [ 5242.473239][T25548] should_fail+0x14/0x20 [ 5242.473285][T25548] should_fail_usercopy+0x1c/0x28 [ 5242.473330][T25548] _inline_copy_from_user+0x34/0x134 [ 5242.473382][T25548] get_compat_msghdr+0x90/0x118 [ 5242.473431][T25548] ___sys_sendmsg+0x184/0x19c [ 5242.473481][T25548] __sys_sendmsg+0x114/0x198 [ 5242.473524][T25548] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 5242.473571][T25548] invoke_syscall+0x6c/0x258 [ 5242.473615][T25548] el0_svc_common.constprop.0+0xac/0x230 [ 5242.473658][T25548] do_el0_svc_compat+0x40/0x68 [ 5242.473700][T25548] el0_svc_compat+0x4c/0x17c [ 5242.473745][T25548] el0t_32_sync_handler+0x98/0x13c [ 5242.473789][T25548] el0t_32_sync+0x19c/0x1a0 [ 5242.951773][T25550] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5242.954408][T25550] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5243.813748][T25552] dlm: no local IP address has been set [ 5243.815283][T25552] dlm: cannot start dlm midcomms -107 [ 5245.102627][T25556] FAULT_INJECTION: forcing a failure. [ 5245.102627][T25556] name failslab, interval 1, probability 0, space 0, times 0 [ 5245.110383][T25556] CPU: 0 UID: 0 PID: 25556 Comm: syz.0.9859 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5245.110478][T25556] Hardware name: linux,dummy-virt (DT) [ 5245.110515][T25556] Call trace: [ 5245.110546][T25556] show_stack+0x18/0x24 (C) [ 5245.110631][T25556] dump_stack_lvl+0xdc/0xf4 [ 5245.110686][T25556] dump_stack+0x1c/0x28 [ 5245.110734][T25556] should_fail_ex+0x5a0/0x6ac [ 5245.110787][T25556] should_failslab+0xbc/0x11c [ 5245.110834][T25556] __kmalloc_noprof+0xd0/0x4d0 [ 5245.110882][T25556] tomoyo_realpath_from_path+0x90/0x534 [ 5245.110934][T25556] tomoyo_path_number_perm+0x200/0x438 [ 5245.110980][T25556] tomoyo_file_ioctl+0x1c/0x28 [ 5245.111037][T25556] security_file_ioctl_compat+0x8c/0x19c [ 5245.111089][T25556] __arm64_compat_sys_ioctl+0x98/0x214 [ 5245.111135][T25556] invoke_syscall+0x6c/0x258 [ 5245.111180][T25556] el0_svc_common.constprop.0+0xac/0x230 [ 5245.111224][T25556] do_el0_svc_compat+0x40/0x68 [ 5245.111266][T25556] el0_svc_compat+0x4c/0x17c [ 5245.111311][T25556] el0t_32_sync_handler+0x98/0x13c [ 5245.111354][T25556] el0t_32_sync+0x19c/0x1a0 [ 5245.150209][T25556] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5246.773466][T25561] FAULT_INJECTION: forcing a failure. [ 5246.773466][T25561] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 5246.777721][T25561] CPU: 0 UID: 0 PID: 25561 Comm: syz.0.9861 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5246.777828][T25561] Hardware name: linux,dummy-virt (DT) [ 5246.777866][T25561] Call trace: [ 5246.777896][T25561] show_stack+0x18/0x24 (C) [ 5246.778031][T25561] dump_stack_lvl+0xdc/0xf4 [ 5246.778088][T25561] dump_stack+0x1c/0x28 [ 5246.778134][T25561] should_fail_ex+0x5a0/0x6ac [ 5246.778208][T25561] should_fail_alloc_page+0x70/0xb8 [ 5246.778322][T25561] prepare_alloc_pages+0x1a8/0x560 [ 5246.778398][T25561] __alloc_frozen_pages_noprof+0x144/0x1f58 [ 5246.778486][T25561] alloc_pages_mpol+0xfc/0x400 [ 5246.778536][T25561] folio_alloc_mpol_noprof+0x18/0x190 [ 5246.778578][T25561] vma_alloc_folio_noprof+0x104/0x1bc [ 5246.778622][T25561] vma_alloc_zeroed_movable_folio+0x50/0x6c [ 5246.778709][T25561] __handle_mm_fault+0x1ff0/0x3670 [ 5246.778851][T25561] handle_mm_fault+0x334/0x7ac [ 5246.778942][T25561] do_page_fault+0x2ec/0xca0 [ 5246.779011][T25561] do_translation_fault+0x184/0x1e8 [ 5246.779059][T25561] do_mem_abort+0x68/0x1a4 [ 5246.779105][T25561] el1_abort+0x3c/0x5c [ 5246.779205][T25561] el1h_64_sync_handler+0xa8/0x124 [ 5246.779263][T25561] el1h_64_sync+0x6c/0x70 [ 5246.779439][T25561] compat_do_msg_fill+0xa0/0x160 (P) [ 5246.779522][T25561] do_msgrcv+0x388/0xdc8 [ 5246.779570][T25561] __arm64_compat_sys_msgrcv+0xb8/0x110 [ 5246.779659][T25561] invoke_syscall+0x6c/0x258 [ 5246.779752][T25561] el0_svc_common.constprop.0+0xac/0x230 [ 5246.779828][T25561] do_el0_svc_compat+0x40/0x68 [ 5246.779906][T25561] el0_svc_compat+0x4c/0x17c [ 5246.780000][T25561] el0t_32_sync_handler+0x98/0x13c [ 5246.780086][T25561] el0t_32_sync+0x19c/0x1a0 [ 5255.150217][T25590] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25590 comm=syz.1.9871 [ 5255.152302][T25590] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25590 comm=syz.1.9871 [ 5255.154477][T25590] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25590 comm=syz.1.9871 [ 5255.897088][T25592] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5256.021244][T25592] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5256.089202][T25592] FAULT_INJECTION: forcing a failure. [ 5256.089202][T25592] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5256.090527][T25592] CPU: 0 UID: 0 PID: 25592 Comm: syz.1.9872 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5256.090599][T25592] Hardware name: linux,dummy-virt (DT) [ 5256.090638][T25592] Call trace: [ 5256.090667][T25592] show_stack+0x18/0x24 (C) [ 5256.090744][T25592] dump_stack_lvl+0xdc/0xf4 [ 5256.090801][T25592] dump_stack+0x1c/0x28 [ 5256.090892][T25592] should_fail_ex+0x5a0/0x6ac [ 5256.090991][T25592] should_fail+0x14/0x20 [ 5256.091041][T25592] should_fail_usercopy+0x1c/0x28 [ 5256.091087][T25592] simple_read_from_buffer+0x84/0x214 [ 5256.091137][T25592] proc_fail_nth_read+0x160/0x248 [ 5256.091182][T25592] vfs_read+0x18c/0x97c [ 5256.091237][T25592] ksys_read+0xec/0x1d8 [ 5256.091280][T25592] __arm64_sys_read+0x6c/0x9c [ 5256.091325][T25592] invoke_syscall+0x6c/0x258 [ 5256.091367][T25592] el0_svc_common.constprop.0+0xac/0x230 [ 5256.091410][T25592] do_el0_svc_compat+0x40/0x68 [ 5256.091460][T25592] el0_svc_compat+0x4c/0x17c [ 5256.091538][T25592] el0t_32_sync_handler+0x98/0x13c [ 5256.091583][T25592] el0t_32_sync+0x19c/0x1a0 [ 5256.586689][T25594] FAULT_INJECTION: forcing a failure. [ 5256.586689][T25594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5256.645108][T25594] CPU: 1 UID: 0 PID: 25594 Comm: syz.1.9873 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5256.645310][T25594] Hardware name: linux,dummy-virt (DT) [ 5256.645369][T25594] Call trace: [ 5256.645416][T25594] show_stack+0x18/0x24 (C) [ 5256.645549][T25594] dump_stack_lvl+0xdc/0xf4 [ 5256.645633][T25594] dump_stack+0x1c/0x28 [ 5256.645708][T25594] should_fail_ex+0x5a0/0x6ac [ 5256.645788][T25594] should_fail+0x14/0x20 [ 5256.645861][T25594] should_fail_usercopy+0x1c/0x28 [ 5256.645942][T25594] simple_read_from_buffer+0x84/0x214 [ 5256.646026][T25594] proc_fail_nth_read+0x160/0x248 [ 5256.646101][T25594] vfs_read+0x18c/0x97c [ 5256.646178][T25594] ksys_read+0xec/0x1d8 [ 5256.646254][T25594] __arm64_sys_read+0x6c/0x9c [ 5256.646329][T25594] invoke_syscall+0x6c/0x258 [ 5256.646400][T25594] el0_svc_common.constprop.0+0xac/0x230 [ 5256.646469][T25594] do_el0_svc_compat+0x40/0x68 [ 5256.646539][T25594] el0_svc_compat+0x4c/0x17c [ 5256.646612][T25594] el0t_32_sync_handler+0x98/0x13c [ 5256.646681][T25594] el0t_32_sync+0x19c/0x1a0 [ 5262.515781][T25607] FAULT_INJECTION: forcing a failure. [ 5262.515781][T25607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5262.516372][T25607] CPU: 1 UID: 0 PID: 25607 Comm: syz.0.9877 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5262.516432][T25607] Hardware name: linux,dummy-virt (DT) [ 5262.516466][T25607] Call trace: [ 5262.516495][T25607] show_stack+0x18/0x24 (C) [ 5262.516572][T25607] dump_stack_lvl+0xdc/0xf4 [ 5262.516654][T25607] dump_stack+0x1c/0x28 [ 5262.516725][T25607] should_fail_ex+0x5a0/0x6ac [ 5262.516776][T25607] should_fail+0x14/0x20 [ 5262.516825][T25607] should_fail_usercopy+0x1c/0x28 [ 5262.516912][T25607] _inline_copy_from_user+0x38/0x130 [ 5262.517015][T25607] move_addr_to_kernel+0x44/0x10c [ 5262.517109][T25607] __sys_sendto+0x15c/0x26c [ 5262.517243][T25607] __arm64_sys_sendto+0xc0/0x134 [ 5262.517307][T25607] invoke_syscall+0x6c/0x258 [ 5262.517380][T25607] el0_svc_common.constprop.0+0xac/0x230 [ 5262.517429][T25607] do_el0_svc_compat+0x40/0x68 [ 5262.517470][T25607] el0_svc_compat+0x4c/0x17c [ 5262.517513][T25607] el0t_32_sync_handler+0x98/0x13c [ 5262.517556][T25607] el0t_32_sync+0x19c/0x1a0 [ 5262.943132][T25609] FAULT_INJECTION: forcing a failure. [ 5262.943132][T25609] name failslab, interval 1, probability 0, space 0, times 0 [ 5262.943728][T25609] CPU: 1 UID: 0 PID: 25609 Comm: syz.1.9879 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5262.943790][T25609] Hardware name: linux,dummy-virt (DT) [ 5262.943832][T25609] Call trace: [ 5262.943861][T25609] show_stack+0x18/0x24 (C) [ 5262.943977][T25609] dump_stack_lvl+0xdc/0xf4 [ 5262.944036][T25609] dump_stack+0x1c/0x28 [ 5262.944081][T25609] should_fail_ex+0x5a0/0x6ac [ 5262.944149][T25609] should_failslab+0xbc/0x11c [ 5262.944204][T25609] __kmalloc_noprof+0xd0/0x4d0 [ 5262.944268][T25609] tomoyo_encode2+0xa8/0x2c0 [ 5262.944342][T25609] tomoyo_encode+0x28/0x40 [ 5262.944388][T25609] tomoyo_realpath_from_path+0x114/0x534 [ 5262.944499][T25609] tomoyo_path_number_perm+0x200/0x438 [ 5262.944548][T25609] tomoyo_file_ioctl+0x1c/0x28 [ 5262.944655][T25609] security_file_ioctl_compat+0x8c/0x19c [ 5262.944715][T25609] __arm64_compat_sys_ioctl+0x98/0x214 [ 5262.944822][T25609] invoke_syscall+0x6c/0x258 [ 5262.944870][T25609] el0_svc_common.constprop.0+0xac/0x230 [ 5262.944944][T25609] do_el0_svc_compat+0x40/0x68 [ 5262.944990][T25609] el0_svc_compat+0x4c/0x17c [ 5262.945248][T25609] el0t_32_sync_handler+0x98/0x13c [ 5262.945341][T25609] el0t_32_sync+0x19c/0x1a0 [ 5262.946198][T25609] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5264.182408][ T30] audit: type=1400 audit(5263.800:774): avc: denied { append } for pid=25610 comm="syz.0.9881" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 5264.184795][T25613] random: crng reseeded on system resumption [ 5269.104052][T25625] FAULT_INJECTION: forcing a failure. [ 5269.104052][T25625] name failslab, interval 1, probability 0, space 0, times 0 [ 5269.105733][T25625] CPU: 0 UID: 0 PID: 25625 Comm: syz.0.9888 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT [ 5269.105823][T25625] Hardware name: linux,dummy-virt (DT) [ 5269.105980][T25625] Call trace: [ 5269.106047][T25625] show_stack+0x18/0x24 (C) [ 5269.106128][T25625] dump_stack_lvl+0xdc/0xf4 [ 5269.106229][T25625] dump_stack+0x1c/0x28 [ 5269.106282][T25625] should_fail_ex+0x5a0/0x6ac [ 