last executing test programs: 1m14.469831839s ago: executing program 0 (id=10155): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 1m13.861376074s ago: executing program 0 (id=10157): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r1, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={0x0}}, 0x0) 1m13.46136237s ago: executing program 0 (id=10158): r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$fscrypt_provisioning(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)={0x1, 0x0, @c}, 0x29, r0) keyctl$unlink(0x9, r1, r0) 1m12.95701546s ago: executing program 0 (id=10159): r0 = socket$unix(0x1, 0x5, 0x0) r1 = dup(r0) sendmsg$NFNL_MSG_ACCT_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 1m12.309718916s ago: executing program 0 (id=10161): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x51) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000300)={0x8}) openat$dir(0xffffffffffffff9c, &(0x7f0000000540)='./file1\x00', 0x10042, 0x80) 1m11.495281848s ago: executing program 0 (id=10162): mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2\x00', 0x1ff) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs2/binder1\x00', 0x915a, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0x5450, 0x0) 25.07078844s ago: executing program 32 (id=10162): mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2\x00', 0x1ff) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs2/binder1\x00', 0x915a, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0x5450, 0x0) 3.209889292s ago: executing program 1 (id=10220): r0 = epoll_create1(0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0x5450, 0x0) 2.599472496s ago: executing program 1 (id=10221): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f00000006c0)=0x80) ioctl$RNDADDTOENTCNT(r1, 0x5452, &(0x7f0000000040)) 2.079338957s ago: executing program 1 (id=10222): r0 = fsopen(&(0x7f0000000040)='ramfs\x00', 0x0) r1 = dup2(r0, r0) read$char_usb(r1, 0x0, 0x0) 1.172374443s ago: executing program 1 (id=10223): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="010028"], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) syz_genetlink_get_family_id$l2tp(&(0x7f00000008c0), r0) 639.251705ms ago: executing program 1 (id=10224): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$TIPC_NL_BEARER_SET(r2, 0x0, 0x0) 0s ago: executing program 1 (id=10225): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_MODE_RMFB(r1, 0xc00464af, 0x0) kernel console output (not intermixed with test programs): =1400 audit(493.560:134): avc: denied { setattr } for pid=4211 comm="syz.1.301" name="RAWv6" dev="sockfs" ino=6085 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 502.616649][ T30] audit: type=1400 audit(502.010:135): avc: denied { create } for pid=4269 comm="syz.0.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 502.672054][ T30] audit: type=1400 audit(502.040:136): avc: denied { ioctl } for pid=4269 comm="syz.0.330" path="socket:[7185]" dev="sockfs" ino=7185 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 503.660907][ T30] audit: type=1400 audit(503.050:137): avc: denied { create } for pid=4277 comm="syz.1.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 503.713760][ T30] audit: type=1400 audit(503.110:138): avc: denied { ioctl } for pid=4277 comm="syz.1.334" path="socket:[6848]" dev="sockfs" ino=6848 ioctlcmd=0x891c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 506.125735][ T30] audit: type=1400 audit(505.500:139): avc: denied { nlmsg_read } for pid=4291 comm="syz.0.341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 509.664090][ T30] audit: type=1400 audit(509.060:140): avc: denied { write } for pid=4317 comm="syz.0.354" path="socket:[7284]" dev="sockfs" ino=7284 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 511.778042][ T4332] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 511.855480][ T30] audit: type=1400 audit(511.240:141): avc: denied { connect } for pid=4330 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 512.636578][ T4338] random: crng reseeded on system resumption [ 515.231681][ T30] audit: type=1400 audit(514.590:142): avc: denied { mount } for pid=4358 comm="syz.1.375" name="/" dev="ramfs" ino=6950 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 517.248192][ T4380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4380 comm=syz.1.385 [ 517.777426][ T30] audit: type=1400 audit(517.170:143): avc: denied { setopt } for pid=4382 