last executing test programs: 38m38.58211307s ago: executing program 1 (id=193): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = dup(r0) write$USERIO_CMD_REGISTER(r1, 0x0, 0x0) 38m37.62448664s ago: executing program 1 (id=195): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmmsg$inet6(r1, &(0x7f0000000280), 0x0, 0x2400c800) 38m36.560439596s ago: executing program 1 (id=197): r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) r1 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000080)='\xd9$\x00', 0x0, r1) 38m35.932099999s ago: executing program 1 (id=199): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000040)=@l2tp, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000003c0)={'ip6gre0\x00', &(0x7f0000000340)={'syztnl1\x00', 0x0, 0x29, 0x6, 0x4, 0xac, 0x2, @mcast1, @mcast2, 0x8, 0x40, 0x6089, 0x20000000}}) 38m34.709964823s ago: executing program 1 (id=202): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1e80c2, 0x0) 38m33.821332259s ago: executing program 1 (id=205): r0 = syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0xff06, 0x0) 37m47.520375342s ago: executing program 32 (id=205): r0 = syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0xff06, 0x0) 25m34.873133615s ago: executing program 2 (id=2028): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getpeername(r0, &(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000140)=0x80) ioctl$TIOCGLCKTRMIOS(r1, 0x5450, 0x0) 25m34.188900391s ago: executing program 2 (id=2030): r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) mkdirat(r0, &(0x7f00000008c0)='./file0\x00', 0x0) utimensat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 25m33.306305357s ago: executing program 2 (id=2032): r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x101842) r1 = openat$thread_pidfd(0xffffff9c, &(0x7f0000000140), 0x40100, 0x0) copy_file_range(r0, 0x0, r1, 0x0, 0x3, 0x0) 25m32.602040833s ago: executing program 2 (id=2033): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) 25m32.123508718s ago: executing program 2 (id=2035): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x40000) 25m31.14845318s ago: executing program 2 (id=2036): mkdir(&(0x7f0000000140)='./file0\x00', 0x12) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x10040, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x89482f, 0x0) 25m31.081386582s ago: executing program 33 (id=2036): mkdir(&(0x7f0000000140)='./file0\x00', 0x12) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='debugfs\x00', 0x10040, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', 0x0, 0x89482f, 0x0) 6.70218166s ago: executing program 0 (id=5468): syz_open_dev$mouse(0x0, 0x5, 0x101240) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x101, 0x70bd25, 0x25dfdbfb, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x4000090}, 0x4008000) 6.081010082s ago: executing program 0 (id=5469): r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x8040, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x2201, 0xe) 5.403508228s ago: executing program 0 (id=5471): setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x3f42, 0x0) write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0) 4.650768708s ago: executing program 0 (id=5474): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = dup2(r0, r0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, 0x0) 3.614520141s ago: executing program 0 (id=5478): pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7}, 0x69ff9a93bfc25838) write$P9_RAUTH(r0, 0x0, 0xfffffde5) 2.645048672s ago: executing program 3 (id=5480): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, 0x0) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000001d40)={0x0, 0x0, &(0x7f0000001d00)={&(0x7f0000001c80)={0x1c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004041}, 0x4080) 2.243710443s ago: executing program 3 (id=5481): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) sendmsg$IPSET_CMD_SWAP(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840)={0x14, 0x6, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x801}, 0x40000) 1.964117598s ago: executing program 3 (id=5482): openat$cuse(0xffffffffffffff9c, &(0x7f0000004440), 0x2, 0x0) r0 = openat$procfs(0xffffff9c, &(0x7f0000000500)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$SNDCTL_SEQ_OUTOFBAND(r0, 0x4020940d, &(0x7f0000000080)=@s={0x3, @generic}) 1.53600213s ago: executing program 3 (id=5483): r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$cgroup_pid(r0, &(0x7f00000031c0), 0x12) write$yama_ptrace_scope(r0, &(0x7f0000000080)='2\x00', 0x2) 859.800196ms ago: executing program 3 (id=5484): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r1, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 140.009873ms ago: executing program 0 (id=5485): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001700)=@bridge_getvlan={0x18, 0x72, 0x333, 0x6, 0x4}, 0x18}}, 0x20000010) recvmsg$kcm(r0, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x40002000) 0s ago: executing program 3 (id=5486): r0 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) dup3(r1, r0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:35709' (ED25519) to the list of known hosts. [ 218.936353][ T30] audit: type=1400 audit(218.290:46): avc: denied { name_bind } for pid=3317 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 219.388455][ T30] audit: type=1400 audit(218.740:47): avc: denied { execute } for pid=3318 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 219.396110][ T30] audit: type=1400 audit(218.750:48): avc: denied { execute_no_trans } for pid=3318 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 226.818083][ T30] audit: type=1400 audit(226.170:49): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 226.840490][ T30] audit: type=1400 audit(226.190:50): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 226.898151][ T3318] cgroup: Unknown subsys name 'net' [ 226.939030][ T30] audit: type=1400 audit(226.290:51): avc: denied { unmount } for pid=3318 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 227.284552][ T3318] cgroup: Unknown subsys name 'cpuset' [ 227.355811][ T3318] cgroup: Unknown subsys name 'rlimit' [ 227.615681][ T30] audit: type=1400 audit(226.970:52): avc: denied { setattr } for pid=3318 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 227.624708][ T30] audit: type=1400 audit(226.970:53): avc: denied { mounton } for pid=3318 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 227.628155][ T30] audit: type=1400 audit(226.980:54): avc: denied { mount } for pid=3318 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 228.236721][ T3320] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 228.244942][ T30] audit: type=1400 audit(227.590:55): avc: denied { relabelto } for pid=3320 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 228.253601][ T30] audit: type=1400 audit(227.600:56): avc: denied { write } for pid=3320 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 228.405168][ T30] audit: type=1400 audit(227.750:57): avc: denied { read } for pid=3318 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 228.433144][ T30] audit: type=1400 audit(227.760:58): avc: denied { open } for pid=3318 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 228.445127][ T3318] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 257.117628][ T30] audit: type=1400 audit(256.470:59): avc: denied { execmem } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 257.267863][ T30] audit: type=1400 audit(256.620:60): avc: denied { read } for pid=3323 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 257.284006][ T30] audit: type=1400 audit(256.640:61): avc: denied { open } for pid=3323 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 257.305666][ T30] audit: type=1400 audit(256.660:62): avc: denied { mounton } for pid=3323 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 257.395192][ T30] audit: type=1400 audit(256.740:64): avc: denied { module_request } for pid=3323 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 257.398508][ T30] audit: type=1400 audit(256.740:63): avc: denied { module_request } for pid=3324 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 257.725209][ T30] audit: type=1400 audit(257.080:65): avc: denied { sys_module } for pid=3324 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 265.077701][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 265.102747][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 265.647370][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 265.678934][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 268.045593][ T3323] hsr_slave_0: entered promiscuous mode [ 268.059347][ T3323] hsr_slave_1: entered promiscuous mode [ 268.624476][ T3324] hsr_slave_0: entered promiscuous mode [ 268.642256][ T3324] hsr_slave_1: entered promiscuous mode [ 268.650885][ T3324] debugfs: 'hsr0' already exists in 'hsr' [ 268.654135][ T3324] Cannot create hsr debugfs directory [ 271.134792][ T30] audit: type=1400 audit(270.490:66): avc: denied { create } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 271.148434][ T30] audit: type=1400 audit(270.500:67): avc: denied { write } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 271.174170][ T30] audit: type=1400 audit(270.520:68): avc: denied { read } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 271.186236][ T3324] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 271.295241][ T3324] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 271.343567][ T3324] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 271.381327][ T3324] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 271.852020][ T3323] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 271.914382][ T3323] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 271.963668][ T3323] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 272.011330][ T3323] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 274.119269][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 274.359220][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 284.943239][ T3324] veth0_vlan: entered promiscuous mode [ 285.010946][ T3324] veth1_vlan: entered promiscuous mode [ 285.377415][ T3324] veth0_macvtap: entered promiscuous mode [ 285.467284][ T3324] veth1_macvtap: entered promiscuous mode [ 286.086333][ T991] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 286.152989][ T991] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 286.154310][ T991] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 286.154637][ T991] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 286.279876][ T3323] veth0_vlan: entered promiscuous mode [ 286.577227][ T3323] veth1_vlan: entered promiscuous mode [ 286.935294][ T30] audit: type=1400 audit(286.290:69): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 286.963967][ T30] audit: type=1400 audit(286.310:70): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.UOqZl2/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 287.012254][ T30] audit: type=1400 audit(286.360:71): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 287.054868][ T30] audit: type=1400 audit(286.410:72): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.UOqZl2/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 287.068993][ T30] audit: type=1400 audit(286.420:73): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.UOqZl2/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3596 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 287.117148][ T30] audit: type=1400 audit(286.470:74): avc: denied { unmount } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 287.172715][ T30] audit: type=1400 audit(286.530:75): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 287.214328][ T30] audit: type=1400 audit(286.560:76): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="gadgetfs" ino=3597 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 287.295578][ T30] audit: type=1400 audit(286.630:77): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 287.296643][ T30] audit: type=1400 audit(286.640:78): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 287.457140][ T3323] veth0_macvtap: entered promiscuous mode [ 287.484813][ T3323] veth1_macvtap: entered promiscuous mode [ 287.526712][ T3324] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 288.382625][ T742] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.383757][ T742] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.384112][ T742] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.384455][ T742] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 295.946177][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 295.947099][ T30] audit: type=1400 audit(295.290:83): avc: denied { create } for pid=3504 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 295.947471][ T30] audit: type=1400 audit(295.300:84): avc: denied { connect } for pid=3504 comm="syz.0.17" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 295.970564][ T30] audit: type=1400 audit(295.310:85): avc: denied { write } for pid=3504 comm="syz.0.17" path="socket:[3721]" dev="sockfs" ino=3721 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 297.606065][ T30] audit: type=1400 audit(296.960:86): avc: denied { read write } for pid=3512 comm="syz.0.21" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 297.654175][ T30] audit: type=1400 audit(296.960:87): avc: denied { open } for pid=3512 comm="syz.0.21" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 297.684888][ T30] audit: type=1400 audit(297.040:88): avc: denied { block_suspend } for pid=3512 comm="syz.0.21" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 298.836560][ T30] audit: type=1400 audit(298.190:89): avc: denied { write } for pid=3520 comm="syz.1.25" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 298.839012][ T30] audit: type=1400 audit(298.190:90): avc: denied { open } for pid=3520 comm="syz.1.25" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 299.091069][ T3523] capability: warning: `syz.0.26' uses deprecated v2 capabilities in a way that may be insecure [ 301.440469][ T30] audit: type=1400 audit(300.790:91): avc: denied { allowed } for pid=3536 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 301.472426][ T30] audit: type=1400 audit(300.820:92): avc: denied { create } for pid=3536 comm="syz.1.33" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 304.108216][ T30] audit: type=1400 audit(303.460:93): avc: denied { write } for pid=3564 