last executing test programs: 2m25.645297303s ago: executing program 1 (id=1993): pipe2(&(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RGETATTR(r0, 0x0, 0x0) 2m16.0468626s ago: executing program 1 (id=1995): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/cgroups\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)) 2m7.766901082s ago: executing program 1 (id=1997): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x5451, 0x0) 1m58.823462146s ago: executing program 1 (id=2000): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETDEBUG(r0, 0x894c, 0x0) 1m51.76388766s ago: executing program 1 (id=2001): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x8946, &(0x7f0000000000)={{}, "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"}) 1m40.895551208s ago: executing program 1 (id=2004): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073717a30000000000800410072786500140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) 55.374682713s ago: executing program 32 (id=2004): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073717a30000000000800410072786500140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) 44.19957341s ago: executing program 0 (id=2013): r0 = socket(0x1, 0x803, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={0x0}}, 0x0) 38.533690645s ago: executing program 0 (id=2014): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x439c1, 0x0) write$evdev(r0, 0x0, 0x0) 31.085023343s ago: executing program 0 (id=2015): socketpair(0x1, 0x80001, 0x0, &(0x7f0000001180)={0xffffffffffffffff}) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 22.220409163s ago: executing program 0 (id=2016): r0 = open(&(0x7f00000011c0)='./file0\x00', 0x20040, 0x0) pread64(r0, &(0x7f0000000000), 0x0, 0x0) 10.89582983s ago: executing program 0 (id=2017): r0 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)={0x2142}, 0x18) read$watch_queue(r0, 0x0, 0x0) 0s ago: executing program 0 (id=2018): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TUNSETSNDBUF(r0, 0x894c, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:49781' (ED25519) to the list of known hosts. [ 271.656581][ T30] audit: type=1400 audit(271.070:46): avc: denied { name_bind } for pid=3320 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 272.300733][ T30] audit: type=1400 audit(271.710:47): avc: denied { execute } for pid=3321 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 272.311757][ T30] audit: type=1400 audit(271.720:48): avc: denied { execute_no_trans } for pid=3321 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 278.951315][ T30] audit: type=1400 audit(278.360:49): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 279.007130][ T30] audit: type=1400 audit(278.420:50): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 279.077678][ T3321] cgroup: Unknown subsys name 'net' [ 279.171004][ T30] audit: type=1400 audit(278.580:51): avc: denied { unmount } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 279.497447][ T3321] cgroup: Unknown subsys name 'cpuset' [ 279.575461][ T3321] cgroup: Unknown subsys name 'rlimit' [ 279.953752][ T30] audit: type=1400 audit(279.360:52): avc: denied { setattr } for pid=3321 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.972461][ T30] audit: type=1400 audit(279.380:53): avc: denied { mounton } for pid=3321 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 279.982012][ T30] audit: type=1400 audit(279.390:54): avc: denied { mount } for pid=3321 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 280.775960][ T3323] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 280.784020][ T30] audit: type=1400 audit(280.190:55): avc: denied { relabelto } for pid=3323 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 280.791366][ T30] audit: type=1400 audit(280.200:56): avc: denied { write } for pid=3323 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 280.956838][ T30] audit: type=1400 audit(280.370:57): avc: denied { read } for pid=3321 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 280.962467][ T30] audit: type=1400 audit(280.370:58): avc: denied { open } for pid=3321 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 281.016243][ T3321] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 314.094084][ T30] audit: type=1400 audit(313.500:59): avc: denied { execmem } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 314.246439][ T30] audit: type=1400 audit(313.650:60): avc: denied { read } for pid=3326 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 314.254289][ T30] audit: type=1400 audit(313.660:61): avc: denied { open } for pid=3326 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 314.285830][ T30] audit: type=1400 audit(313.700:62): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 314.347547][ T30] audit: type=1400 audit(313.760:63): avc: denied { module_request } for pid=3326 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 314.668845][ T30] audit: type=1400 audit(314.080:64): avc: denied { sys_module } for pid=3326 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 324.510943][ T3327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 324.648082][ T3327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 324.828729][ T3326] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 325.016748][ T3326] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 330.287123][ T3326] hsr_slave_0: entered promiscuous mode [ 330.302230][ T3326] hsr_slave_1: entered promiscuous mode [ 330.386543][ T3327] hsr_slave_0: entered promiscuous mode [ 