5269.106359][T25625] should_failslab+0xbc/0x11c [ 5269.106414][T25625] __kmalloc_noprof+0xd0/0x4d0 [ 5269.106462][T25625] lsm_blob_alloc+0x60/0x80 [ 5269.106506][T25625] security_msg_queue_alloc+0x28/0x178 [ 5269.106552][T25625] newque+0x120/0x510 [ 5269.106596][T25625] ipcget+0xd8/0x940 [ 5269.106675][T25625] __arm64_sys_msgget+0xf8/0x15c [ 5269.106722][T25625] invoke_syscall+0x6c/0x258 [ 5269.106767][T25625] el0_svc_common.constprop.0+0xac/0x230 [ 5269.106808][T25625] do_el0_svc_compat+0x40/0x68 [ 5269.106851][T25625] el0_svc_compat+0x4c/0x17c [ 5269.106894][T25625] el0t_32_sync_handler+0x98/0x13c [ 5269.106935][T25625] el0t_32_sync+0x19c/0x1a0 [ 5270.672279][ T30] audit: type=1400 audit(5270.290:775): avc: denied { setattr } for pid=25627 comm="syz.0.9890" name="SCTP" dev="sockfs" ino=92855 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5278.270470][T25656] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5278.277252][T25656] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5298.155185][T25700] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5298.163252][T25700] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5298.377886][T25700] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5298.380933][T25700] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5299.913193][ T30] audit: type=1400 audit(5299.530:776): avc: denied { connect } for pid=25705 comm="syz.1.9917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 5301.784584][T25715] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5301.786954][T25715] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5304.861883][ T30] audit: type=1400 audit(5304.460:777): avc: denied { execute } for pid=25725 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5304.862594][ T30] audit: type=1400 audit(5304.470:778): avc: denied { execute_no_trans } for pid=25725 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5305.102510][ T30] audit: type=1400 audit(5304.710:779): avc: denied { mounton } for pid=25726 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 5306.325882][T12644] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5306.603373][T12644] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5306.976861][T12644] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5307.554740][T12644] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5308.870865][T25726] lo speed is unknown, defaulting to 1000 [ 5308.928020][ T30] audit: type=1400 audit(5308.540:780): avc: denied { read } for pid=3154 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5312.495160][T12644] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5312.615792][T12644] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5312.675076][T12644] bond0 (unregistering): Released all slaves [ 5313.479638][T12644] hsr_slave_0: left promiscuous mode [ 5313.509914][T12644] hsr_slave_1: left promiscuous mode [ 5313.629441][T12644] veth1_macvtap: left promiscuous mode [ 5313.630220][T12644] veth0_macvtap: left promiscuous mode [ 5313.634711][T12644] veth1_vlan: left promiscuous mode [ 5321.542706][T23067] lo speed is unknown, defaulting to 1000 [ 5321.544080][T23067] infiniband syz0: ib_query_port failed (-19) [ 5326.997255][T25726] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5327.060921][T25726] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5336.265876][T25726] hsr_slave_0: entered promiscuous mode [ 5336.290601][T25726] hsr_slave_1: entered promiscuous mode [ 5340.092976][T25726] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5349.796473][T25886] netlink: 12 bytes leftover after parsing attributes in process `syz.0.9934'. [ 5351.086994][T25726] veth0_vlan: entered promiscuous mode [ 5351.183569][T25726] veth1_vlan: entered promiscuous mode [ 5351.209635][ T30] audit: type=1400 audit(5350.820:781): avc: denied { unmount } for pid=10699 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 5351.470299][T25726] veth0_macvtap: entered promiscuous mode [ 5351.530071][T25726] veth1_macvtap: entered promiscuous mode [ 5352.247408][ T30] audit: type=1400 audit(5351.860:782): avc: denied { mounton } for pid=25726 comm="syz-executor" path="/syzkaller.gNkLjA/syz-tmp" dev="vda" ino=1879 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 5352.297159][ T30] audit: type=1400 audit(5351.910:783): avc: denied { mount } for pid=25726 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 5352.323108][ T30] audit: type=1400 audit(5351.940:784): avc: denied { mounton } for pid=25726 comm="syz-executor" path="/syzkaller.gNkLjA/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 5352.336344][ T30] audit: type=1400 audit(5351.950:785): avc: denied { mounton } for pid=25726 comm="syz-executor" path="/syzkaller.gNkLjA/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=94485 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 5352.398028][ T30] audit: type=1400 audit(5352.010:786): avc: denied { unmount } for pid=25726 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 5352.421790][ T30] audit: type=1400 audit(5352.040:787): avc: denied { mounton } for pid=25726 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 5352.435077][ T30] audit: type=1400 audit(5352.040:788): avc: denied { mount } for pid=25726 comm="syz-executor" name="/" dev="gadgetfs" ino=3285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 5352.499998][ T30] audit: type=1400 audit(5352.100:789): avc: denied { mounton } for pid=25726 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 5354.971305][T25764] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5355.342341][T25764] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5355.874824][T25764] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5356.210823][T25764] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5363.264069][T25764] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5363.346660][T25764] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5363.421468][T25764] bond0 (unregistering): Released all slaves [ 5364.391659][T25764] hsr_slave_0: left promiscuous mode [ 5364.414845][T25764] hsr_slave_1: left promiscuous mode [ 5364.593385][T25764] veth1_macvtap: left promiscuous mode [ 5364.594173][T25764] veth0_macvtap: left promiscuous mode [ 5364.595152][T25764] veth1_vlan: left promiscuous mode [ 5364.595777][T25764] veth0_vlan: left promiscuous mode [ 5373.289839][ T30] audit: type=1400 audit(5372.900:790): avc: denied { mount } for pid=25967 comm="syz.1.9945" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 5373.386926][ T30] audit: type=1400 audit(5373.000:791): avc: denied { unmount } for pid=25726 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 5375.633376][T25902] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5375.673923][T25902] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5376.428234][ T30] audit: type=1400 