comm="syz.0.46" name="arp" dev="proc" ino=4026532626 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 304.121387][ T30] audit: type=1400 audit(303.470:94): avc: denied { read write } for pid=3565 comm="syz.1.47" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 304.122072][ T30] audit: type=1400 audit(303.470:95): avc: denied { open } for pid=3565 comm="syz.1.47" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 304.156606][ T30] audit: type=1400 audit(303.510:96): avc: denied { ioctl } for pid=3565 comm="syz.1.47" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 305.953462][ T30] audit: type=1400 audit(305.310:97): avc: denied { setattr } for pid=3575 comm="syz.1.51" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 308.854500][ T30] audit: type=1400 audit(308.200:98): avc: denied { write } for pid=3599 comm="syz.1.63" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 309.451378][ T30] audit: type=1400 audit(308.800:99): avc: denied { create } for pid=3603 comm="syz.0.65" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 309.935611][ T30] audit: type=1400 audit(309.280:100): avc: denied { read write } for pid=3607 comm="syz.1.67" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 309.936166][ T30] audit: type=1400 audit(309.290:101): avc: denied { open } for pid=3607 comm="syz.1.67" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 309.950963][ T30] audit: type=1400 audit(309.300:102): avc: denied { ioctl } for pid=3607 comm="syz.1.67" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x6207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 309.958717][ T30] audit: type=1400 audit(309.310:103): avc: denied { set_context_mgr } for pid=3607 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 309.992918][ T3609] binder: BINDER_SET_CONTEXT_MGR already set [ 309.993611][ T3609] binder: 3607:3609 ioctl 40046207 0 returned -16 [ 314.065621][ T3644] Zero length message leads to an empty skb [ 317.546073][ T30] audit: type=1400 audit(316.900:104): avc: denied { create } for pid=3671 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 317.604365][ T30] audit: type=1400 audit(316.950:105): avc: denied { write } for pid=3671 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 319.028366][ T30] audit: type=1400 audit(318.380:106): avc: denied { read } for pid=3679 comm="syz.0.103" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 319.048189][ T30] audit: type=1400 audit(318.400:107): avc: denied { open } for pid=3679 comm="syz.0.103" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 319.076729][ T30] audit: type=1400 audit(318.420:108): avc: denied { ioctl } for pid=3679 comm="syz.0.103" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 319.086404][ T30] audit: type=1400 audit(318.440:109): avc: denied { create } for pid=3680 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 319.147155][ T30] audit: type=1400 audit(318.490:110): avc: denied { bind } for pid=3680 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 319.166124][ T30] audit: type=1400 audit(318.520:111): avc: denied { setopt } for pid=3680 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 319.967682][ T30] audit: type=1400 audit(319.320:112): avc: denied { ioctl } for pid=3684 comm="syz.0.106" path="socket:[4027]" dev="sockfs" ino=4027 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 345.703440][ T30] audit: type=1400 audit(345.060:113): avc: denied { read write } for pid=3857 comm="syz.0.189" name="udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 345.734659][ T30] audit: type=1400 audit(345.070:114): avc: denied { open } for pid=3857 comm="syz.0.189" path="/dev/udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 345.796722][ T30] audit: type=1400 audit(345.150:115): avc: denied { ioctl } for pid=3857 comm="syz.0.189" path="/dev/udmabuf" dev="devtmpfs" ino=677 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 348.306238][ T30] audit: type=1400 audit(347.660:116): avc: denied { create } for pid=3870 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 348.407422][ T30] audit: type=1400 audit(347.760:117): avc: denied { write } for pid=3870 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 348.526144][ T30] audit: type=1400 audit(347.880:118): avc: denied { read } for pid=3870 comm="syz.0.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 351.561925][ T30] audit: type=1400 audit(350.910:119): avc: denied { setattr } for pid=3324 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 352.240428][ T30] audit: type=1400 audit(351.580:120): avc: denied { accept } for pid=3887 comm="syz.0.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 358.175315][ T30] audit: type=1400 audit(357.530:121): avc: denied { create } for pid=3903 comm="syz.0.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 358.223216][ T30] audit: type=1400 audit(357.570:122): avc: denied { write } for pid=3903 comm="syz.0.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 358.345715][ T30] audit: type=1400 audit(357.700:123): avc: denied { read } for pid=3903 comm="syz.0.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 361.898846][ T30] audit: type=1400 audit(361.250:124): avc: denied { prog_load } for pid=3915 comm="syz.0.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 361.906554][ T30] audit: type=1400 audit(361.260:125): avc: denied { bpf } for pid=3915 comm="syz.0.217" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 398.344122][ T1529] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 399.094150][ T1529] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 399.692235][ T1529] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 400.113627][ T1529] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 401.648696][ T30] audit: type=1400 audit(400.980:126): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 402.095019][ T4049] capability: warning: `syz.0.278' uses 32-bit capabilities (legacy support in use) [ 404.487464][ T1529] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 404.581865][ T1529] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 404.650021][ T1529] bond0 (unregistering): Released all slaves [ 405.298421][ T1529] hsr_slave_0: left promiscuous mode [ 405.342379][ T1529] hsr_slave_1: left promiscuous mode [ 405.812824][ T1529] veth1_macvtap: left promiscuous mode [ 405.815125][ T1529] veth0_macvtap: left promiscuous mode [ 405.817472][ T1529] veth1_vlan: left promiscuous mode [ 405.819343][ T1529] veth0_vlan: left promiscuous mode [ 419.572101][ T30] audit: type=1400 audit(418.920:127): avc: denied { append } for pid=4104 comm="syz.0.297" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 422.390755][ T30] audit: type=1400 audit(421.740:128): avc: denied { read write } for pid=4117 comm="syz.0.301" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 422.415823][ T30] audit: type=1400 audit(421.770:129): avc: denied { open } for pid=4117 comm="syz.0.301" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 422.466306][ T30] audit: type=1400 audit(421.820:130): avc: denied { ioctl } for pid=4117 comm="syz.0.301" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 422.934337][ T30] audit: type=1400 audit(422.260:131): avc: denied { compute_member } for pid=4121 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 426.668342][ T4033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 426.793064][ T4033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 428.598707][ T30] audit: type=1400 audit(427.950:132): avc: denied { open } for pid=4158 comm="syz.0.313" path="/dev/ptyq4" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 428.746970][ T30] audit: type=1400 audit(428.100:133): avc: denied { ioctl } for pid=4158 comm="syz.0.313" path="/dev/ttyq4" dev="devtmpfs" ino=371 ioctlcmd=0x542c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 429.137491][ T30] audit: type=1400 audit(428.490:134): avc: denied { create } for pid=4162 comm="syz.0.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 429.165829][ T30] audit: type=1400 audit(428.520:135): avc: denied { connect } for pid=4162 comm="syz.0.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 429.221150][ T30] audit: type=1400 audit(428.570:136): avc: denied { write } for pid=4162 comm="syz.0.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 435.368657][ T4033] hsr_slave_0: entered promiscuous mode [ 435.391164][ T4033] hsr_slave_1: entered promiscuous mode [ 435.407170][ T4033] debugfs: 'hsr0' already exists in 'hsr' [ 435.409140][ T4033] Cannot create hsr debugfs directory [ 439.161982][ T4033] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 439.297882][ T4033] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 439.458922][ T4033] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 439.648853][ T4033] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 446.288428][ T4033] 8021q: adding VLAN 0 to HW filter on device bond0 [ 449.255970][ T4259] mmap: syz.0.341 (4259) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 457.194848][ T30] audit: type=1400 audit(456.530:137): avc: denied { name_bind } for pid=4289 comm="syz.0.350" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 457.245022][ T30] audit: type=1400 audit(456.600:138): avc: denied { node_bind } for pid=4289 comm="syz.0.350" saddr=255.255.255.255 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 459.881654][ T4307] netlink: 184 bytes leftover after parsing attributes in process `syz.0.355'. [ 464.627684][ T30] audit: type=1400 audit(463.970:139): avc: denied { associate } for pid=4332 comm="syz.0.363" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 471.293428][ T4033] veth0_vlan: entered promiscuous mode [ 471.537232][ T4033] veth1_vlan: entered promiscuous mode [ 472.115988][ T4033] veth0_macvtap: entered promiscuous mode [ 472.338075][ T4033] veth1_macvtap: entered promiscuous mode [ 473.236551][ T26] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 473.237272][ T26] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 473.246627][ T26] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 473.247251][ T26] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 474.770435][ T30] audit: type=1400 audit(474.110:140): avc: denied { mounton } for pid=4033 comm="syz-executor" path="/syzkaller.gJ2t41/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 474.971536][ T30] audit: type=1400 audit(474.290:141): avc: denied { mounton } for pid=4033 comm="syz-executor" path="/syzkaller.gJ2t41/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 475.028473][ T30] audit: type=1400 audit(474.380:142): avc: denied { mount } for pid=4033 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 475.463635][ T30] audit: type=1400 audit(474.810:143): avc: denied { mounton } for pid=4033 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 480.115698][ T30] audit: type=1400 audit(479.470:144): avc: denied { setopt } for pid=4399 comm="syz.0.385" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 481.387208][ T30] audit: type=1400 audit(480.730:145): avc: denied { create } for pid=4405 comm="syz.2.388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 481.531485][ T30] audit: type=1400 audit(480.880:146): avc: denied { ioctl } for pid=4405 comm="syz.2.388" path="socket:[7302]" dev="sockfs" ino=7302 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 484.744917][ T30] audit: type=1400 audit(484.100:147): avc: denied { map } for pid=4425 comm="syz.2.396" path="socket:[7320]" dev="sockfs" ino=7320 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 489.675207][ T4458] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 501.485444][ T30] audit: type=1400 audit(500.840:148): avc: denied { create } for pid=4529 comm="syz.2.447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 501.516953][ T30] audit: type=1400 audit(500.870:149): avc: denied { write } for pid=4529 comm="syz.2.447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 512.552053][ T30] audit: type=1400 audit(511.900:150): avc: denied { ioctl } for pid=4597 comm="syz.2.481" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 515.654082][ T30] audit: type=1400 audit(515.000:151): avc: denied { execute } for pid=4624 comm="syz.2.494" name="file0" dev="tmpfs" ino=323 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 519.626973][ T30] audit: type=1400 audit(518.980:152): avc: denied { ioctl } for pid=4649 comm="syz.2.506" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=7688 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 521.528800][ T30] audit: type=1400 audit(520.880:153): avc: denied { create } for pid=4662 comm="syz.2.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 521.533298][ T30] audit: type=1400 audit(520.880:154): avc: denied { setopt } for pid=4662 comm="syz.2.513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 522.599234][ T30] audit: type=1400 audit(521.940:155): avc: denied { setattr } for pid=4671 comm="syz.0.517" name="RAW" dev="sockfs" ino=8622 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 531.815496][ T30] audit: type=1400 audit(531.170:156): avc: denied { create } for pid=4729 comm="syz.2.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 533.870880][ T30] audit: type=1400 audit(533.220:157): avc: denied { setopt } for pid=4734 comm="syz.2.547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 539.167961][ T30] audit: type=1400 audit(538.520:158): avc: denied { mount } for pid=4758 comm="syz.0.559" name="/" dev="pstore" ino=986 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 541.223247][ T30] audit: type=1400 audit(540.550:159): avc: denied { read } for pid=4777 comm="syz.0.569" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 541.224197][ T30] audit: type=1400 audit(540.560:160): avc: denied { open } for pid=4777 comm="syz.0.569" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 550.365180][ T30] audit: type=1400 audit(549.700:161): avc: denied { read } for pid=4832 comm="syz.0.596" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 550.375991][ T30] audit: type=1400 audit(549.730:162): avc: denied { open } for pid=4832 comm="syz.0.596" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 561.644111][ T4900] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 562.927465][ T30] audit: type=1400 audit(562.280:163): avc: denied { read write } for pid=4905 comm="syz.2.631" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 562.941020][ T30] audit: type=1400 audit(562.290:164): avc: denied { open } for pid=4905 comm="syz.2.631" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 563.575624][ T30] audit: type=1400 audit(562.930:165): avc: denied { create } for pid=4911 comm="syz.2.