330.397346][ T3327] hsr_slave_1: entered promiscuous mode [ 330.405698][ T3327] debugfs: 'hsr0' already exists in 'hsr' [ 330.407803][ T3327] Cannot create hsr debugfs directory [ 333.646232][ T30] audit: type=1400 audit(333.060:65): avc: denied { create } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 333.656853][ T30] audit: type=1400 audit(333.070:66): avc: denied { write } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 333.666129][ T30] audit: type=1400 audit(333.080:67): avc: denied { read } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 333.689690][ T3326] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 333.798132][ T3326] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 333.941367][ T3326] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 334.089773][ T3326] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 334.999053][ T3327] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 335.097569][ T3327] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 335.258896][ T3327] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 335.336104][ T3327] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 339.438998][ T3326] 8021q: adding VLAN 0 to HW filter on device bond0 [ 340.679464][ T3327] 8021q: adding VLAN 0 to HW filter on device bond0 [ 357.033801][ T3326] veth0_vlan: entered promiscuous mode [ 357.156398][ T3326] veth1_vlan: entered promiscuous mode [ 357.536270][ T3326] veth0_macvtap: entered promiscuous mode [ 357.626838][ T3326] veth1_macvtap: entered promiscuous mode [ 358.498922][ T115] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.524084][ T115] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.524676][ T115] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.525165][ T115] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 359.278900][ T30] audit: type=1400 audit(358.690:68): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.ZCn9un/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 359.291504][ T30] audit: type=1400 audit(358.700:69): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 359.358876][ T30] audit: type=1400 audit(358.770:70): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.ZCn9un/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 359.479893][ T30] audit: type=1400 audit(358.870:71): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 359.559128][ T30] audit: type=1400 audit(358.970:72): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.ZCn9un/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 359.603647][ T30] audit: type=1400 audit(359.010:73): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/syzkaller.ZCn9un/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 359.749222][ T30] audit: type=1400 audit(359.150:74): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 359.771798][ T30] audit: type=1400 audit(359.180:75): avc: denied { mounton } for pid=3326 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 359.793779][ T30] audit: type=1400 audit(359.190:76): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="gadgetfs" ino=3796 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 359.838251][ T30] audit: type=1400 audit(359.250:77): avc: denied { mount } for pid=3326 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 360.225590][ T3327] veth0_vlan: entered promiscuous mode [ 360.332192][ T3327] veth1_vlan: entered promiscuous mode [ 360.391691][ T3326] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 360.811498][ T3327] veth0_macvtap: entered promiscuous mode [ 360.967011][ T3327] veth1_macvtap: entered promiscuous mode [ 362.386157][ T1534] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.438712][ T1534] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.439789][ T1534] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.440165][ T1534] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 378.435114][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 378.438322][ T30] audit: type=1400 audit(377.840:83): avc: denied { prog_load } for pid=3524 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 378.477301][ T30] audit: type=1400 audit(377.880:84): avc: denied { bpf } for pid=3524 comm="syz.0.23" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 383.812395][ T30] audit: type=1400 audit(383.220:85): avc: denied { create } for pid=3542 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 393.882459][ T30] audit: type=1400 audit(393.280:86): avc: denied { perfmon } for pid=3575 comm="syz.0.49" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 399.722345][ T30] audit: type=1400 audit(399.130:87): avc: denied { create } for pid=3591 comm="syz.1.56" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 400.075137][ T30] audit: type=1400 audit(399.470:88): avc: denied { read write } for pid=3594 comm="syz.0.58" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 400.080573][ T30] audit: type=1400 audit(399.480:89): avc: denied { open } for pid=3594 comm="syz.0.58" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 400.094528][ T30] audit: type=1400 audit(399.500:90): avc: denied { ioctl } for pid=3594 comm="syz.0.58" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 400.576901][ T29] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 400.882449][ T29] usb 1-1: unable to get BOS descriptor or descriptor too short [ 400.926240][ T29] usb 1-1: not running at top speed; connect to a high speed hub [ 400.964024][ T29] usb 1-1: config 9 has an invalid interface number: 110 but max is 0 [ 400.967232][ T29] usb 