comm="syz.1.387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 526.387831][ T4446] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4446 comm=syz.0.417 [ 530.412180][ T30] audit: type=1400 audit(529.800:144): avc: denied { ioctl } for pid=4471 comm="syz.0.431" path="socket:[7582]" dev="sockfs" ino=7582 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 533.350455][ T30] audit: type=1400 audit(532.740:145): avc: denied { mounton } for pid=4494 comm="syz.0.442" path="/288/file0" dev="tmpfs" ino=1484 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 533.529392][ T30] audit: type=1400 audit(532.900:146): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 534.139423][ T30] audit: type=1400 audit(533.530:147): avc: denied { create } for pid=4500 comm="syz.1.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 534.164994][ T30] audit: type=1400 audit(533.560:148): avc: denied { ioctl } for pid=4500 comm="syz.1.446" path="socket:[7115]" dev="sockfs" ino=7115 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 539.622335][ T30] audit: type=1400 audit(539.020:149): avc: denied { write } for pid=4538 comm="syz.0.464" path="socket:[7706]" dev="sockfs" ino=7706 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 551.302411][ T4612] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4612 comm=syz.1.500 [ 558.741956][ T30] audit: type=1400 audit(558.130:150): avc: denied { read append } for pid=4665 comm="syz.0.527" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 558.771766][ T30] audit: type=1400 audit(558.130:151): avc: denied { ioctl open } for pid=4665 comm="syz.0.527" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 563.078579][ T30] audit: type=1400 audit(562.470:152): avc: denied { lock } for pid=4696 comm="syz.0.542" path="socket:[7955]" dev="sockfs" ino=7955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 576.425471][ T4805] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4805 comm=syz.0.600 [ 581.666779][ T30] audit: type=1400 audit(581.060:153): avc: denied { prog_load } for pid=4843 comm="syz.0.615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 581.678961][ T30] audit: type=1400 audit(581.070:154): avc: denied { perfmon } for pid=4843 comm="syz.0.615" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 581.723846][ T30] audit: type=1400 audit(581.120:155): avc: denied { prog_run } for pid=4843 comm="syz.0.615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 582.855879][ T30] audit: type=1400 audit(582.250:156): avc: denied { create } for pid=4851 comm="syz.1.621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 582.943720][ T30] audit: type=1400 audit(582.340:157): avc: denied { write } for pid=4851 comm="syz.1.621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 583.603928][ T4860] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4860 comm=syz.0.624 [ 588.943460][ T4910] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=261 sclass=netlink_tcpdiag_socket pid=4910 comm=syz.0.652 [ 592.222909][ T4932] raw_sendmsg: syz.1.660 forgot to set AF_INET. Fix it! [ 600.950763][ T30] audit: type=1400 audit(600.340:158): avc: denied { read } for pid=4985 comm="syz.1.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 604.366128][ T30] audit: type=1400 audit(603.760:159): avc: denied { accept } for pid=5007 comm="syz.0.697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 604.823602][ T5012] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5012 comm=syz.0.699 [ 606.332093][ T30] audit: type=1400 audit(605.720:160): avc: denied { read } for pid=5021 comm="syz.1.704" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 606.346861][ T30] audit: type=1400 audit(605.740:161): avc: denied { open } for pid=5021 comm="syz.1.704" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 606.385829][ T30] audit: type=1400 audit(605.780:162): avc: denied { ioctl } for pid=5021 comm="syz.1.704" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 610.834650][ T30] audit: type=1400 audit(610.230:163): avc: denied { ioctl } for pid=5053 comm="syz.0.720" path="socket:[9622]" dev="sockfs" ino=9622 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 618.643545][ T30] audit: type=1400 audit(618.030:164): avc: denied { write } for pid=5106 comm="syz.1.747" name="usbmon1" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 618.653692][ T30] audit: type=1400 audit(618.040:165): avc: denied { open } for pid=5106 comm="syz.1.747" path="/dev/usbmon1" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 