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 563.603363][ T30] audit: type=1400 audit(562.960:166): avc: denied { write } for pid=4911 comm="syz.2.634" path="socket:[9101]" dev="sockfs" ino=9101 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 563.606545][ T30] audit: type=1400 audit(562.960:167): avc: denied { nlmsg_read } for pid=4911 comm="syz.2.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 563.646676][ T30] audit: type=1400 audit(563.000:168): avc: denied { nlmsg_write } for pid=4911 comm="syz.2.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 563.649238][ T30] audit: type=1400 audit(563.000:169): avc: denied { read } for pid=4911 comm="syz.2.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 567.481448][ T30] audit: type=1400 audit(566.840:170): avc: denied { read write } for pid=4941 comm="syz.0.649" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 567.486948][ T30] audit: type=1400 audit(566.840:171): avc: denied { open } for pid=4941 comm="syz.0.649" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 567.527502][ T30] audit: type=1400 audit(566.860:172): avc: denied { ioctl } for pid=4941 comm="syz.0.649" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 572.947163][ T30] audit: type=1400 audit(572.300:173): avc: denied { perfmon } for pid=4978 comm="syz.2.667" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 573.020842][ T30] audit: type=1400 audit(572.370:174): avc: denied { prog_run } for pid=4978 comm="syz.2.667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 577.313903][ T5008] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5008 comm=syz.0.680 [ 582.901657][ T30] audit: type=1400 audit(582.250:175): avc: denied { write } for pid=5041 comm="syz.2.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 583.007430][ T30] audit: type=1400 audit(582.360:176): avc: denied { read } for pid=5041 comm="syz.2.699" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 583.201791][ T30] audit: type=1400 audit(582.550:177): avc: denied { create } for pid=5045 comm="syz.0.700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 583.232253][ T30] audit: type=1400 audit(582.570:178): avc: denied { setopt } for pid=5045 comm="syz.0.700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 586.258695][ T30] audit: type=1400 audit(585.610:179): avc: denied { execute } for pid=5064 comm="syz.2.709" path=2F6D656D66643A25202864656C6574656429 dev="hugetlbfs" ino=9354 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 592.830322][ T30] audit: type=1400 audit(592.180:180): avc: denied { validate_trans } for pid=5099 comm="syz.2.724" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 595.766914][ T30] audit: type=1400 audit(595.120:181): avc: denied { write } for pid=5116 comm="syz.0.733" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 599.576538][ T30] audit: type=1400 audit(598.920:182): avc: denied { map_create } for pid=5147 comm="syz.0.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 599.691291][ T30] audit: type=1400 audit(599.040:183): avc: denied { map_read map_write } for pid=5147 comm="syz.0.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 602.334400][ T30] audit: type=1400 audit(601.680:184): avc: denied { nlmsg_write } for pid=5162 comm="syz.2.755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 607.946622][ T30] audit: type=1400 audit(607.300:185): avc: denied { write } for pid=5196 comm="syz.2.772" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 607.961021][ T30] audit: type=1400 audit(607.300:186): avc: denied { open } for pid=5196 comm="syz.2.772" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 607.976457][ T30] audit: type=1400 audit(607.330:187): avc: denied { ioctl } for pid=5196 comm="syz.2.772" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4b32 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 609.316419][ T30] audit: type=1400 audit(608.670:188): avc: denied { create } for pid=5204 comm="syz.2.776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 620.662316][ T3469] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 620.923207][ T3469] usb 1-1: New USB device found, idVendor=1557, idProduct=7720, bcdDevice=b7.eb [ 620.937645][ T3469] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 621.098919][ T3469] usb 1-1: config 0 descriptor?? [ 621.694286][ T3469] asix 1-1:0.0 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -61 [ 621.698427][ T3469] asix 1-1:0.0 (unnamed net_device) (uninitialized): Error reading PHY_ID register: ffffffc3 [ 621.707282][ T3469] asix 1-1:0.0: probe with driver asix failed with error -61 [ 621.974041][ T3411] usb 1-1: USB disconnect, device number 2 [ 634.403756][ T30] audit: type=1400 audit(633.750:189): avc: denied { ioctl } for pid=5355 comm="syz.0.847" path="socket:[9844]" dev="sockfs" ino=9844 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 636.562472][ T30] audit: type=1400 audit(635.910:190): avc: denied { read write } for pid=5366 comm="syz.2.853" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 636.603339][ T30] audit: type=1400 audit(635.950:191): avc: denied { open } for pid=5366 comm="syz.2.853" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 637.037663][ T30] audit: type=1400 audit(636.360:192): avc: denied { unmount } for pid=4033 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 639.308445][ T5381] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5381 comm=syz.2.859 [ 641.034379][ T30] audit: type=1400 audit(640.390:193): avc: denied { ioctl } for pid=5390 comm="syz.2.864" path="socket:[9894]" dev="sockfs" ino=9894 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 651.029083][ T30] audit: type=1400 audit(650.380:194): avc: denied { mount } for pid=5466 comm="syz.2.902" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 651.072962][ T30] audit: type=1400 audit(650.430:195): avc: denied { remount } for pid=5466 comm="syz.2.902" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 651.241922][ T30] audit: type=1400 audit(650.590:196): avc: denied { unmount } for pid=4033 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 663.145974][ T5530] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5530 comm=syz.2.933 [ 665.826692][ T5550] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5550 comm=syz.2.943 [ 669.362409][ T30] audit: type=1400 audit(668.710:197): avc: denied { read } for pid=5573 comm="syz.2.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 676.564428][ T30] audit: type=1400 audit(675.920:198): avc: denied { read write } for pid=5618 comm="syz.0.977" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 676.567706][ T30] audit: type=1400 audit(675.920:199): avc: denied { open } for pid=5618 comm="syz.0.977" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 676.839098][ T967] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 676.844293][ T967] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 676.845406][ T967] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 676.845788][ T967] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 676.852944][ T967] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 676.855969][ T967] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 676.857060][ T967] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 676.857316][ T967] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 676.857598][ T967] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 676.857839][ T967] hid-generic 0401:0002:0007.0001: unknown main item tag 0x0 [ 677.133598][ T967] hid-generic 0401:0002:0007.0001: hidraw0: HID vffffff.f6 Device [syz1] on syz1 [ 689.158422][ T5685] fido_id[5685]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 689.963986][ T30] audit: type=1400 audit(689.320:200): avc: denied { create } for pid=5698 comm="syz.0.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 690.037259][ T30] audit: type=1400 audit(689.390:201): avc: denied { connect } for pid=5698 comm="syz.0.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 690.593847][ T30] audit: type=1400 audit(689.940:202): avc: denied { setopt } for pid=5698 comm="syz.0.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 703.615693][ T5755] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5755 comm=syz.0.1042 [ 703.958619][ T30] audit: type=1400 audit(703.310:203): avc: denied { mount } for pid=5757 comm="syz.0.1044" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 704.205405][ T30] audit: type=1400 audit(703.560:204): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 715.863696][ T30] audit: type=1400 audit(715.220:205): avc: denied { listen } for pid=5835 comm="syz.2.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 715.931779][ T30] audit: type=1400 audit(715.280:206): avc: denied { getopt } for pid=5835 comm="syz.2.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 727.367048][ T30] audit: type=1400 audit(726.720:207): avc: denied { read } for pid=5892 comm="syz.2.1110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 749.192669][ T6012] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 749.192669][ T6012] The task syz.0.1163 (6012) triggered the difference, watch for misbehavior. [ 753.835771][ T30] audit: type=1400 audit(753.190:208): avc: denied { write } for pid=6037 comm="syz.2.1178" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 754.451311][ T30] audit: type=1400 audit(753.790:209): avc: denied { ioctl } for pid=6041 comm="syz.0.1180" path="socket:[13030]" dev="sockfs" ino=13030 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 761.088179][ T30] audit: type=1400 audit(760.420:210): avc: denied { setattr } for pid=6081 comm="syz.2.1199" name="" dev="pipefs" ino=6292 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 784.766138][ T6195] ucma_write: process 911 (syz.2.1254) changed security contexts after opening file descriptor, this is not allowed. [ 790.421909][ T30] audit: type=1400 audit(789.770:211): avc: denied { remount } for pid=6226 comm="syz.0.1270" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 790.760841][ T30] audit: type=1400 audit(790.100:212): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 805.837093][ T30] audit: type=1400 audit(805.190:213): avc: denied { read open } for pid=6309 comm="syz.2.1310" path="net:[4026532690]" dev="nsfs" ino=4026532690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 821.335251][ T30] audit: type=1400 audit(820.690:214): avc: denied { map } for pid=6369 comm="syz.0.1338" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13635 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 821.432945][ T30] audit: type=1400 audit(820.710:215): avc: denied { read write } for pid=6369 comm="syz.0.1338" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=13635 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 842.006186][ T30] audit: type=1400 audit(841.350:216): avc: denied { setopt } for pid=6466 comm="syz.0.1384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 846.113415][ T30] audit: type=1400 audit(845.470:217): avc: denied { write } for pid=6485 comm="syz.2.1394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 846.196676][ T30] audit: type=1400 audit(845.550:218): avc: denied { read } for pid=6485 comm="syz.2.1394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 849.894106][ T6504] SELinux: Context system_u:object_r:hald_var_run_t:s0 is not valid (left unmapped). [ 849.932391][ T30] audit: type=1400 audit(849.280:219): avc: denied { relabelto } for pid=6502 comm="syz.0.1402" name="file0" dev="tmpfs" ino=3860 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 850.016968][ T30] audit: type=1400 audit(849.370:220): avc: denied { associate } for pid=6502 comm="syz.0.1402" name="file0" dev="tmpfs" ino=3860 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_var_run_t:s0" [ 850.334571][ T30] audit: type=1400 audit(849.690:221): avc: denied { unlink } for pid=3323 comm="syz-executor" name="file0" dev="tmpfs" ino=3860 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 855.398053][ T6534] ptrace attach of "/syz-executor exec"[6535] was attempted by "/syz-executor exec"[6534] [ 864.982351][ T30] audit: type=1400 audit(864.320:222): avc: denied { map } for pid=6578 comm="syz.0.1439" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 865.010634][ T30] audit: type=1400 audit(864.360:223): avc: denied { execute } for pid=6578 comm="syz.0.1439" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 896.185692][ T30] audit: type=1400 audit(895.540:224): avc: denied { read } for pid=6746 comm="syz.2.1521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 896.786926][ T30] audit: type=1400 audit(896.140:225): avc: denied { shutdown } for pid=6746 comm="syz.2.1521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 905.390546][ T30] audit: type=1400 audit(904.740:226): avc: denied { write } for pid=6783 comm="syz.0.1539" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 926.925737][ T30] audit: type=1400 audit(926.270:227): avc: denied { create } for pid=6862 comm="syz.2.1577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 926.981535][ T30] audit: type=1400 audit(926.320:228): avc: denied { setopt } for pid=6862 comm="syz.2.1577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 934.928819][ T30] audit: type=1400 audit(934.280:229): avc: granted { setsecparam } for pid=6904 comm="syz.0.1596" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 939.510757][ T30] audit: type=1400 audit(938.860:230): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 942.813075][ T30] audit: type=1400 audit(942.160:231): avc: denied { audit_write } for pid=6951 comm="syz.2.1620" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 945.903953][ T30] audit: type=1400 audit(945.250:232): avc: denied { sqpoll } for pid=6963 comm="syz.0.1625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 953.036758][ T30] audit: type=1400 audit(952.380:233): avc: denied { create } for pid=6988 comm="syz.0.1637" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 953.116698][ T30] audit: type=1400 audit(952.470:234): avc: denied { write } for pid=6988 comm="syz.0.1637" name="file0" dev="tmpfs" ino=4342 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 953.130888][ T30] audit: type=1400 audit(952.470:235): avc: denied { open } for pid=6988 