1-1: config 9 has no interface number 0 [ 400.970024][ T29] usb 1-1: config 9 interface 110 has no altsetting 0 [ 401.071851][ T29] usb 1-1: New USB device found, idVendor=0644, idProduct=8021, bcdDevice= 1.58 [ 401.077218][ T29] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 401.080499][ T29] usb 1-1: Product: syz [ 401.082242][ T29] usb 1-1: Manufacturer: syz [ 401.085279][ T29] usb 1-1: SerialNumber: syz [ 401.568889][ T29] usb 1-1: USB disconnect, device number 2 [ 414.897227][ T30] audit: type=1400 audit(414.310:91): avc: denied { kexec_image_load } for pid=3639 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 419.122438][ T30] audit: type=1400 audit(418.530:92): avc: denied { mounton } for pid=3647 comm="syz.0.85" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 419.255199][ T30] audit: type=1400 audit(418.660:93): avc: denied { audit_write } for pid=3648 comm="syz.1.84" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 437.634879][ T30] audit: type=1400 audit(437.030:94): avc: denied { read } for pid=3699 comm="syz.0.109" name="card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 437.699432][ T30] audit: type=1400 audit(437.110:95): avc: denied { open } for pid=3699 comm="syz.0.109" path="/dev/dri/card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 445.694706][ T30] audit: type=1400 audit(445.100:96): avc: denied { create } for pid=3719 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 452.949604][ T30] audit: type=1400 audit(452.360:97): avc: denied { read write } for pid=3733 comm="syz.1.126" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 453.065436][ T30] audit: type=1400 audit(452.470:98): avc: denied { open } for pid=3733 comm="syz.1.126" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 488.430526][ T30] audit: type=1400 audit(487.840:99): avc: denied { create } for pid=3808 comm="syz.1.162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 508.019412][ T30] audit: type=1400 audit(507.430:100): avc: denied { create } for pid=3848 comm="syz.1.182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 508.790603][ T30] audit: type=1400 audit(508.200:101): avc: denied { read write } for pid=3327 comm="syz-executor" name="loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 508.827650][ T30] audit: type=1400 audit(508.230:102): avc: denied { open } for pid=3327 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 508.877743][ T30] audit: type=1400 audit(508.280:103): avc: denied { ioctl } for pid=3327 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 525.398557][ T30] audit: type=1400 audit(524.810:104): avc: denied { mount } for pid=3880 comm="syz.1.197" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 525.628526][ T30] audit: type=1400 audit(524.970:105): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 538.604704][ T30] audit: type=1400 audit(538.010:106): avc: denied { mounton } for pid=3910 comm="syz.0.211" path="/syzcgroup/unified/syz0" dev="cgroup2" ino=33 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 538.659051][ T30] audit: type=1400 audit(538.070:107): avc: denied { mount } for pid=3910 comm="syz.0.211" name="/" dev="pstore" ino=2403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 539.308685][ T30] audit: type=1400 audit(538.720:108): avc: denied { create } for pid=3909 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 539.334412][ T30] audit: type=1400 audit(538.730:109): avc: denied { write open } for pid=3909 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1592 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 539.365327][ T30] audit: type=1400 audit(538.760:110): avc: denied { append } for pid=3909 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1592 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 539.505962][ T30] audit: type=1400 audit(538.910:111): avc: denied { getattr } for pid=3909 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 541.429326][ T30] audit: type=1400 audit(540.830:112): avc: denied { read } for pid=3915 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 543.614932][ T30] audit: type=1400 audit(543.000:113): avc: denied { unlink } for pid=3918 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1592 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 550.610229][ T30] audit: type=1400 audit(550.020:114): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 554.037534][ T30] audit: type=1400 audit(553.450:115): avc: denied { create } for pid=3941 comm="syz.0.225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 554.720935][ T30] audit: type=1400 audit(554.130:116): avc: denied { create } for pid=3942 comm="syz.1.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 587.957528][ T30] audit: type=1400 audit(587.370:117): avc: denied { map_create } for pid=4008 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 644.716355][ T3430] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 644.914961][ T3430] usb 1-1: Using ep0 maxpacket: 8 [ 645.097033][ T3430] usb 1-1: config 0 has an invalid interface number: 143 but max is 0 [ 645.097844][ T3430] usb 1-1: config 0 has no interface number 0 [ 645.098688][ T3430] usb 1-1: New USB device found, idVendor=2058, idProduct=1005, bcdDevice=c1.9b [ 645.098818][ T3430] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 645.277683][ T3430] usb 1-1: config 0 descriptor?? [ 645.791693][ T3430] usb 1-1: USB disconnect, device number 3 [ 677.796303][ T30] audit: type=1400 audit(677.130:118): avc: denied { create } for pid=4144 comm="syz.0.321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 701.919979][ T30] audit: type=1400 audit(701.270:119): avc: denied { remount } for pid=4178 comm="syz.0.338" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 746.248954][ T4238] syz.1.367 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 754.429233][ T30] audit: type=1400 audit(753.840:120): avc: denied { prog_run } for pid=4247 comm="syz.0.