618.807836][ T30] audit: type=1400 audit(618.200:166): avc: denied { ioctl } for pid=5106 comm="syz.1.747" path="/dev/usbmon1" dev="devtmpfs" ino=697 ioctlcmd=0x9206 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 621.394783][ T30] audit: type=1400 audit(620.790:167): avc: denied { create } for pid=5116 comm="syz.1.751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 621.417582][ T30] audit: type=1400 audit(620.810:168): avc: denied { ioctl } for pid=5116 comm="syz.1.751" path="socket:[9690]" dev="sockfs" ino=9690 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 623.795537][ T30] audit: type=1400 audit(623.190:169): avc: denied { map_create } for pid=5130 comm="syz.1.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 623.845551][ T30] audit: type=1400 audit(623.240:170): avc: denied { map_read map_write } for pid=5130 comm="syz.1.758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 624.832958][ T30] audit: type=1400 audit(624.230:171): avc: denied { getopt } for pid=5138 comm="syz.1.762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 625.336786][ T30] audit: type=1400 audit(624.730:172): avc: denied { setopt } for pid=5145 comm="syz.0.765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 630.476474][ T30] audit: type=1400 audit(629.850:173): avc: denied { ioctl } for pid=5169 comm="syz.1.777" path="socket:[9772]" dev="sockfs" ino=9772 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 638.248308][ T30] audit: type=1400 audit(637.640:174): avc: denied { ioctl } for pid=5231 comm="syz.1.808" path="socket:[10385]" dev="sockfs" ino=10385 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 638.914988][ T5238] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5238 comm=syz.0.811 [ 640.150649][ T30] audit: type=1400 audit(639.540:175): avc: denied { ioctl } for pid=5244 comm="syz.0.815" path="socket:[10407]" dev="sockfs" ino=10407 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 644.162034][ T30] audit: type=1400 audit(643.550:176): avc: denied { read } for pid=5274 comm="syz.0.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 646.358948][ T5288] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5288 comm=syz.0.836 [ 646.846304][ T30] audit: type=1400 audit(646.240:177): avc: denied { write } for pid=5291 comm="syz.0.838" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 646.859060][ T30] audit: type=1400 audit(646.240:178): avc: denied { open } for pid=5291 comm="syz.0.838" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 648.235859][ T30] audit: type=1400 audit(647.630:179): avc: denied { append } for pid=5301 comm="syz.1.843" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 648.261337][ T30] audit: type=1400 audit(647.650:180): avc: denied { open } for pid=5301 comm="syz.1.843" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 649.953649][ T30] audit: type=1400 audit(649.340:181): avc: denied { create } for pid=5312 comm="syz.1.848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 649.986967][ T30] audit: type=1400 audit(649.380:182): avc: denied { setopt } for pid=5312 comm="syz.1.848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 654.912471][ T5345] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5345 comm=syz.0.864 [ 656.085192][ T30] audit: type=1400 audit(655.450:183): avc: denied { create } for pid=5350 comm="syz.1.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 656.124547][ T30] audit: type=1400 audit(655.520:184): avc: denied { write } for pid=5350 comm="syz.1.867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 657.569158][ T30] audit: type=1400 audit(656.960:185): avc: denied { ioctl } for pid=5363 comm="syz.1.873" path="socket:[10127]" dev="sockfs" ino=10127 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 657.687068][ T30] audit: type=1400 audit(657.080:186): avc: denied { getopt } for pid=5362 comm="syz.0.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 674.042289][ T30] audit: type=1400 audit(673.430:187): avc: denied { write } for pid=5481 comm="syz.0.932" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 674.579245][ T30] audit: type=1400 audit(673.970:188): avc: denied { setattr } for pid=5487 comm="syz.0.935" name="tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 674.890969][ T30] audit: type=1400 audit(674.260:189): avc: denied { write } for pid=5489 comm="syz.1.