comm="syz.0.1637" path="/841/file0" dev="tmpfs" ino=4342 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 953.226214][ T30] audit: type=1400 audit(952.580:236): avc: denied { ioctl } for pid=6988 comm="syz.0.1637" path="/841/file0" dev="tmpfs" ino=4342 ioctlcmd=0x1265 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 953.420519][ T30] audit: type=1400 audit(952.760:237): avc: denied { unlink } for pid=3323 comm="syz-executor" name="file0" dev="tmpfs" ino=4342 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 980.169141][ T30] audit: type=1400 audit(979.520:238): avc: denied { create } for pid=7104 comm="syz.0.1693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 980.205372][ T30] audit: type=1400 audit(979.560:239): avc: denied { write } for pid=7104 comm="syz.0.1693" path="socket:[15987]" dev="sockfs" ino=15987 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 989.879644][ T7147] SELinux: Context system_u:object_r:dhcp_etc_t:s0 is not valid (left unmapped). [ 995.777601][ T30] audit: type=1400 audit(995.130:240): avc: denied { read } for pid=7174 comm="syz.0.1728" path="socket:[16124]" dev="sockfs" ino=16124 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1031.162168][ T7335] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7335 comm=syz.2.1806 [ 1033.118164][ T30] audit: type=1400 audit(1032.470:241): avc: denied { setattr } for pid=7340 comm="syz.2.1810" name="sequencer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1035.304827][ T30] audit: type=1400 audit(1034.650:242): avc: denied { setopt } for pid=7346 comm="syz.2.1813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1059.601292][ T30] audit: type=1400 audit(1058.950:243): avc: denied { setopt } for pid=7451 comm="syz.2.1862" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1065.592108][ T30] audit: type=1400 audit(1064.940:244): avc: denied { unmount } for pid=7479 comm="syz.0.1875" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1077.658398][ T967] hid_parser_main: 73 callbacks suppressed [ 1077.672337][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1077.678955][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1077.681950][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1077.683853][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1077.685702][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1077.688936][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1077.691426][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1077.693379][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1077.695298][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1077.697093][ T967] hid-generic 0000:007F:FFFFFFFE.0002: unknown main item tag 0x0 [ 1077.733027][ T967] hid-generic 0000:007F:FFFFFFFE.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1081.246958][ T7546] fido_id[7546]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1106.192253][ T7678] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7678 comm=syz.2.1972 [ 1134.984789][ T742] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1135.646382][ T742] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1136.179310][ T742] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1136.536744][ T742] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1142.403737][ T742] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1142.484637][ T742] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1142.573828][ T742] bond0 (unregistering): Released all slaves [ 1143.273702][ T742] hsr_slave_0: left promiscuous mode [ 1143.298585][ T742] hsr_slave_1: left promiscuous mode [ 1143.545916][ T742] veth1_macvtap: left promiscuous mode [ 1143.547192][ T742] veth0_macvtap: left promiscuous mode [ 1143.548601][ T742] veth1_vlan: left promiscuous mode [ 1143.562903][ T742] veth0_vlan: left promiscuous mode [ 1168.107294][ T7807] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1168.144395][ T7807] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1178.779110][ T7807] hsr_slave_0: entered promiscuous mode [ 1178.826254][ T7807] hsr_slave_1: entered promiscuous mode [ 1178.868219][ T7807] debugfs: 'hsr0' already exists in 'hsr' [ 1178.871527][ T7807] Cannot create hsr debugfs directory [ 1183.587255][ T7807] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1183.707162][ T7807] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1183.825668][ T7807] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1183.964523][ T7807] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1191.954651][ T7807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1206.067085][ T8027] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8027 comm=syz.0.2096 [ 1221.207187][ T7807] veth0_vlan: entered promiscuous mode [ 1221.552831][ T7807] veth1_vlan: entered promiscuous mode [ 1222.565234][ T7807] veth0_macvtap: entered promiscuous mode [ 1222.766360][ T7807] veth1_macvtap: entered promiscuous mode [ 1223.799071][ T1529] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1223.801458][ T1529] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1223.801901][ T1529] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1223.802300][ T1529] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1225.507496][ T30] audit: type=1400 audit(1224.860:245): avc: denied { unmount } for pid=7807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1226.251269][ T30] audit: type=1400 audit(1225.600:246): avc: denied { mount } for pid=8089 comm="syz.0.2110" name="/" dev="autofs" ino=19803 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1226.358544][ T30] audit: type=1400 audit(1225.710:247): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1233.117369][ T30] audit: type=1400 audit(1232.470:248): avc: denied { connect } for pid=8122 comm="syz.3.2123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1233.705514][ T30] audit: type=1400 audit(1233.040:249): avc: denied { read } for pid=8122 comm="syz.3.2123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1260.655457][ T30] audit: type=1400 audit(1260.010:250): avc: denied { create } for pid=8226 comm="syz.0.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1260.811278][ T30] audit: type=1400 audit(1260.120:251): avc: denied { setopt } for pid=8226 comm="syz.0.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1261.463835][ T30] audit: type=1400 audit(1260.820:252): avc: denied { getopt } for pid=8226 comm="syz.0.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1261.467986][ T30] audit: type=1400 audit(1260.820:253): avc: denied { write } for pid=8230 comm="syz.3.2173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1276.114876][ T30] audit: type=1400 audit(1275.470:254): avc: denied { unlink } for pid=7807 comm="syz-executor" name="file1" dev="tmpfs" ino=297 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1281.731410][ T30] audit: type=1400 audit(1281.080:255): avc: denied { read } for pid=8315 comm="syz.3.2215" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1281.745796][ T30] audit: type=1400 audit(1281.100:256): avc: denied { open } for pid=8315 comm="syz.3.2215" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1281.789167][ T30] audit: type=1400 audit(1281.140:257): avc: denied { ioctl } for pid=8315 comm="syz.3.2215" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1283.555733][ T8327] netlink: 45 bytes leftover after parsing attributes in process `syz.0.2219'. [ 1290.781055][ T30] audit: type=1400 audit(1290.120:258): avc: denied { create } for pid=8367 comm="syz.3.2240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1290.800946][ T30] audit: type=1400 audit(1290.150:259): avc: denied { write } for pid=8367 comm="syz.3.2240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1336.411798][ T30] audit: type=1400 audit(1335.770:260): avc: denied { mounton } for pid=8596 comm="syz.0.2352" path="/1156/file1" dev="tmpfs" ino=5967 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1338.221776][ T30] audit: type=1400 audit(1337.570:261): avc: denied { read } for pid=8605 comm="syz.3.2358" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1339.636979][ T30] audit: type=1400 audit(1338.990:262): avc: denied { ioctl } for pid=8610 comm="syz.0.2360" path="socket:[21625]" dev="sockfs" ino=21625 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1366.973773][ T30] audit: type=1400 audit(1366.320:263): avc: denied { read } for pid=8737 comm="syz.0.2422" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1383.936255][ T30] audit: type=1400 audit(1383.260:264): avc: denied { relabelfrom } for pid=8829 comm="syz.3.2464" name="NETLINK" dev="sockfs" ino=22670 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1383.955408][ T30] audit: type=1400 audit(1383.310:265): avc: denied { relabelto } for pid=8829 comm="syz.3.2464" name="NETLINK" dev="sockfs" ino=22670 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_netfilter_socket permissive=1 [ 1386.398909][ T8842] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8842 comm=syz.3.2470 [ 1401.894711][ T30] audit: type=1400 audit(1401.250:266): avc: denied { create } for pid=8913 comm="syz.3.2503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1401.977267][ T30] audit: type=1400 audit(1401.320:267): avc: denied { write } for pid=8913 comm="syz.3.2503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1410.360576][ T8956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8956 comm=syz.3.2524 [ 1410.912675][ T30] audit: type=1400 audit(1410.250:268): avc: denied { bind } for pid=8958 comm="syz.3.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1433.925168][ T30] audit: type=1400 audit(1433.260:269): avc: denied { setattr } for pid=9065 comm="syz.0.2576" name="LLC" dev="sockfs" ino=22307 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1455.785028][ T9172] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9172 comm=syz.3.2629 [ 1458.896216][ T9183] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65498 sclass=netlink_audit_socket pid=9183 comm=syz.3.2634 [ 1465.724516][ T30] audit: type=1400 audit(1465.080:270): avc: denied { getopt } for pid=9214 comm="syz.3.2650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1474.250893][ T30] audit: type=1400 audit(1473.600:271): avc: denied { connect } for pid=9253 comm="syz.3.2669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1474.323656][ T30] audit: type=1400 audit(1473.670:272): avc: denied { getopt } for pid=9253 comm="syz.3.2669" laddr=::1 lport=3 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1478.838250][ T9278] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9278 comm=syz.3.2681 [ 1494.955687][ T30] audit: type=1400 audit(1494.310:273): avc: denied { append } for pid=9334 comm="syz.0.2708" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1507.787072][ T30] audit: type=1400 audit(1507.140:274): avc: denied { create } for pid=9407 comm="syz.3.2744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1507.807661][ T30] audit: type=1400 audit(1507.160:275): avc: denied { write } for pid=9407 comm="syz.3.2744" path="socket:[23932]" dev="sockfs" ino=23932 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1567.662814][ T9699] syz.3.2885 uses obsolete (PF_INET,SOCK_PACKET) [ 1575.917424][ T9736] netlink: 'syz.0.2903': attribute type 29 has an invalid length. [ 1596.277382][ T30] audit: type=1400 audit(1595.620:276): avc: denied { write } for pid=9828 comm="syz.3.2949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1596.322934][ T30] audit: type=1400 audit(1595.650:277): avc: denied { ioctl } for pid=9828 comm="syz.3.2949" path="socket:[25390]" dev="sockfs" ino=25390 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1609.874801][ T9] hid-generic 007F:6E8D:0005.0003: item fetching failed at offset 1/5 [ 1609.885033][ T9] hid-generic 007F:6E8D:0005.0003: probe with driver hid-generic failed with error -22 [ 1621.663988][ T30] audit: type=1400 audit(1621.020:278): avc: denied { read } for pid=9966 comm="syz.0.3016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1624.322755][ T30] audit: type=1400 audit(1623.680:279): avc: denied { bind } for pid=9982 comm="syz.3.3024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1624.326388][ T30] audit: type=1400 audit(1623.680:280): avc: denied { node_bind } for pid=9982 comm="syz.3.3024" saddr=127.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1629.861963][ T30] audit: type=1400 audit(1629.210:281): avc: denied { remount } for pid=10011 comm="syz.0.3038" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1630.141806][ T30] audit: type=1400 audit(1629.480:282): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 1662.163925][ T30] audit: type=1400 audit(1661.500:283): avc: denied { setopt } for pid=10163 comm="syz.0.3110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1675.852545][T10233] binder: 10232:10233 ioctl c018620c 20000240 returned -22 [ 1687.778181][ T30] audit: type=1400 audit(1687.130:284): avc: denied { write } for pid=10284 comm="syz.0.3167" path="socket:[27109]" dev="sockfs" ino=27109 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1710.276777][ T30] audit: type=1400 audit(1709.630:285): avc: denied { remount } for pid=10375 comm="syz.3.3211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1748.941916][ T30] audit: type=1400 audit(1748.290:286): avc: denied { write } for pid=10539 comm="syz.3.3291" path="socket:[27512]" dev="sockfs" ino=27512 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1754.167655][ T30] audit: type=1400 audit(1753.500:287): avc: denied { bind } for pid=10565 comm="syz.3.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1754.322143][ T30] audit: type=1400 audit(1753.650:288): avc: denied { write } for pid=10565 comm="syz.3.