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 763.573828][ T30] audit: type=1400 audit(762.970:121): avc: denied { read write } for pid=4260 comm="syz.1.379" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 763.775710][ T30] audit: type=1400 audit(763.130:122): avc: denied { open } for pid=4260 comm="syz.1.379" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 851.696158][ T4368] syz.0.426(4368): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 893.480566][ T30] audit: type=1400 audit(892.830:123): avc: denied { write } for pid=4420 comm="syz.1.454" name="pfkey" dev="proc" ino=4026532781 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 911.616379][ T30] audit: type=1400 audit(911.000:124): avc: denied { create } for pid=4441 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 953.356724][ T30] audit: type=1800 audit(952.770:125): pid=4492 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=set_data cause=unavailable-hash-algorithm comm="syz.1.486" name="/newroot/223" dev="tmpfs" ino=1138 res=0 errno=0 [ 980.050697][ T30] audit: type=1400 audit(979.460:126): avc: denied { write } for pid=4527 comm="syz.0.502" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1011.001371][ T30] audit: type=1400 audit(1010.410:127): avc: denied { create } for pid=4573 comm="syz.0.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1063.031075][ T30] audit: type=1326 audit(1062.440:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4653 comm="syz.0.562" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x127db8 code=0x0 [ 1104.114508][ T30] audit: type=1400 audit(1103.510:129): avc: denied { read write } for pid=4718 comm="syz.1.594" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1104.155453][ T30] audit: type=1400 audit(1103.560:130): avc: denied { open } for pid=4718 comm="syz.1.594" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1128.539600][ T4757] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1128.656787][ T4757] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1138.436146][ T30] audit: type=1400 audit(1137.850:131): avc: denied { create } for pid=4769 comm="syz.1.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1138.534637][ T29] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 1138.536125][ C1] raw-gadget.0 gadget.0: ignoring, device is not running [ 1138.685481][ T29] usb 1-1: device descriptor read/64, error -32 [ 1138.944326][ T29] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 1139.335442][ T29] usb 1-1: config 2 has an invalid interface number: 220 but max is 0 [ 1139.337982][ T29] usb 1-1: config 2 has no interface number 0 [ 1139.339158][ T29] usb 1-1: config 2 interface 220 has no altsetting 0 [ 1139.662392][ T29] usb 1-1: New USB device found, idVendor=0424, idProduct=cf30, bcdDevice=94.f4 [ 1139.664230][ T29] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1139.674678][ T29] usb 1-1: Product: syz [ 1139.680612][ T29] usb 1-1: Manufacturer: syz [ 1139.681821][ T29] usb 1-1: SerialNumber: syz [ 1140.417026][ T10] usb 1-1: USB disconnect, device number 5 [ 1208.664185][ T30] audit: type=1400 audit(1208.070:132): avc: denied { write } for pid=4847 comm="syz.0.653" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1208.702304][ T30] audit: type=1400 audit(1208.110:133): avc: denied { open } for pid=4847 comm="syz.0.653" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1208.879649][ T4849] random: crng reseeded on system resumption [ 1240.731874][ T30] audit: type=1400 audit(1240.130:134): avc: denied { create } for pid=4881 comm="syz.0.670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1305.196565][ T30] audit: type=1400 audit(1304.550:135): avc: denied { remount } for pid=4963 comm="syz.1.710" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1324.329003][ T30] audit: type=1400 audit(1323.740:136): avc: denied { mount } for pid=4985 comm="syz.1.720" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1324.727394][ T30] audit: type=1400 audit(1324.140:137): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1339.739879][ T30] audit: type=1400 audit(1339.150:138): avc: denied { remove_name } for pid=5002 comm="syz.1.728" name="binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1339.743768][ T30] audit: type=1400 audit(1339.150:139): avc: denied { unlink } for pid=5002 comm="syz.1.728" name="binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1379.534229][ T30] audit: type=1400 audit(1378.930:140): avc: denied { read write } for pid=5045 comm="syz.0.749" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1379.547771][ T30] audit: type=1400 audit(1378.950:141): avc: denied { open } for pid=5045 comm="syz.0.749" path="/dev/loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1409.880681][ T30] audit: type=1400 audit(1409.290:142): avc: denied { unmount } for pid=3326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1426.467123][ T30] audit: type=1400 audit(1425.880:143): avc: denied { append } for pid=5090 comm="syz.1.770" name="loop-control" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1455.965956][ T29] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 