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 680.425400][ T30] audit: type=1400 audit(679.820:190): avc: denied { write } for pid=5523 comm="syz.0.953" name="udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 681.227008][ T5531] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1013 sclass=netlink_route_socket pid=5531 comm=syz.0.957 [ 688.374930][ T30] audit: type=1400 audit(687.770:191): avc: denied { read } for pid=5585 comm="syz.1.984" path="socket:[10893]" dev="sockfs" ino=10893 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 689.065907][ T30] audit: type=1400 audit(688.460:192): avc: denied { ioctl } for pid=5590 comm="syz.0.987" path="socket:[10900]" dev="sockfs" ino=10900 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 692.710319][ T30] audit: type=1400 audit(692.100:193): avc: denied { watch watch_reads } for pid=5612 comm="syz.0.997" path="/555" dev="tmpfs" ino=2836 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 695.793414][ T30] audit: type=1400 audit(695.190:194): avc: denied { create } for pid=5634 comm="syz.1.1008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 695.824392][ T30] audit: type=1400 audit(695.210:195): avc: denied { getopt } for pid=5634 comm="syz.1.1008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 706.550748][ T5708] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5708 comm=syz.1.1045 [ 707.717325][ T30] audit: type=1400 audit(707.110:196): avc: denied { setopt } for pid=5714 comm="syz.1.1048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 709.345507][ T30] audit: type=1400 audit(708.730:197): avc: denied { sqpoll } for pid=5722 comm="syz.0.1052" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 709.420128][ T30] audit: type=1400 audit(708.810:198): avc: denied { ioctl } for pid=5722 comm="syz.0.1052" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=11785 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 710.714891][ T5734] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=515 sclass=netlink_route_socket pid=5734 comm=syz.1.1057 [ 711.797340][ T5744] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5744 comm=syz.1.1061 [ 716.071877][ T30] audit: type=1400 audit(715.460:199): avc: denied { setcheckreqprot } for pid=5776 comm="syz.0.1078" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 728.310679][ T30] audit: type=1400 audit(727.680:200): avc: denied { setattr } for pid=5845 comm="syz.0.1113" name="NETLINK" dev="sockfs" ino=11985 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 730.746458][ T30] audit: type=1400 audit(730.140:201): avc: denied { ioctl } for pid=5861 comm="syz.1.1120" path="socket:[12380]" dev="sockfs" ino=12380 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 732.525879][ T30] audit: type=1400 audit(731.920:202): avc: denied { read } for pid=5872 comm="syz.1.1127" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 732.545949][ T30] audit: type=1400 audit(731.940:203): avc: denied { open } for pid=5872 comm="syz.1.1127" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 735.347853][ T5891] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.1135' sets config #-1 [ 740.985991][ T30] audit: type=1400 audit(740.370:204): avc: denied { create } for pid=5931 comm="syz.0.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 742.555243][ T30] audit: type=1400 audit(741.950:205): avc: denied { write } for pid=5944 comm="syz.1.1162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 746.441869][ T5973] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5973 comm=syz.0.1176 [ 750.048877][ T6000] random: crng reseeded on system resumption [ 755.426154][ T30] audit: type=1400 audit(754.790:206): avc: denied { write } for pid=6036 comm="syz.0.1207" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 758.636251][ T6061] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6061 comm=syz.1.1220 [ 760.234915][ T30] audit: type=1400 audit(759.630:207): avc: denied { setopt } for pid=6069 comm="syz.0.1224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 761.454814][ T6079] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1015 sclass=netlink_tcpdiag_socket pid=6079 comm=syz.0.1228 [ 762.923341][ T30] audit: type=1400 audit(762.310:208): avc: denied { write } for pid=6088 comm="syz.1.1233" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 771.235531][ T30] audit: type=1400 audit(770.620:209): avc: denied { write } for pid=6139 comm="syz.0.1258" name="mcfilter6" dev="proc" ino=4026532705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 