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1770.558182][ T30] audit: type=1400 audit(1769.910:289): avc: denied { unmount } for pid=7807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 1779.582618][T10688] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10688 comm=syz.0.3363 [ 1798.546422][ T30] audit: type=1400 audit(1797.900:290): avc: denied { read } for pid=10794 comm="syz.3.3416" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1798.556541][ T30] audit: type=1400 audit(1797.910:291): avc: denied { open } for pid=10794 comm="syz.3.3416" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1798.666760][ T30] audit: type=1400 audit(1797.990:292): avc: denied { map } for pid=10794 comm="syz.3.3416" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1798.682823][ T30] audit: type=1400 audit(1798.040:293): avc: denied { ioctl } for pid=10794 comm="syz.3.3416" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x9204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1806.257787][ T30] audit: type=1400 audit(1805.610:294): avc: denied { map } for pid=10848 comm="syz.3.3442" path="socket:[28272]" dev="sockfs" ino=28272 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1806.258351][ T30] audit: type=1400 audit(1805.610:295): avc: denied { read accept } for pid=10848 comm="syz.3.3442" path="socket:[28272]" dev="sockfs" ino=28272 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1840.627094][ T30] audit: type=1400 audit(1839.980:296): avc: denied { remount } for pid=11006 comm="syz.0.3518" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1840.831806][ T30] audit: type=1400 audit(1840.180:297): avc: denied { execute } for pid=11008 comm="syz.3.3519" path="/dev/dsp" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1845.971872][ T30] audit: type=1400 audit(1845.320:298): avc: denied { create } for pid=11041 comm="syz.3.3535" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1846.015945][ T30] audit: type=1400 audit(1845.370:299): avc: denied { read write execute } for pid=11041 comm="syz.3.3535" name="file0" dev="tmpfs" ino=4506 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1847.158379][ T30] audit: type=1400 audit(1846.510:300): avc: denied { write } for pid=11047 comm="syz.0.3538" path="socket:[28607]" dev="sockfs" ino=28607 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1870.196272][T11168] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11168 comm=syz.3.3597 [ 1873.205819][ T30] audit: type=1400 audit(1872.560:301): avc: denied { getopt } for pid=11181 comm="syz.0.3603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1911.015574][ T30] audit: type=1400 audit(1910.370:302): avc: denied { getattr } for pid=11352 comm="syz.0.3687" name="[userfaultfd]" dev="anon_inodefs" ino=31022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1960.003665][T11595] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2051 sclass=netlink_route_socket pid=11595 comm=syz.0.3804 [ 1965.342839][ T30] audit: type=1400 audit(1964.690:303): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1965.347384][ T30] audit: type=1400 audit(1964.700:304): avc: denied { open } for pid=3323 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1965.409355][ T30] audit: type=1400 audit(1964.760:305): avc: denied { ioctl } for pid=3323 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1966.256943][ T30] audit: type=1400 audit(1965.610:306): avc: denied { create } for pid=11621 comm="syz.3.3819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1966.306047][ T30] audit: type=1400 audit(1965.650:307): avc: denied { read } for pid=11621 comm="syz.3.3819" dev="nsfs" ino=4026532767 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1966.306930][ T30] audit: type=1400 audit(1965.660:308): avc: denied { open } for pid=11621 comm="syz.3.3819" path="net:[4026532767]" dev="nsfs" ino=4026532767 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1971.890560][ T30] audit: type=1400 audit(1971.240:309): avc: denied { write } for pid=11647 comm="syz.3.3832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1972.398512][ T30] audit: type=1400 audit(1971.750:310): avc: denied { create } for pid=11650 comm="syz.3.3834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1972.444331][ T30] audit: type=1400 audit(1971.800:311): avc: denied { write } for pid=11650 comm="syz.3.3834" path="socket:[31560]" dev="sockfs" ino=31560 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1973.648968][ T30] audit: type=1400 audit(1973.000:312): avc: denied { read write } for pid=11657 comm="syz.3.3837" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1973.686468][ T30] audit: type=1400 audit(1973.040:313): avc: denied { open } for pid=11657 comm="syz.3.3837" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1977.212502][ T30] audit: type=1400 audit(1976.560:314): avc: denied { read } for pid=11672 comm="syz.0.3844" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1977.213565][ T30] audit: type=1400 audit(1976.560:315): avc: denied { open } for pid=11672 comm="syz.0.3844" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1977.308604][ T30] audit: type=1400 audit(1976.660:316): avc: denied { execmem } for pid=11672 comm="syz.0.3844" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1977.402805][ T30] audit: type=1400 audit(1976.760:317): avc: denied { ioctl } for pid=11672 comm="syz.0.3844" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x6405 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1979.230418][ T30] audit: type=1400 audit(1978.580:318): avc: denied { read write } for pid=11680 comm="syz.3.3848" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1979.244802][ T30] audit: type=1400 audit(1978.590:319): avc: denied { open } for pid=11680 comm="syz.3.3848" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1980.607783][T11689] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11689 comm=syz.3.3852 [ 1982.254378][ T30] audit: type=1400 audit(1981.610:320): avc: denied { create } for pid=11694 comm="syz.3.3855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1982.306596][ T30] audit: type=1400 audit(1981.660:321): avc: denied { write } for pid=11694 comm="syz.3.3855" path="socket:[30626]" dev="sockfs" ino=30626 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1983.745159][ T30] audit: type=1400 audit(1983.090:322): avc: denied { create } for pid=11701 comm="syz.0.3858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1983.775163][ T30] audit: type=1400 audit(1983.130:323): avc: denied { ioctl } for pid=11701 comm="syz.0.3858" path="socket:[31651]" dev="sockfs" ino=31651 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1983.834641][ T30] audit: type=1400 audit(1983.180:324): avc: denied { write } for pid=11701 comm="syz.0.3858" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1991.856146][ T30] audit: type=1400 audit(1991.210:325): avc: denied { mounton } for pid=11742 comm="syz.3.3879" path="/1080/file0" dev="tmpfs" ino=5557 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1992.002294][ T30] audit: type=1400 audit(1991.340:326): avc: denied { mount } for pid=11742 comm="syz.3.3879" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1992.247837][ T30] audit: type=1400 audit(1991.600:327): avc: denied { unmount } for pid=7807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1994.297228][ T30] audit: type=1400 audit(1993.650:328): avc: denied { create } for pid=11754 comm="syz.3.3885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1994.371328][ T30] audit: type=1400 audit(1993.720:329): avc: denied { setopt } for pid=11754 comm="syz.3.3885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1997.322888][ T30] audit: type=1400 audit(1996.670:330): avc: denied { prog_load } for pid=11770 comm="syz.3.3893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1997.356896][ T30] audit: type=1400 audit(1996.710:331): avc: denied { bpf } for pid=11770 comm="syz.3.3893" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1999.014518][ T30] audit: type=1400 audit(1998.370:332): avc: denied { connect } for pid=11779 comm="syz.3.3898" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1999.065640][ T30] audit: type=1400 audit(1998.420:333): avc: denied { getopt } for pid=11779 comm="syz.3.3898" laddr=fe80::12 lport=58 faddr=fe80:: fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2001.200894][ T30] audit: type=1400 audit(2000.540:334): avc: denied { mount } for pid=11790 comm="syz.3.3903" name="/" dev="ramfs" ino=32840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2003.225292][ T30] audit: type=1400 audit(2002.580:335): avc: denied { read write } for pid=11801 comm="syz.3.3909" name="vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2003.245389][ T30] audit: type=1400 audit(2002.600:336): avc: denied { open } for pid=11801 comm="syz.3.3909" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2003.296185][ T30] audit: type=1400 audit(2002.650:337): avc: denied { ioctl } for pid=11801 comm="syz.3.3909" path="/dev/vhost-net" dev="devtmpfs" ino=714 ioctlcmd=0x6418 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2003.973608][ T30] audit: type=1400 audit(2003.330:338): avc: denied { create } for pid=11806 comm="syz.0.3911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2004.144320][ T30] audit: type=1400 audit(2003.500:339): avc: denied { bind } for pid=11806 comm="syz.0.3911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2004.308410][ T30] audit: type=1400 audit(2003.660:340): avc: denied { perfmon } for pid=11808 comm="syz.3.3912" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2004.425145][ T30] audit: type=1400 audit(2003.780:341): avc: denied { prog_run } for pid=11808 comm="syz.3.3912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2004.510386][ T30] audit: type=1400 audit(2003.860:342): avc: denied { map_create } for pid=11808 comm="syz.3.3912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2004.518266][ T30] audit: type=1400 audit(2003.870:343): avc: denied { map_read map_write } for pid=11808 comm="syz.3.3912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2006.960849][ T30] audit: type=1400 audit(2006.300:344): avc: denied { module_request } for pid=11818 comm="syz.3.3917" kmod=7463705F11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2014.404898][ T30] audit: type=1400 audit(2013.760:345): avc: denied { sys_module } for pid=11842 comm="syz.3.3928" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2014.436617][ T30] audit: type=1400 audit(2013.790:346): avc: denied { module_load } for pid=11842 comm="syz.3.3928" path=2F6D656D66643A20C736BE918D183229219A25A2D238D606070EFCFE128F2613AE254054A3B03E5CECA9F951403641108C6E7C202864656C6574656429 dev="hugetlbfs" ino=31865 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=system permissive=1 [ 2014.756353][T11843] Invalid ELF header magic: != ELF [ 2016.085321][ T30] audit: type=1400 audit(2015.440:347): avc: denied { read append } for pid=11846 comm="syz.0.3929" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2016.087533][ T30] audit: type=1400 audit(2015.440:348): avc: denied { open } for pid=11846 comm="syz.0.3929" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2016.134187][ T30] audit: type=1400 audit(2015.490:349): avc: denied { ioctl } for pid=11846 comm="syz.0.3929" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2022.896553][ T30] audit: type=1400 audit(2022.240:350): avc: denied { mount } for pid=11880 comm="syz.3.3946" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2026.099105][T11898] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=11898 comm=syz.0.3953 [ 2028.617137][T11906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=11906 comm=syz.0.3956 [ 2028.707249][ T30] audit: type=1400 audit(2028.060:351): avc: denied { unlink } for pid=7807 comm="syz-executor" name=131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D338 dev="tmpfs" ino=5780 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2032.032528][ T30] audit: type=1400 audit(2031.390:352): avc: denied { create } for pid=11922 comm="syz.0.3965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2032.044844][ T30] audit: type=1400 audit(2031.400:353): avc: denied { write } for pid=11922 comm="syz.0.3965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2039.895645][ T30] audit: type=1400 audit(2039.250:354): avc: denied { create } for pid=11968 comm="syz.0.3987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2039.941288][ T30] audit: type=1400 audit(2039.290:355): avc: denied { bind } for pid=11968 comm="syz.0.3987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2046.386020][ T30] audit: type=1400 audit(2045.740:356): avc: denied { create } for pid=12005 comm="syz.3.4006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2046.421471][ T30] audit: type=1400 audit(2045.780:357): avc: denied { search } for pid=12003 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2046.424169][ T30] audit: type=1400 audit(2045.780:358): avc: denied { search } for pid=12003 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=605 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2046.434832][ T30] audit: type=1400 audit(2045.780:359): avc: denied { search } for pid=12003 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=778 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2046.436628][ T30] audit: type=1400 audit(2045.780:360): avc: denied { search } for pid=12003 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=779 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2046.490668][ T30] audit: type=1400 audit(2045.840:361): avc: denied { read open } for pid=12008 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=779 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2046.494266][ T30] audit: type=1400 audit(2045.850:362): avc: denied { getattr } for pid=12008 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=779 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2046.704703][ T30] audit: type=1400 audit(2046.040:363): avc: denied { add_name } for pid=12003 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2046.705313][ T30] audit: type=1400 audit(2046.040:364): avc: denied { create } for pid=12003 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2046.705745][ T30] audit: type=1400 audit(2046.040:365): avc: denied { write open } for pid=12003 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=8752 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2058.151539][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 2058.151914][ T30] audit: type=1400 audit(2057.510:373): avc: denied { execute } for pid=12065 comm="syz.3.4032" path="/dev/audio1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 2067.683964][ T30] audit: type=1400 audit(2066.950:374): avc: denied { mount } for pid=12121 comm="syz.0.4060" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2068.120547][ T30] audit: type=1400 audit(2067.460:375): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2080.206138][T12170] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=12170 comm=syz.0.4083 [ 2081.411101][ T30] audit: type=1400 audit(2080.730:376): avc: denied { connect } for pid=12174 