audit(5376.030:792): avc: denied { create } for pid=25997 comm="syz.1.9952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 5377.370136][T26013] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26013 comm=syz.1.9954 [ 5379.143718][T25902] hsr_slave_0: entered promiscuous mode [ 5379.153606][T25902] hsr_slave_1: entered promiscuous mode [ 5379.157267][T25902] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 5379.166132][T25902] Cannot create hsr debugfs directory [ 5381.625141][T25902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5382.271684][T26054] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5382.276560][T26054] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5382.579316][T25764] unregister_netdevice: waiting for lo to become free. Usage count = 2 [ 5382.582064][T25764] ref_tracker: lo@0000000017540b47 has 1/1 users at [ 5382.582064][T25764] netdev_get_by_index+0x5c/0xa4 [ 5382.582064][T25764] fib6_nh_init+0x4b4/0x15bc [ 5382.582064][T25764] rtm_new_nexthop+0x1778/0x59d4 [ 5382.582064][T25764] rtnetlink_rcv_msg+0x65c/0x8d4 [ 5382.582064][T25764] netlink_rcv_skb+0x1a8/0x348 [ 5382.582064][T25764] rtnetlink_rcv+0x18/0x24 [ 5382.582064][T25764] netlink_unicast+0x3c0/0x670 [ 5382.582064][T25764] netlink_sendmsg+0x644/0xa54 [ 5382.582064][T25764] __sock_sendmsg+0xc8/0x168 [ 5382.582064][T25764] ____sys_sendmsg+0x504/0x768 [ 5382.582064][T25764] ___sys_sendmsg+0x11c/0x19c [ 5382.582064][T25764] __sys_sendmsg+0x114/0x198 [ 5382.582064][T25764] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 5382.582064][T25764] invoke_syscall+0x6c/0x258 [ 5382.582064][T25764] el0_svc_common.constprop.0+0xac/0x230 [ 5382.582064][T25764] do_el0_svc_compat+0x40/0x68 [ 5382.582064][T25764] [ 5382.611544][ T30] audit: type=1400 audit(5382.210:793): avc: denied { read } for pid=3109 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 5382.630256][ T30] audit: type=1400 audit(5382.230:794): avc: denied { write } for pid=3304 comm="syz-executor" path="pipe:[2895]" dev="pipefs" ino=2895 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 5382.640303][ T30] audit: type=1400 audit(5382.250:795): avc: denied { search } for pid=3109 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5382.640863][ T30] audit: type=1400 audit(5382.250:796): avc: denied { append } for pid=3109 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5382.641180][ T30] audit: type=1400 audit(5382.250:797): avc: denied { open } for pid=3109 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5382.641490][ T30] audit: type=1400 audit(5382.250:798): avc: denied { getattr } for pid=3109 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 5392.600765][T25764] unregister_netdevice: waiting for lo to become free. Usage count = 2 [ 5392.602221][T25764] ref_tracker: lo@0000000017540b47 has 1/1 users at [ 5392.602221][T25764] netdev_get_by_index+0x5c/0xa4 [ 5392.602221][T25764] fib6_nh_init+0x4b4/0x15bc [ 5392.602221][T25764] rtm_new_nexthop+0x1778/0x59d4 [ 5392.602221][T25764] rtnetlink_rcv_msg+0x65c/0x8d4 [ 5392.602221][T25764] netlink_rcv_skb+0x1a8/0x348 [ 5392.602221][T25764] rtnetlink_rcv+0x18/0x24 [ 5392.602221][T25764] netlink_unicast+0x3c0/0x670 [ 5392.602221][T25764] netlink_sendmsg+0x644/0xa54 [ 5392.602221][T25764] __sock_sendmsg+0xc8/0x168 [ 5392.602221][T25764] ____sys_sendmsg+0x504/0x768 [ 5392.602221][T25764] ___sys_sendmsg+0x11c/0x19c [ 5392.602221][T25764] __sys_sendmsg+0x114/0x198 [ 5392.602221][T25764] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 5392.602221][T25764] invoke_syscall+0x6c/0x258 [ 5392.602221][T25764] el0_svc_common.constprop.0+0xac/0x230 [ 5392.602221][T25764] do_el0_svc_compat+0x40/0x68 [ 5392.602221][T25764] [ 5402.720042][T25764] unregister_netdevice: waiting for lo to become free. Usage count = 2 [ 5402.721276][T25764] ref_tracker: lo@0000000017540b47 has 1/1 users at [ 5402.721276][T25764] netdev_get_by_index+0x5c/0xa4 [ 5402.721276][T25764] fib6_nh_init+0x4b4/0x15bc [ 5402.721276][T25764] rtm_new_nexthop+0x1778/0x59d4 [ 5402.721276][T25764] rtnetlink_rcv_msg+0x65c/0x8d4 [ 5402.721276][T25764] netlink_rcv_skb+0x1a8/0x348 [ 5402.721276][T25764] rtnetlink_rcv+0x18/0x24 [ 5402.721276][T25764] netlink_unicast+0x3c0/0x670 [ 5402.721276][T25764] netlink_sendmsg+0x644/0xa54 [ 5402.721276][T25764] __sock_sendmsg+0xc8/0x168 [ 5402.721276][T25764] ____sys_sendmsg+0x504/0x768 [ 5402.721276][T25764] ___sys_sendmsg+0x11c/0x19c [ 5402.721276][T25764] __sys_sendmsg+0x114/0x198 [ 5402.721276][T25764] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 5402.721276][T25764] invoke_syscall+0x6c/0x258 [ 5402.721276][T25764] el0_svc_common.constprop.0+0xac/0x230 [ 5402.721276][T25764] do_el0_svc_compat+0x40/0x68 [ 5402.721276][T25764] VM DIAGNOSIS: 12:18:08 Registers: info registers vcpu 0 CPU#0 PC=ffff800081b6ae18 X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=dfff800000000000 X04=0000000000000018 X05=ffff80008d9579e0 X06=ffff700011b2af3c X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011b2af3c X11=1ffff00011b2af3c X12=ffff700011b2af3d X13=0000000000008000 X14=3278302f63617830 X15=20202020200a3033 X16=735f306c655f6f64 X17=61706d6f635f6376 X18=ffff00002ccf7140 X19=ffff00000f636080 X20=ffff80008d43b018 X21=ffff800087a92720 X22=000000000000000d X23=dfff800000000000 X24=ffff00000f646199 X25=0000000000000000 X26=0000000000000f01 X27=1fffe00001ec6c5a X28=ffff00000f6362d0 X29=ffff80008d957990 X30=ffff800081b6b0a4 SP=ffff80008d957990 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffa4180b30:0000ffffa4181060 Q02=0000ffffa3eca6e0:0000ffffa3eca0d0 Q03=0000ffffa41b1d10:0000ffffa4180600 Q04=0000ffffa4181ad0:0000ffffa41815a0 Q05=0000ffffa3eca6e0:0000ffffa3eca0d0 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085467804 X00=ffff800087460e20 X01=ffff800086a8d9e8 X02=0000000000000000 X03=1fffe0000307b005 X04=1fffe0000307b005 X05=0000000000040000 X06=ffff0000183d8ab8 X07=9c423a55d768af60 X08=0000000000000000 X09=ffff800089734000 X10=ffff0000183d8a90 X11=0000000000000000 X12=0000000000000089 X13=0000000000000000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff00000dc0b140 X20=0000000000482cc0 X21=0000000000000200 X22=ffff000018e1bc00 X23=00000000ffffffff X24=ffff80008446aff4 X25=0000000000000200 X26=0000000000000001 X27=1ffff000142ecef8 X28=ffff000017cf4a40 X29=ffff8000a1767230 X30=ffff80008098e608 SP=ffff8000a1767230 PSTATE=80000005 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=6572207265767265:730073250a0d0a0d Q02=687478656e5f7765:6e5f6d7472202020 Q03=0000000000000000:00ff00ff00000000 Q04=0000000000000000:000000000f0f0000 Q05=20312f3120736168:2037346230343537 Q06=203a29315f657661:6c735f646e6f6220 Q07=206e612073612067:6e6976616c736e45 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffd1cc5460:0000ffffd1cc5460 Q17=ffffff80ffffffd8:0000ffffd1cc5430 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000