1455.969255][ C1] raw-gadget.0 gadget.0: ignoring, device is not running [ 1456.125673][ T29] usb 1-1: device descriptor read/64, error -32 [ 1456.385817][ T29] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 1458.049646][ T29] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1459.078197][ T29] usb 1-1: config 12 has an invalid interface number: 110 but max is 0 [ 1459.080379][ T29] usb 1-1: config 12 has no interface number 0 [ 1459.084996][ T29] usb 1-1: config 12 interface 110 has no altsetting 0 [ 1459.796087][ T29] usb 1-1: New USB device found, idVendor=1943, idProduct=2257, bcdDevice= e.bc [ 1459.805018][ T29] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1459.808387][ T29] usb 1-1: Product: syz [ 1459.810176][ T29] usb 1-1: Manufacturer: syz [ 1459.811754][ T29] usb 1-1: SerialNumber: syz [ 1460.816371][ T29] usb 1-1: USB disconnect, device number 7 [ 1467.448594][ T5128] Soft offlining pfn 0x493cf at process virtual address 0x20ffb000 [ 1468.857127][ T5128] Memory failure: 0x493cf: unhandlable page. [ 1521.455745][ T30] audit: type=1400 audit(1520.870:144): avc: denied { wake_alarm } for pid=5179 comm="syz.0.810" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1533.003786][ T30] audit: type=1400 audit(1532.400:145): avc: denied { create } for pid=5192 comm="syz.0.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 1538.135948][ T30] audit: type=1400 audit(1537.550:146): avc: denied { mount } for pid=5200 comm="syz.1.820" name="/" dev="ramfs" ino=9489 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1538.638578][ T30] audit: type=1400 audit(1538.050:147): avc: denied { unmount } for pid=3327 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1540.404597][ T10] usb 1-1: new full-speed USB device number 8 using dummy_hcd [ 1540.910256][ T10] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1540.910782][ T10] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 1540.911063][ T10] usb 1-1: config 1 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 1541.094230][ T10] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1541.094639][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1541.094901][ T10] usb 1-1: Product: syz [ 1541.094956][ T10] usb 1-1: Manufacturer: syz [ 1541.095005][ T10] usb 1-1: SerialNumber: syz [ 1541.377122][ T10] cdc_mbim 1-1:1.0: CDC Union missing and no IAD found [ 1541.377897][ T10] cdc_mbim 1-1:1.0: bind() failure [ 1541.798845][ T5123] usb 1-1: USB disconnect, device number 8 [ 1750.700092][ T30] audit: type=1400 audit(1750.110:148): avc: denied { append } for pid=5398 comm="syz.1.905" name="renderD128" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1842.158568][ T30] audit: type=1400 audit(1841.570:149): avc: denied { create } for pid=5469 comm="syz.0.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2129.590957][ T30] audit: type=1400 audit(2129.000:150): avc: denied { create } for pid=5711 comm="syz.1.1028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2232.814418][ T30] audit: type=1400 audit(2232.080:151): avc: denied { execute } for pid=5792 comm="syz.0.1061" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=10652 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 2278.374264][ T30] audit: type=1400 audit(2277.780:152): avc: denied { mounton } for pid=5823 comm="syz.0.1074" path="/syzcgroup/unified/syz0" dev="pstore" ino=2403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=dir permissive=1 [ 2459.858816][ T30] audit: type=1400 audit(2459.270:153): avc: denied { create } for pid=5956 comm="syz.0.1120" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2461.261035][ T30] audit: type=1400 audit(2460.670:154): avc: denied { unlink } for pid=3326 comm="syz-executor" name="file0" dev="tmpfs" ino=2829 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2497.915311][ T5298] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 2497.917520][ C0] raw-gadget.0 gadget.0: ignoring, device is not running [ 2498.085960][ T5298] usb 1-1: device descriptor read/64, error -32 [ 2498.436206][ T5298] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 2499.399400][ T5298] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 2499.400115][ T5298] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2499.428055][ T5298] usb 1-1: Product: syz [ 2499.429131][ T5298] usb 1-1: Manufacturer: syz [ 2499.429395][ T5298] usb 1-1: SerialNumber: syz [ 2501.841165][ T5298] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPROTO [ 2501.857056][ T5298] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): lan78xx_setup_irq_domain() failed : -71 [ 2501.858124][ T5298] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 2502.050431][ T5298] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -71 [ 2502.360658][ T5298] usb 1-1: USB disconnect, device number 10 [ 2652.937774][ T30] audit: type=1400 audit(2652.350:155): avc: denied { create } for pid=6082 comm="syz.0.1167" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2654.120374][ T30] audit: type=1400 audit(2653.530:156): avc: denied { unlink } for pid=3326 comm="syz-executor" name="file0" dev="tmpfs" ino=2955 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2718.945025][ T30] audit: type=1400 audit(2718.340:157): avc: denied { read write } for pid=6127 comm="syz.0.1184" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2719.424555][ T30] audit: type=1400 audit(2718.620:158): avc: denied { open } for pid=6127 comm="syz.0.1184" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2740.775280][ T30] audit: type=1400 audit(2740.180:159): avc: denied { append } for pid=6141 comm="syz.0.1189" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 2841.658295][ T6209] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6209 comm=syz.0.1215 [ 3080.168854][ T6350] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=6350 comm=syz.0.1265 [ 3103.959780][ T30] audit: type=1400 audit(3103.370:160): avc: denied { map_read map_write } for pid=6364 comm="syz.0.1270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3149.176709][ T30] audit: type=1400 audit(3148.580:161): avc: denied { create } for pid=6391 comm="syz.1.1280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3149.667291][ T30] audit: type=1400 audit(3149.080:162): avc: denied { write } for pid=6391 comm="syz.1.1280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3289.052654][ T6466] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6466 comm=syz.1.1307 [ 3374.496485][ T6515] Zero length message leads to an empty skb [ 3402.495669][ T30] audit: type=1400 audit(3401.900:163): avc: denied { getopt } for pid=6534 comm="syz.1.1332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3500.907987][ T6602] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6602 comm=syz.0.1356 [ 3598.084615][ T3902] usb 1-1: new full-speed USB device number 11 using dummy_hcd [ 3598.766427][ T3902] usb 1-1: config 0 has an invalid interface number: 41 but max is 0 [ 3598.767141][ T3902] usb 1-1: config 0 has no interface number 0 [ 3598.767938][ T3902] usb 1-1: config 0 interface 41 has no altsetting 0 [ 3598.988810][ T3902] usb 1-1: New USB device found, idVendor=0fe6, idProduct=9800, bcdDevice=d1.9a [ 3598.989515][ T3902] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3598.990543][ T3902] usb 1-1: Product: syz [ 3598.990938][ T3902] usb 1-1: Manufacturer: syz [ 3598.991185][ T3902] usb 1-1: SerialNumber: syz [ 3599.135962][ T3902] usb 1-1: config 0 descriptor?? [ 3600.415530][ T3902] CoreChips 1-1:0.41 (unnamed net_device) (uninitialized): set LINK LED failed : -71 [ 3600.417859][ T3902] CoreChips 1-1:0.41: probe with driver CoreChips failed with error -71 [ 3600.507369][ T3902] usb 1-1: USB disconnect, device number 11 [ 3795.815901][ T6797] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 3796.228564][ T30] audit: type=1400 audit(3795.640:164): avc: denied { ioctl } for pid=6795 comm="syz.1.1429" path="socket:[13123]" dev="sockfs" ino=13123 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3925.301422][ T30] audit: type=1400 audit(3924.710:165): avc: denied { ioctl } for pid=6886 comm="syz.1.1465" path="/dev/dri/card0" dev="devtmpfs" ino=618 ioctlcmd=0x64b5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 4114.101208][ T7029] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7029 comm=syz.1.1519 [ 4140.238524][ T30] audit: type=1400 audit(4139.650:166): avc: denied { getopt } for pid=7044 comm="syz.1.1526" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4318.981683][ T30] audit: type=1400 audit(4318.390:167): avc: denied { setattr } for pid=7171 comm="syz.1.1576" name="" dev="pipefs" ino=14768 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 4448.680892][ T30] audit: type=1400 audit(4448.090:168): avc: denied { setopt } for pid=7265 comm="syz.0.1612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4500.616244][ T30] audit: type=1400 audit(4500.010:169): avc: denied { ioctl } for pid=7298 comm="syz.0.1625" path="socket:[14988]" dev="sockfs" ino=14988 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4571.314483][ T30] audit: type=1400 audit(4570.720:170): avc: denied { write } for pid=7349 comm="syz.1.1643" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4579.870787][ T30] audit: type=1400 audit(4579.280:171): avc: denied { write } for pid=7356 comm="syz.1.1646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4584.135580][ T7360] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1547 sclass=netlink_route_socket pid=7360 comm=syz.0.1647 [ 4690.740775][ T30] audit: type=1400 audit(4690.150:172): avc: denied { create } for pid=7431 comm="syz.0.1675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4855.870236][ T7541] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7541 comm=syz.0.1717 [ 5014.894922][ T30] audit: type=1400 audit(5014.300:173): avc: denied { read write } for pid=3326 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5014.909480][ T30] audit: type=1400 audit(5014.320:174): avc: denied { open } for pid=3326 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5014.940123][ T30] audit: type=1400 audit(5014.350:175): avc: denied { ioctl } for pid=3326 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5021.087939][ T30] audit: type=1400 audit(5020.490:176): avc: denied { search } for pid=7653 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5021.107438][ T30] audit: type=1400 audit(5020.510:177): avc: denied { search } for pid=7653 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=393 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5021.133545][ T30] audit: type=1400 audit(5020.540:178): avc: denied { search } for pid=7653 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=542 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5021.134076][ T30] audit: type=1400 audit(5020.540:179): avc: denied { search } for pid=7653 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=544 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5021.333957][ T30] audit: type=1400 audit(5020.740:180): avc: denied { read open } for pid=7654 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=544 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5021.334907][ T30] audit: type=1400 audit(5020.740:181): avc: denied { getattr } for pid=7654 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=544 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5022.074800][ T30] audit: type=1400 audit(5021.480:182): avc: denied { add_name } for pid=7653 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5022.117464][ T30] audit: type=1400 audit(5021.510:183): avc: denied { create } for pid=7653 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5022.118546][ T30] audit: type=1400 audit(5021.520:184): avc: denied { write open } for pid=7653 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=7628 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5022.166003][ T30] audit: type=1400 audit(5021.570:185): avc: denied { append } for pid=7653 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=7628 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5062.400987][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 5062.408610][ T30] audit: type=1400 audit(5061.810:190): avc: denied { module_request } for pid=7681 comm="syz.0.1771" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5077.761595][ T7693] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7693 comm=syz.1.1774 [ 5107.703953][ T30] audit: type=1400 audit(5107.110:191): avc: denied { audit_write } for pid=7713 comm="syz.0.1782" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5145.730424][ T7739] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5130 sclass=netlink_audit_socket pid=7739 comm=syz.1.1792 [ 5154.805029][ T30] audit: type=1400 audit(5154.210:192): avc: denied { create } for pid=7743 comm="syz.1.1794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5155.011747][ T30] audit: type=1400 audit(5154.420:193): avc: denied { write } for pid=7743 comm="syz.1.1794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5156.321795][ T30] audit: type=1400 audit(5155.730:194): avc: denied { read } for pid=7744 comm="syz.0.1795" dev="nsfs" ino=4026532629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5156.395668][ T30] audit: type=1400 audit(5155.800:195): avc: denied { open } for pid=7744 comm="syz.0.1795" path="net:[4026532629]" dev="nsfs" ino=4026532629 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5256.580480][ T30] audit: type=1400 audit(5255.990:196): avc: denied { read } for pid=7809 comm="syz.1.1820" name="card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 5256.936206][ T30] audit: type=1400 audit(5256.340:197): avc: denied { open } for pid=7809 comm="syz.1.1820" path="/dev/dri/card0" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 5288.149350][ T30] audit: type=1400 audit(5287.560:198): avc: denied { create } for pid=7829 comm="syz.0.1828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 5347.812280][ T30] audit: type=1400 audit(5347.220:199): avc: denied { create } for pid=7869 comm="syz.0.1841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5348.131553][ T30] audit: type=1400 audit(5347.540:200): avc: denied { write } for pid=7869 comm="syz.0.1841" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5351.500629][ T30] audit: type=1400 audit(5350.910:201): avc: denied { ioctl } for pid=7871 comm="syz.1.1842" path="socket:[16885]" dev="sockfs" ino=16885 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5382.188655][ T30] audit: type=1400 audit(5381.600:202): avc: denied { create } for pid=7891 comm="syz.0.1851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5382.434798][ T30] audit: type=1400 audit(5381.840:203): avc: denied { write } for pid=7891 comm="syz.0.1851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5403.470516][ T30] audit: type=1400 audit(5402.880:204): avc: denied { ioctl } for pid=7906 comm="syz.1.1856" path="socket:[16936]" dev="sockfs" ino=16936 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5561.864809][ T30] audit: type=1400 audit(5561.230:205): avc: denied { setattr } for pid=8016 comm="syz.0.1898" name="vcsa" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 5675.098987][ T8092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8092 comm=syz.0.1926 [ 5798.303950][ T30] audit: type=1400 audit(5797.710:206): avc: denied { getopt } for pid=8172 comm="syz.1.1956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5869.257505][ T30] audit: type=1400 audit(5868.670:207): avc: denied { map } for pid=8216 comm="syz.0.1973" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 5984.070334][ T30] audit: type=1400 audit(5983.280:208): avc: denied { sys_module } for pid=8292 comm="syz.1.2001" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5992.430437][ T30] audit: type=1400 audit(5991.840:209): avc: denied { create } for pid=8301 comm="syz.1.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5992.844650][ T30] audit: type=1400 audit(5992.250:210): avc: denied { write } for pid=8301 comm="syz.1.