772.247342][ T6148] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6148 comm=syz.0.1262 [ 773.406081][ T6154] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6154 comm=syz.0.1265 [ 774.642041][ T30] audit: type=1400 audit(774.040:210): avc: denied { setattr } for pid=6161 comm="syz.1.1270" name="NETLINK" dev="sockfs" ino=12898 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 792.404710][ T30] audit: type=1400 audit(791.800:211): avc: denied { connect } for pid=6281 comm="syz.0.1328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 794.255409][ T30] audit: type=1400 audit(793.650:212): avc: denied { map } for pid=6297 comm="syz.1.1336" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 797.102456][ T6322] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6322 comm=syz.1.1348 [ 806.894670][ T30] audit: type=1400 audit(806.290:213): avc: denied { read write } for pid=6373 comm="syz.1.1372" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 806.917009][ T30] audit: type=1400 audit(806.310:214): avc: denied { open } for pid=6373 comm="syz.1.1372" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 806.956836][ T30] audit: type=1400 audit(806.350:215): avc: denied { ioctl } for pid=6373 comm="syz.1.1372" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 810.932133][ T6397] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6397 comm=syz.0.1382 [ 811.559267][ T6401] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6401 comm=syz.0.1384 [ 817.694767][ T30] audit: type=1400 audit(817.090:216): avc: denied { setopt } for pid=6439 comm="syz.0.1404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 819.183264][ T6450] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6450 comm=syz.0.1409 [ 827.986396][ T30] audit: type=1400 audit(827.380:217): avc: denied { lock } for pid=6519 comm="syz.0.1444" path="socket:[14052]" dev="sockfs" ino=14052 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 830.008387][ T6541] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6541 comm=syz.0.1454 [ 830.922061][ T6548] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6548 comm=syz.0.1458 [ 833.801664][ T6570] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6570 comm=syz.0.1468 [ 851.231722][ T30] audit: type=1400 audit(850.610:218): avc: denied { read write } for pid=6670 comm="syz.0.1519" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 851.237449][ T30] audit: type=1400 audit(850.630:219): avc: denied { open } for pid=6670 comm="syz.0.1519" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 851.312028][ T30] audit: type=1400 audit(850.700:220): avc: denied { ioctl } for pid=6670 comm="syz.0.1519" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 854.396162][ T30] audit: type=1400 audit(853.790:221): avc: denied { create } for pid=6691 comm="syz.0.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 854.434672][ T30] audit: type=1400 audit(853.830:222): avc: denied { write } for pid=6691 comm="syz.0.1529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 855.096671][ T30] audit: type=1400 audit(854.490:223): avc: denied { setopt } for pid=6695 comm="syz.0.1531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 860.772202][ T30] audit: type=1400 audit(860.150:224): avc: denied { read write } for pid=6733 comm="syz.1.1550" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 860.798964][ T30] audit: type=1400 audit(860.190:225): avc: denied { open } for pid=6733 comm="syz.1.1550" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 860.851221][ T30] audit: type=1400 audit(860.240:226): avc: denied { ioctl } for pid=6733 comm="syz.1.1550" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 862.877469][ T30] audit: type=1400 audit(862.270:227): avc: denied { setattr } for pid=6749 comm="syz.0.1558" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 863.486217][ T30] audit: type=1400 audit(862.880:228): avc: denied { getopt } for pid=6752 comm="syz.0.