comm="syz.3.4086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2083.685799][ T30] audit: type=1400 audit(2083.040:377): avc: denied { setattr } for pid=12185 comm="syz.0.4090" name="CAN_J1939" dev="sockfs" ino=33480 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2086.806820][ T30] audit: type=1400 audit(2086.160:378): avc: denied { create } for pid=12198 comm="syz.3.4096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2087.408529][ T30] audit: type=1400 audit(2086.750:379): avc: denied { nlmsg_read } for pid=12201 comm="syz.3.4098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2093.054984][ T30] audit: type=1400 audit(2092.400:380): avc: denied { create } for pid=12236 comm="syz.3.4115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2093.076452][ T30] audit: type=1400 audit(2092.430:381): avc: denied { setopt } for pid=12236 comm="syz.3.4115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2098.142803][ T30] audit: type=1400 audit(2097.490:382): avc: denied { ioctl } for pid=12266 comm="syz.3.4131" path="net:[4026532767]" dev="nsfs" ino=4026532767 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2109.136943][ T30] audit: type=1400 audit(2108.490:383): avc: denied { allowed } for pid=12330 comm="syz.3.4161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2109.241092][ T30] audit: type=1400 audit(2108.590:384): avc: denied { create } for pid=12330 comm="syz.3.4161" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2109.253775][ T30] audit: type=1400 audit(2108.610:385): avc: denied { map } for pid=12330 comm="syz.3.4161" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=32689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2109.261413][ T30] audit: type=1400 audit(2108.610:386): avc: denied { read write } for pid=12330 comm="syz.3.4161" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=32689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2110.555190][ T30] audit: type=1400 audit(2109.890:387): avc: denied { create } for pid=12336 comm="syz.3.4164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2118.192114][ T30] audit: type=1400 audit(2117.540:388): avc: denied { ioctl } for pid=12377 comm="syz.3.4184" path="socket:[33819]" dev="sockfs" ino=33819 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2119.121263][T12383] netlink: 24 bytes leftover after parsing attributes in process `syz.3.4187'. [ 2119.138190][ T30] audit: type=1400 audit(2118.490:389): avc: denied { read } for pid=12381 comm="syz.3.4187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2123.587730][ T30] audit: type=1400 audit(2122.940:390): avc: denied { read } for pid=12407 comm="syz.0.4199" name="ubi_ctrl" dev="devtmpfs" ino=687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2123.615974][ T30] audit: type=1400 audit(2122.970:391): avc: denied { open } for pid=12407 comm="syz.0.4199" path="/dev/ubi_ctrl" dev="devtmpfs" ino=687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2131.174357][ T30] audit: type=1400 audit(2130.520:392): avc: denied { execute } for pid=12454 comm="syz.3.4222" name="file1" dev="tmpfs" ino=6605 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2137.712674][ T30] audit: type=1400 audit(2137.060:393): avc: denied { write } for pid=12482 comm="syz.3.4236" name="userfaultfd" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2146.781913][ T30] audit: type=1400 audit(2146.130:394): avc: denied { read write } for pid=12521 comm="syz.0.4254" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2146.811855][ T30] audit: type=1400 audit(2146.150:395): avc: denied { open } for pid=12521 comm="syz.0.4254" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 2147.146359][T10398] hid_parser_main: 33 callbacks suppressed [ 2147.147863][T10398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2147.148242][T10398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2147.148511][T10398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2147.148771][T10398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2147.149029][T10398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2147.149276][T10398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2147.161668][T10398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2147.162517][T10398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2147.162920][T10398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2147.163317][T10398] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2147.319384][T10398] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [sy] on syz0 [ 2152.984657][T12539] fido_id[12539]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2162.772512][ T30] audit: type=1400 audit(2162.120:396): avc: denied { read } for pid=12605 comm="syz.0.4295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2165.634563][ T30] audit: type=1400 audit(2164.990:397): avc: denied { create } for pid=12615 comm="syz.0.4300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2165.705063][ T30] audit: type=1400 audit(2165.060:398): avc: denied { ioctl } for pid=12615 comm="syz.0.4300" path="socket:[35186]" dev="sockfs" ino=35186 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2172.741732][ T30] audit: type=1400 audit(2172.090:399): avc: denied { ioctl } for pid=12652 comm="syz.3.4319" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2172.772400][T12654] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2172.778403][T12654] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2179.237113][T12691] process 'syz.3.4338' launched './file1' with NULL argv: empty string added [ 2179.247788][ T30] audit: type=1400 audit(2178.590:400): avc: denied { execute_no_trans } for pid=12690 comm="syz.3.4338" path="/1356/file1" dev="tmpfs" ino=6976 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2181.977838][ T30] audit: type=1400 audit(2181.330:401): avc: denied { connect } for pid=12709 comm="syz.3.4348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2182.017832][ T30] audit: type=1400 audit(2181.360:402): avc: denied { ioctl } for pid=12709 comm="syz.3.4348" path="socket:[34374]" dev="sockfs" ino=34374 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2184.473830][T12729] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=12729 comm=syz.3.4356 [ 2185.979376][ T30] audit: type=1400 audit(2185.330:403): avc: denied { write } for pid=12734 comm="syz.3.4359" name="snmp" dev="proc" ino=4026532827 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2186.236269][ T30] audit: type=1400 audit(2185.590:404): avc: denied { execute } for pid=12736 comm="syz.0.4360" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=34393 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 2188.504412][T12747] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12747 comm=syz.0.4365 [ 2196.253575][ T30] audit: type=1400 audit(2195.610:405): avc: denied { create } for pid=12775 comm="syz.3.4379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2208.341370][ T30] audit: type=1400 audit(2207.690:406): avc: denied { read } for pid=12836 comm="syz.0.4409" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2208.371085][ T30] audit: type=1400 audit(2207.720:407): avc: denied { open } for pid=12836 comm="syz.0.4409" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2208.428245][ T30] audit: type=1400 audit(2207.780:408): avc: denied { ioctl } for pid=12836 comm="syz.0.4409" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2211.252414][ T30] audit: type=1400 audit(2210.610:409): avc: denied { ioctl } for pid=12849 comm="syz.3.4415" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=34588 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2222.864507][ T30] audit: type=1400 audit(2222.220:410): avc: denied { setopt } for pid=12900 comm="syz.0.4438" lport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2223.392558][ T30] audit: type=1400 audit(2222.740:411): avc: denied { create } for pid=12904 comm="syz.3.4440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2223.445891][ T30] audit: type=1400 audit(2222.800:412): avc: denied { ioctl } for pid=12904 comm="syz.3.4440" path="socket:[34690]" dev="sockfs" ino=34690 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2230.387707][ T8896] hid_parser_main: 22 callbacks suppressed [ 2230.404908][ T8896] hid-generic FFFC:0003:0000.0005: unknown main item tag 0x0 [ 2230.405868][ T8896] hid-generic FFFC:0003:0000.0005: unknown main item tag 0x0 [ 2230.406568][ T8896] hid-generic FFFC:0003:0000.0005: unknown main item tag 0x0 [ 2230.406874][ T8896] hid-generic FFFC:0003:0000.0005: unknown main item tag 0x0 [ 2230.407123][ T8896] hid-generic FFFC:0003:0000.0005: unknown main item tag 0x0 [ 2230.651866][ T8896] hid-generic FFFC:0003:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 2232.113650][ T30] audit: type=1400 audit(2231.470:413): avc: denied { bind } for pid=12949 comm="syz.3.4462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2232.127381][ T30] audit: type=1400 audit(2231.480:414): avc: denied { accept } for pid=12949 comm="syz.3.4462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2233.343733][ T30] audit: type=1400 audit(2232.680:415): avc: denied { getopt } for pid=12955 comm="syz.3.4465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2233.595560][T12946] fido_id[12946]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2240.035996][ T30] audit: type=1400 audit(2239.390:416): avc: denied { write } for pid=12986 comm="syz.3.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2241.774686][ T30] audit: type=1400 audit(2241.130:417): avc: denied { read } for pid=12995 comm="syz.0.4484" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2241.842961][ T30] audit: type=1400 audit(2241.170:418): avc: denied { open } for pid=12995 comm="syz.0.4484" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2242.021712][ T30] audit: type=1400 audit(2241.370:419): avc: denied { ioctl } for pid=12995 comm="syz.0.4484" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x9205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2250.486363][ T30] audit: type=1400 audit(2249.840:420): avc: denied { append } for pid=13037 comm="syz.0.4504" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2250.696821][ T30] audit: type=1400 audit(2250.050:421): avc: denied { write } for pid=13040 comm="syz.3.4506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2251.017983][T13039] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 2257.787916][ T30] audit: type=1400 audit(2257.140:422): avc: denied { open } for pid=13065 comm="syz.3.4518" path="/dev/ptyqa" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 2260.193098][ T30] audit: type=1400 audit(2259.550:423): avc: denied { setopt } for pid=13073 comm="syz.0.4522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2262.483385][T13089] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13089 comm=syz.3.4529 [ 2266.466989][ T30] audit: type=1400 audit(2265.800:424): avc: denied { connect } for pid=13107 comm="syz.0.4538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2268.561656][ T30] audit: type=1400 audit(2267.900:425): avc: denied { create } for pid=13119 comm="syz.0.4544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2268.562619][ T30] audit: type=1400 audit(2267.920:426): avc: denied { write } for pid=13119 comm="syz.0.4544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2268.564392][ T30] audit: type=1400 audit(2267.920:427): avc: denied { nlmsg_read } for pid=13119 comm="syz.0.4544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2268.583995][ T30] audit: type=1400 audit(2267.930:428): avc: denied { read } for pid=13119 comm="syz.0.4544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2287.574728][ T30] audit: type=1400 audit(2286.920:429): avc: denied { write } for pid=13204 comm="syz.3.4586" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2298.667754][ T30] audit: type=1400 audit(2298.020:430): avc: denied { create } for pid=13263 comm="syz.3.4614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2298.751037][ T30] audit: type=1400 audit(2298.100:431): avc: denied { write } for pid=13263 comm="syz.3.4614" path="socket:[36244]" dev="sockfs" ino=36244 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2299.382610][ T30] audit: type=1400 audit(2298.730:432): avc: denied { setopt } for pid=13263 comm="syz.3.4614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2304.953248][ T30] audit: type=1400 audit(2304.310:433): avc: denied { name_bind } for pid=13286 comm="syz.0.4624" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2304.965716][ T30] audit: type=1400 audit(2304.320:434): avc: denied { node_bind } for pid=13286 comm="syz.0.4624" saddr=127.0.0.1 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2316.053149][T13333] netlink: 64 bytes leftover after parsing attributes in process `syz.3.4646'. [ 2323.438661][ T30] audit: type=1400 audit(2322.790:435): avc: denied { create } for pid=13375 comm="syz.3.4668" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2323.476777][ T30] audit: type=1400 audit(2322.810:436): avc: denied { write } for pid=13375 comm="syz.3.4668" name="file0" dev="tmpfs" ino=8037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2323.487930][ T30] audit: type=1400 audit(2322.830:437): avc: denied { open } for pid=13375 comm="syz.3.4668" path="/1564/file0" dev="tmpfs" ino=8037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2323.640974][ T30] audit: type=1400 audit(2322.990:438): avc: denied { ioctl } for pid=13375 comm="syz.3.4668" path="/1564/file0" dev="tmpfs" ino=8037 ioctlcmd=0x1289 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2323.892122][ T30] audit: type=1400 audit(2323.240:439): avc: denied { unlink } for pid=7807 comm="syz-executor" name="file0" dev="tmpfs" ino=8037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2332.123169][ T30] audit: type=1400 audit(2331.480:440): avc: denied { setattr } for pid=13415 comm="syz.0.4687" name="nbd0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2340.761518][ T30] audit: type=1400 audit(2340.110:441): avc: denied { read } for pid=13459 comm="syz.3.4708" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2340.776692][ T30] audit: type=1400 audit(2340.130:442): avc: denied { open } for pid=13459 comm="syz.3.4708" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2342.108446][ T30] audit: type=1400 audit(2341.460:443): avc: denied { setopt } for pid=13466 comm="syz.3.4712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2363.077424][ T30] audit: type=1400 audit(2362.430:444): avc: denied { connect } for pid=13567 comm="syz.3.4761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2365.760678][ T30] audit: type=1400 audit(2365.110:445): avc: denied { create } for pid=13583 comm="syz.3.4769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2365.875849][ T30] audit: type=1400 audit(2365.230:446): avc: denied { ioctl } for pid=13583 comm="syz.3.4769" path="socket:[37882]" dev="sockfs" ino=37882 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2384.763383][ T30] audit: type=1400 audit(2384.120:447): avc: denied { setattr } for pid=13670 comm="syz.0.4811" name="tty20" dev="devtmpfs" ino=39 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 2387.252212][ T30] audit: type=1400 audit(2386.600:448): avc: denied { create } for pid=13684 comm="syz.3.4818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2400.103343][ T30] audit: type=1400 audit(2399.460:449): avc: denied { ioctl } for pid=13750 comm="syz.0.4850" path="socket:[39113]" dev="sockfs" ino=39113 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2400.333366][ T30] audit: type=1400 audit(2399.690:450): avc: denied { write } for pid=13752 comm="syz.3.4852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2429.044625][ T30] audit: type=1400 audit(2428.400:451): avc: denied { mac_admin } for pid=13903 comm="syz.0.4924" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2429.047504][T13905] SELinux: Context system_u:object_r:syslogd_initrc_exec_t:s0 is not valid (left unmapped). [ 2429.115127][ T30] audit: type=1400 audit(2428.470:452): avc: denied { relabelto } for pid=13903 comm="syz.0.4924" name="tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 2429.118382][ T30] audit: type=1400 audit(2428.470:453): avc: denied { associate } for pid=13903 comm="syz.0.4924" name="tun" dev="devtmpfs" ino=689 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 2429.502217][ T30] audit: type=1400 audit(2428.840:454): avc: denied { read } for pid=13909 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 2429.612851][ T30] audit: type=1400 audit(2428.970:455): avc: denied { setopt } for pid=13909 comm="syz.0.4928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2434.067953][ T30] audit: type=1400 audit(2433.420:456): avc: denied { checkpoint_restore } for pid=13937 comm="syz.3.4942" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2434.698055][ T30] audit: type=1400 audit(2434.030:457): avc: denied { write } for pid=13940 comm="syz.3.4943" name="tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 2434.716570][ T30] audit: type=1400 audit(2434.070:458): avc: denied { open } for pid=13940 comm="syz.3.4943" path="/dev/net/tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 2434.759260][ T30] audit: type=1400 audit(2434.110:459): avc: denied { ioctl } for pid=13940 comm="syz.3.4943" path="/dev/net/tun" dev="devtmpfs" ino=689 ioctlcmd=0x5345 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 2435.007562][ T30] audit: type=1400 audit(2434.350:460): avc: denied { setopt } for pid=13944 comm="syz.0.4945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2441.234016][T13970] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13970 comm=syz.0.4956 [ 2442.721283][ T30] audit: type=1400 audit(2442.060:461): avc: denied { shutdown } for pid=13974 comm="syz.0.4959" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2442.732600][ T30] audit: type=1400 audit(2442.080:462): avc: denied { read } for pid=13974 comm="syz.0.4959" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2443.444688][ T30] audit: type=1400 audit(2442.800:463): avc: denied { write } for pid=13980 comm="syz.3.4963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2443.940908][ T30] audit: type=1400 audit(2443.290:464): avc: denied { read } for pid=13984 comm="syz.3.4965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2445.092408][ T30] audit: type=1400 audit(2444.430:465): avc: denied { mount } for pid=13993 comm="syz.3.4969" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2445.096760][ T30] audit: type=1400 audit(2444.450:466): avc: denied { remount } for pid=13993 comm="syz.3.4969" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2445.232953][ T30] audit: type=1400 audit(2444.580:467): avc: denied { unmount } for pid=7807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2448.017514][ T30] audit: type=1400 audit(2447.370:468): avc: denied { remount } for pid=14011 comm="syz.0.4978" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2448.068537][ T30] audit: type=1400 audit(2447.420:469): avc: denied { nlmsg_write } for pid=14012 comm="syz.3.4979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2449.106652][ T30] audit: type=1400 audit(2448.460:470): avc: denied { ioctl } for pid=14017 comm="syz.0.4981" path="socket:[38500]" dev="sockfs" ino=38500 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2456.996945][ T30] audit: type=1400 audit(2456.350:471): avc: denied { create } for pid=14051 comm="syz.3.4997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2457.067940][ T30] audit: type=1400 audit(2456.420:472): avc: denied { accept } for pid=14051 comm="syz.3.4997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2487.931431][ T30] audit: type=1400 audit(2487.280:473): avc: denied { append } for pid=14185 comm="syz.3.5062" name="system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2506.064510][ T30] audit: type=1400 audit(2505.420:474): avc: denied { write } for pid=14265 comm="syz.0.5100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2514.235407][T14318] ======================================================= [ 2514.235407][T14318] WARNING: The mand mount option has been deprecated and [ 2514.235407][T14318] and is ignored by this kernel. Remove the mand [ 2514.235407][T14318] option from the mount to silence this warning. [ 2514.235407][T14318] ======================================================= [ 2514.265590][ T30] audit: type=1400 audit(2513.620:475): avc: denied { remount } for pid=14317 comm="syz.3.5123" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2514.332079][T14318] option changes via remount are deprecated (pid=14317 comm=syz.3.5123) [ 2514.431662][ T30] audit: type=1400 audit(2513.780:476): avc: denied { unmount } for pid=7807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2527.970980][ T30] audit: type=1400 audit(2527.310:477): avc: denied { mount } for pid=14389 comm="syz.3.5160" name="/" dev="hugetlbfs" ino=41151 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2528.004373][ T30] audit: type=1400 audit(2527.360:478): avc: denied { remount } for pid=14389 comm="syz.3.5160" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2528.133824][ T30] audit: type=1400 audit(2527.480:479): avc: denied { unmount } for pid=7807 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 2538.411887][ T30] audit: type=1400 audit(2537.740:480): avc: denied { read } for pid=14445 comm="syz.0.5186" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2538.433951][ T30] audit: type=1400 audit(2537.780:481): avc: denied { open } for pid=14445 comm="syz.0.5186" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2538.533860][ T30] audit: type=1400 audit(2537.890:482): avc: denied { ioctl } for pid=14445 comm="syz.0.5186" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2552.223179][T14515] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=243 sclass=netlink_audit_socket pid=14515 comm=syz.3.5218 [ 2565.258291][ T30] audit: type=1400 audit(2564.610:483): avc: denied { setopt } for pid=14568 comm="syz.3.5245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2568.056768][ T30] audit: type=1400 audit(2567.410:484): avc: denied { write } for pid=14581 comm="syz.0.5252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2583.246624][ T30] audit: type=1400 audit(2582.600:485): avc: denied { read } for pid=14658 comm="syz.3.5289" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2583.283423][ T30] audit: type=1400 audit(2582.630:486): avc: denied { open } for pid=14658 comm="syz.3.5289" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2591.426145][ T30] audit: type=1400 audit(2590.780:487): avc: denied { write } for pid=14699 comm="syz.0.5307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2595.383021][T14722] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14722 comm=syz.3.5319 [ 2606.126582][T14767] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=14767 comm=syz.0.5341 [ 2619.550852][ T30] audit: type=1400 audit(2618.900:488): avc: denied { bind } for pid=14820 comm="syz.3.5368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2622.394261][T14831] usb usb1: usbfs: process 14831 (syz.0.5372) did not claim interface 4 before use [ 2634.095640][T14888] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14888 comm=syz.3.5401 [ 2634.115781][T14888] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14888 comm=syz.3.5401 [ 2647.391351][ T30] audit: type=1400 audit(2646.740:489): avc: denied { bind } for pid=14951 comm="syz.3.5432" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2647.399026][ T30] audit: type=1400 audit(2646.740:490): avc: denied { name_bind } for pid=14951 comm="syz.3.5432" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 2647.415526][ T30] audit: type=1400 audit(2646.760:491): avc: denied { node_bind } for pid=14951 comm="syz.3.5432" saddr=ff02::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 2663.186026][T15053] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=15053 comm=syz.3.5481 [ 2664.149137][ T30] audit: type=1404 audit(2663.500:492): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 2664.473369][ T30] audit: type=1400 audit(2663.820:493): avc: denied { read write } for pid=7807 comm="syz-executor" name="loop3" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 2664.574133][ T30] audit: type=1400 audit(2663.930:494): avc: denied { read } for pid=15058 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 2665.274363][ T30] audit: type=1400 audit(2664.620:495): avc: denied { read write } for pid=3323 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 2665.384401][ T30] audit: type=1400 audit(2664.740:496): avc: denied { read } for pid=15059 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 2665.646631][ T30] audit: type=1400 audit(2664.960:497): avc: denied { execute } for pid=15060 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=0 [ 2665.731907][ T30] audit: type=1400 audit(2665.040:498): avc: denied { write } for pid=3318 comm="syz-executor" path="pipe:[2765]" dev="pipefs" ino=2765 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 2665.735824][ T30] audit: type=1400 audit(2665.090:499): avc: denied { write } for pid=3318 comm="syz-executor" path="pipe:[2765]" dev="pipefs" ino=2765 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 2666.238362][ T742] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2667.195753][ T742] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2667.633519][ T742] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2668.254916][ T742] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2669.194720][ T30] audit: type=1400 audit(2668.550:500): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2669.206152][ T30] audit: type=1400 audit(2668.560:501): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2669.224908][ T30] audit: type=1400 audit(2668.580:502): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2669.251017][ T30] audit: type=1400 audit(2668.600:503): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2669.254424][ T30] audit: type=1400 audit(2668.600:504): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2669.257727][ T30] audit: type=1400 audit(2668.600:505): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2669.262243][ T30] audit: type=1400 audit(2668.600:506): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2669.271142][ T30] audit: type=1400 audit(2668.600:507): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2669.274388][ T30] audit: type=1400 audit(2668.620:508): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2669.278272][ T30] audit: type=1400 audit(2668.620:509): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2673.528576][ T742] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2673.635228][ T742] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2673.706631][ T742] bond0 (unregistering): Released all slaves [ 2674.202320][ T30] kauditd_printk_skb: 953 callbacks suppressed [ 2674.211179][ T30] audit: type=1400 audit(2673.560:1463): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2674.214326][ T30] audit: type=1400 audit(2673.560:1464): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2674.244840][ T30] audit: type=1400 audit(2673.590:1465): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2674.257700][ T30] audit: type=1400 audit(2673.610:1466): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2674.278916][ T30] audit: type=1400 audit(2673.620:1467): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2674.288491][ T30] audit: type=1400 audit(2673.640:1468): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2674.301665][ T30] audit: type=1400 audit(2673.650:1469): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2674.333057][ T30] audit: type=1400 audit(2673.670:1470): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2674.334074][ T30] audit: type=1400 audit(2673.680:1471): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2674.334404][ T30] audit: type=1400 audit(2673.680:1472): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2674.371828][ T742] hsr_slave_0: left promiscuous mode [ 2674.384206][ T742] hsr_slave_1: left promiscuous mode [ 2674.625794][ T742] veth1_macvtap: left promiscuous mode [ 2674.626927][ T742] veth0_macvtap: left promiscuous mode [ 2674.628274][ T742] veth1_vlan: left promiscuous mode [ 2674.651028][ T742] veth0_vlan: left promiscuous mode [ 2679.211368][ T30] kauditd_printk_skb: 1007 callbacks suppressed [ 2679.212086][ T30] audit: type=1400 audit(2678.540:2480): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2679.212938][ T30] audit: type=1400 audit(2678.550:2481): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2679.214644][ T30] audit: type=1400 audit(2678.550:2482): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2679.214983][ T30] audit: type=1400 audit(2678.550:2483): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2679.215246][ T30] audit: type=1400 audit(2678.550:2484): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2679.215974][ T30] audit: type=1400 audit(2678.550:2485): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2679.267849][ T30] audit: type=1400 audit(2678.620:2486): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2679.274844][ T30] audit: type=1400 audit(2678.630:2487): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2679.287052][ T30] audit: type=1400 audit(2678.640:2488): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2679.304378][ T30] audit: type=1400 audit(2678.650:2489): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2684.226477][ T30] kauditd_printk_skb: 823 callbacks suppressed [ 2684.227205][ T30] audit: type=1400 audit(2683.580:3313): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2684.233464][ T30] audit: type=1400 audit(2683.580:3314): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2684.246864][ T30] audit: type=1400 audit(2683.600:3315): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2684.290425][ T30] audit: type=1400 audit(2683.620:3316): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2684.291224][ T30] audit: type=1400 audit(2683.640:3317): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2684.291813][ T30] audit: type=1400 audit(2683.640:3318): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2684.292226][ T30] audit: type=1400 audit(2683.640:3319): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2684.292562][ T30] audit: type=1400 audit(2683.640:3320): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2684.292853][ T30] audit: type=1400 audit(2683.640:3321): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2684.330196][ T30] audit: type=1400 audit(2683.680:3322): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2685.096835][ T742] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2685.464302][ T742] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2685.775353][ T742] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2686.118826][ T742] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2689.241664][ T30] kauditd_printk_skb: 1178 callbacks suppressed [ 2689.242421][ T30] audit: type=1400 audit(2688.580:4501): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2689.242871][ T30] audit: type=1400 audit(2688.590:4502): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2689.243288][ T30] audit: type=1400 audit(2688.590:4503): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2689.243684][ T30] audit: type=1400 audit(2688.590:4504): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2689.244107][ T30] audit: type=1400 audit(2688.590:4505): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2689.244545][ T30] audit: type=1400 audit(2688.590:4506): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2689.244962][ T30] audit: type=1400 audit(2688.590:4507): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2689.245412][ T30] audit: type=1400 audit(2688.590:4508): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2689.245813][ T30] audit: type=1400 audit(2688.590:4509): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2689.246211][ T30] audit: type=1400 audit(2688.590:4510): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2691.048551][ T742] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2691.134334][ T742] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2691.218319][ T742] bond0 (unregistering): Released all slaves [ 2691.842914][ T742] hsr_slave_0: left promiscuous mode [ 2691.862520][ T742] hsr_slave_1: left promiscuous mode [ 2692.022241][ T742] veth1_macvtap: left promiscuous mode [ 2692.025692][ T742] veth0_macvtap: left promiscuous mode [ 2692.030077][ T742] veth1_vlan: left promiscuous mode [ 2692.034236][ T742] veth0_vlan: left promiscuous mode [ 2694.256354][ T30] kauditd_printk_skb: 947 callbacks suppressed [ 2694.258476][ T30] audit: type=1400 audit(2693.610:5458): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2694.270409][ T30] audit: type=1400 audit(2693.620:5459): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2694.275464][ T30] audit: type=1400 audit(2693.620:5460): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2694.276036][ T30] audit: type=1400 audit(2693.620:5461): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2694.276262][ T30] audit: type=1400 audit(2693.620:5462): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2694.276471][ T30] audit: type=1400 audit(2693.620:5463): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2694.286885][ T30] audit: type=1400 audit(2693.640:5464): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2694.300404][ T30] audit: type=1400 audit(2693.650:5465): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2694.301080][ T30] audit: type=1400 audit(2693.650:5466): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2694.301469][ T30] audit: type=1400 audit(2693.650:5467): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2699.261894][ T30] kauditd_printk_skb: 1204 callbacks suppressed [ 2699.264511][ T30] audit: type=1400 audit(2698.610:6672): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2699.286107][ T30] audit: type=1400 audit(2698.640:6673): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2699.292377][ T30] audit: type=1400 audit(2698.640:6674): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2699.302731][ T30] audit: type=1400 audit(2698.650:6675): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2699.308657][ T30] audit: type=1400 audit(2698.660:6676): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2699.347799][ T30] audit: type=1400 audit(2698.680:6677): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2699.348754][ T30] audit: type=1400 audit(2698.680:6678): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2699.349098][ T30] audit: type=1400 audit(2698.680:6679): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2699.364220][ T30] audit: type=1400 audit(2698.690:6680): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2699.368135][ T30] audit: type=1400 audit(2698.690:6681): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2704.276428][ T30] kauditd_printk_skb: 1147 callbacks suppressed [ 2704.297453][ T30] audit: type=1400 audit(2703.630:7829): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2704.301905][ T30] audit: type=1400 audit(2703.650:7830): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2704.302626][ T30] audit: type=1400 audit(2703.650:7831): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2704.303124][ T30] audit: type=1400 audit(2703.660:7832): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2704.313390][ T30] audit: type=1400 audit(2703.660:7833): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2704.330485][ T30] audit: type=1400 audit(2703.680:7834): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2704.331275][ T30] audit: type=1400 audit(2703.680:7835): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2704.331711][ T30] audit: type=1400 audit(2703.680:7836): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2704.350881][ T30] audit: type=1400 audit(2703.700:7837): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2704.351358][ T30] audit: type=1400 audit(2703.700:7838): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.280143][ T30] kauditd_printk_skb: 1372 callbacks suppressed [ 2709.281019][ T30] audit: type=1400 audit(2708.630:9211): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.283499][ T30] audit: type=1400 audit(2708.640:9212): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.289130][ T30] audit: type=1400 audit(2708.640:9213): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.314283][ T30] audit: type=1400 audit(2708.660:9214): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.324730][ T30] audit: type=1400 audit(2708.670:9215): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.328215][ T30] audit: type=1400 audit(2708.670:9216): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.332601][ T30] audit: type=1400 audit(2708.680:9217): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.346199][ T30] audit: type=1400 audit(2708.700:9218): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.360840][ T30] audit: type=1400 audit(2708.710:9219): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.373493][ T30] audit: type=1400 audit(2708.730:9220): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2709.920292][ C1] hrtimer: interrupt took 86892704 ns [ 2714.300810][ T30] kauditd_printk_skb: 1361 callbacks suppressed [ 2714.308105][ T30] audit: type=1400 audit(2713.650:10582): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2714.321953][ T30] audit: type=1400 audit(2713.660:10583): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2714.344210][ T30] audit: type=1400 audit(2713.700:10584): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2714.370746][ T30] audit: type=1400 audit(2713.710:10585): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2714.385885][ T30] audit: type=1400 audit(2713.740:10586): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2714.422362][ T30] audit: type=1400 audit(2713.760:10587): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2714.424510][ T30] audit: type=1400 audit(2713.780:10588): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2714.442335][ T30] audit: type=1400 audit(2713.780:10589): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2714.452064][ T30] audit: type=1400 audit(2713.800:10590): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2714.453088][ T30] audit: type=1400 audit(2713.800:10591): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2719.301284][ T30] kauditd_printk_skb: 1313 callbacks suppressed [ 2719.306744][ T30] audit: type=1400 audit(2718.650:11905): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2719.313712][ T30] audit: type=1400 audit(2718.660:11906): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2719.323171][ T30] audit: type=1400 audit(2718.660:11907): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2719.332682][ T30] audit: type=1400 audit(2718.660:11908): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2719.341738][ T30] audit: type=1400 audit(2718.670:11909): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2719.351287][ T30] audit: type=1400 audit(2718.670:11910): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2719.358679][ T30] audit: type=1400 audit(2718.690:11911): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2719.368428][ T30] audit: type=1400 audit(2718.690:11912): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2719.381060][ T30] audit: type=1400 audit(2718.690:11913): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2719.390462][ T30] audit: type=1400 audit(2718.690:11914): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2724.332484][ T30] kauditd_printk_skb: 1421 callbacks suppressed [ 2724.333291][ T30] audit: type=1400 audit(2723.690:13336): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2724.368679][ T30] audit: type=1400 audit(2723.710:13337): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2724.371005][ T30] audit: type=1400 audit(2723.710:13338): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2724.398260][ T30] audit: type=1400 audit(2723.740:13339): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2724.412560][ T30] audit: type=1400 audit(2723.750:13340): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2724.434293][ T30] audit: type=1400 audit(2723.770:13341): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2724.435349][ T30] audit: type=1400 audit(2723.770:13342): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2724.435836][ T30] audit: type=1400 audit(2723.770:13343): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2724.454057][ T30] audit: type=1400 audit(2723.810:13344): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 2724.485293][ T30] audit: type=1400 audit(2723.840:13345): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 VM DIAGNOSIS: 10:10:24 Registers: info registers vcpu 0 CPU#0 PC=ffff80008544424c X00=ffff800085444248 X01=ffff800083dfe4d8 X02=0000000000000000 X03=ffff800080411c38 X04=ffff700011a3c769 X05=ffff80008d1e3b40 X06=ffff700011a3c768 X07=0000000000000001 X08=ffff80008d1e3b43 X09=dfff800000000000 X10=ffff700011a3c768 X11=1ffff00011a3c768 X12=ffff700011a3c769 X13=0000000000000000 X14=ffff00006a08e468 X15=ffff00006a08e054 X16=ffff800080000000 X17=ffff7fffe2fe0000 X18=1fffe00003d81b00 X19=ffff80008d1e3b40 X20=00000273f1ba1a00 X21=ffff800080433868 X22=dfff800000000000 X23=000000000008357c X24=ffff80008d1e3b48 X25=ffff00006a08e054 X26=ffff00006a08e000 X27=1fffe0000d411c7d X28=1fffe0000d411c4d X29=ffff800080007d20 X30=ffff800083dfe4f0 SP=ffff800080007d20 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=65642f000a732520:7325207334362e25 Q02=65636572203a7665:647562696c203a5d Q03=000000ff0000ff00:00ff0000000000ff Q04=0000000000000000:000f00f00f00000f Q05=6e696c74656e3d73:73616c637420745f Q06=203a29676e697265:7473696765726e75 Q07=76616c735f646e6f:62206576616c7328 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffdbfc49b0:0000ffffdbfc49b0 Q17=ffffff80ffffffd0:0000ffffdbfc4980 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800080315b28 X00=ffff000017a7a244 X01=0000000000000000 X02=1fffe00001c5285e X03=1fffe00001c52795 X04=1fffe00002f4f3c9 X05=0000000000000001 X06=0000000000000008 X07=0c06e864fee87885 X08=0000000000000000 X09=ffff8000897e5000 X10=ffff000017a7a8d0 X11=0000000000000002 X12=0000000000000006 X13=0000000000000000 X14=00004c4b40000000 X15=0000000000000000 X16=ffff80008d4e0000 X17=ffff7fffe3003000 X18=0000000000000000 X19=ffff800088ccf720 X20=ffff8000897e5c40 X21=ffff000017a79e40 X22=0000000000000000 X23=ffff00006a09ef90 X24=ffff00000e294630 X25=0000000000000088 X26=00000000000000c0 X27=ffff000017a79e40 X28=ffff00006a09ef80 X29=ffff80008d4e7a40 X30=ffff800080439fec SP=ffff80008d4e7a40 PSTATE=200000c5 --C- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=656369766564204c:4c554e2064657669 Q02=0000000000000000:fffffff000000000 Q03=ffffffffffffffff:ffffff0000000000 Q04=0000000000000000:fffffffffff00000 Q05=0000000000000000:000c000000000000 Q06=0000fffffcd95d2e:0000fffffcd95d20 Q07=0000fffffcd95d49:0000fffffcd95d3b Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffffcda5220:0000fffffcda5220 Q17=ffffff80ffffffd8:0000fffffcda51f0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000