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 5993.709833][ T8303] lo speed is unknown, defaulting to 1000 [ 5994.204093][ T8303] lo speed is unknown, defaulting to 1000 [ 5994.382262][ T8303] lo speed is unknown, defaulting to 1000 [ 6031.610982][ T30] audit: type=1400 audit(6031.020:211): avc: denied { execute } for pid=8326 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6031.632435][ T30] audit: type=1400 audit(6031.040:212): avc: denied { execute_no_trans } for pid=8326 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6031.923798][ T30] audit: type=1400 audit(6031.320:213): avc: denied { execmem } for pid=8326 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6032.215031][ T30] audit: type=1400 audit(6031.620:214): avc: denied { mounton } for pid=8327 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 6036.107880][ T8303] infiniband sqz0: set active [ 6036.108951][ T8303] infiniband sqz0: added lo [ 6036.116659][ T8029] lo speed is unknown, defaulting to 1000 [ 6037.009036][ T8303] RDS/IB: sqz0: added [ 6037.012419][ T8303] smc: adding ib device sqz0 with port count 1 [ 6037.059311][ T8303] smc: ib device sqz0 port 1 has no pnetid [ 6037.070212][ T5298] lo speed is unknown, defaulting to 1000 [ 6037.230210][ T8303] lo speed is unknown, defaulting to 1000 [ 6041.223862][ T8303] lo speed is unknown, defaulting to 1000 [ 6045.646296][ T8327] lo speed is unknown, defaulting to 1000 [ 6050.650698][ T8269] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6051.246994][ T8269] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6051.892111][ T8269] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6052.447159][ T8269] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6055.129894][ T30] audit: type=1400 audit(6054.540:215): avc: denied { read } for pid=3171 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 6059.279190][ T8269] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6059.375222][ T8269] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6059.441693][ T8269] bond0 (unregistering): Released all slaves [ 6069.546897][ T8269] hsr_slave_0: left promiscuous mode [ 6069.604273][ T8269] hsr_slave_1: left promiscuous mode [ 6070.000558][ T8269] veth1_macvtap: left promiscuous mode [ 6070.025605][ T8269] veth0_macvtap: left promiscuous mode [ 6070.027249][ T8269] veth1_vlan: left promiscuous mode [ 6070.028461][ T8269] veth0_vlan: left promiscuous mode [ 6079.872521][ T5975] smc: removing ib device sqz0 [ 6080.067120][ T7304] lo speed is unknown, defaulting to 1000 [ 6080.068528][ T7304] sqz0: Port: 1 Link DOWN [ 6084.440559][ T8327] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6084.797959][ T8327] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6091.776013][ T8269] unregister_netdevice: waiting for lo to become free. Usage count = 7 [ 6091.780283][ T8269] ref_tracker: netdev@000000005b5ade0b has 1/1 users at [ 6091.780283][ T8269] ib_device_set_netdev+0x1c8/0x5b8 [ 6091.780283][ T8269] rxe_register_device+0x208/0x300 [ 6091.780283][ T8269] rxe_add+0xd50/0x10e0 [ 6091.780283][ T8269] rxe_net_add+0x9c/0x100 [ 6091.780283][ T8269] rxe_newlink+0x58/0x158 [ 6091.780283][ T8269] nldev_newlink+0x284/0x4a0 [ 6091.780283][ T8269] rdma_nl_rcv_msg+0x280/0x584 [ 6091.780283][ T8269] rdma_nl_rcv_skb.constprop.0.isra.0+0x1fc/0x338 [ 6091.780283][ T8269] rdma_nl_rcv+0x10/0x1c [ 6091.780283][ T8269] netlink_unicast+0x420/0x6f0 [ 6091.780283][ T8269] netlink_sendmsg+0x638/0xa4c [ 6091.780283][ T8269] __sock_sendmsg+0xc8/0x168 [ 6091.780283][ T8269] ____sys_sendmsg+0x524/0x730 [ 6091.780283][ T8269] ___sys_sendmsg+0x124/0x1a4 [ 6091.780283][ T8269] __sys_sendmsg+0x118/0x1a4 [ 6091.780283][ T8269] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 6091.780283][ T8269] [ 6091.811152][ T30] audit: type=1400 audit(6091.220:216): avc: denied { read } for pid=3126 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 6091.812194][ T30] audit: type=1400 audit(6091.220:217): avc: denied { write } for pid=3321 comm="syz-executor" path="pipe:[2619]" dev="pipefs" ino=2619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 6091.875691][ T30] audit: type=1400 audit(6091.270:218): avc: denied { search } for pid=3126 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6091.914330][ T30] audit: type=1400 audit(6091.300:219): avc: denied { search } for pid=3126 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6091.942233][ T30] audit: type=1400 audit(6091.340:220): avc: denied { add_name } for pid=3126 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6091.986090][ T30] audit: type=1400 audit(6091.390:221): avc: denied { create } for pid=3126 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6092.039044][ T30] audit: type=1400 audit(6091.440:222): avc: denied { append open } for pid=3126 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6092.072473][ T30] audit: type=1400 audit(6091.440:223): avc: denied { getattr } for pid=3126 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6101.481776][ T8269] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6101.770977][ T8269] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6102.041421][ T8269] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6102.399015][ T8269] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6107.318191][ T8269] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6107.408005][ T8269] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6107.477477][ T8269] bond0 (unregistering): Released all slaves [ 6108.542368][ T8269] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6108.610927][ T8269] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6108.667951][ T8269] bond0 (unregistering): Released all slaves [ 6109.061978][ T8269] hsr_slave_0: left promiscuous mode [ 6109.074722][ T8269] hsr_slave_1: left promiscuous mode [ 6109.165212][ T8269] veth1_macvtap: left promiscuous mode [ 6109.166028][ T8269] veth0_macvtap: left promiscuous mode [ 6109.172178][ T8269] veth1_vlan: left promiscuous mode [ 6109.185071][ T8269] veth0_vlan: left promiscuous mode