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 864.182418][ T6760] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=6760 comm=syz.0.1562 [ 867.495747][ T3408] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 867.729169][ T3408] usb 1-1: Using ep0 maxpacket: 8 [ 867.863946][ T3408] usb 1-1: unable to get BOS descriptor or descriptor too short [ 867.907706][ T3408] usb 1-1: config 7 has an invalid interface number: 142 but max is 0 [ 867.921008][ T3408] usb 1-1: config 7 has no interface number 0 [ 868.008834][ T3408] usb 1-1: New USB device found, idVendor=045e, idProduct=0775, bcdDevice=dd.6d [ 868.013506][ T3408] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 868.015836][ T3408] usb 1-1: Product: syz [ 868.017448][ T3408] usb 1-1: Manufacturer: syz [ 868.018922][ T3408] usb 1-1: SerialNumber: syz [ 868.676800][ T3408] usb 1-1: USB disconnect, device number 2 [ 871.842073][ T6806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6806 comm=syz.0.1586 [ 879.583435][ T6856] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6856 comm=syz.1.1611 [ 887.369087][ T30] audit: type=1400 audit(886.760:229): avc: denied { unmount } for pid=3654 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 897.767988][ T30] audit: type=1400 audit(897.160:230): avc: denied { read write } for pid=6982 comm="syz.1.1673" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 897.788775][ T30] audit: type=1400 audit(897.180:231): avc: denied { open } for pid=6982 comm="syz.1.1673" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 898.673418][ T30] audit: type=1400 audit(898.050:232): avc: denied { validate_trans } for pid=6989 comm="syz.0.1677" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 899.122302][ T30] audit: type=1400 audit(898.510:233): avc: denied { read } for pid=6992 comm="syz.0.1678" path="socket:[15905]" dev="sockfs" ino=15905 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 899.634664][ T30] audit: type=1400 audit(899.020:234): avc: denied { setattr } for pid=6997 comm="syz.1.1681" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 900.547907][ T30] audit: type=1400 audit(899.940:235): avc: denied { append } for pid=7004 comm="syz.1.1684" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 902.551947][ T7021] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7021 comm=syz.0.1692 [ 907.091001][ T30] audit: type=1400 audit(906.480:236): avc: denied { read write } for pid=7050 comm="syz.1.1707" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 907.130458][ T30] audit: type=1400 audit(906.490:237): avc: denied { open } for pid=7050 comm="syz.1.1707" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 910.972150][ T30] audit: type=1400 audit(910.360:238): avc: denied { map } for pid=7070 comm="syz.0.1717" path="socket:[16064]" dev="sockfs" ino=16064 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 912.057742][ T7082] sock: sock_timestamping_bind_phc: sock not bind to device [ 922.486586][ T30] audit: type=1400 audit(921.880:239): avc: denied { kexec_image_load } for pid=7146 comm="syz.0.1753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 923.442261][ T7156] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7156 comm=syz.1.1757 [ 929.089057][ T7202] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7202 comm=syz.0.1780 [ 932.541080][ T30] audit: type=1400 audit(931.930:240): avc: denied { setattr } for pid=7225 comm="syz.0.1793" name="pfkey" dev="proc" ino=4026532731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 934.572678][ T7241] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7241 comm=syz.0.1800 [ 946.774407][ T7328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7328 comm=syz.1.1843 [ 952.258410][ T30] audit: type=1400 audit(951.650:241): avc: denied { setattr } for pid=7365 comm="syz.1.1862" name="cuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 952.552842][ T7368] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1018 sclass=netlink_route_socket pid=7368 comm=syz.1.1863 [ 955.174382][ T30] audit: type=1400 audit(954.570:242): avc: denied { append } for pid=7388 comm="syz.0.1874" name="vsock" dev="devtmpfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 958.077348][ T30] audit: type=1400 audit(957.470:243): avc: denied { read write } for pid=7413 comm="syz.0.1886" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 958.083498][ T30] audit: type=1400 audit(957.470:244): avc: denied { open } for pid=7413 comm="syz.0.1886" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 961.243761][ T7440] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7440 comm=syz.1.1899 [ 961.708186][ T7444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7444 comm=syz.1.1901 [ 964.396139][ T30] audit: type=1400 audit(963.790:245): avc: denied { ioctl } for pid=7458 comm="syz.0.1909" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 964.771315][ T30] audit: type=1400 audit(964.160:246): avc: denied { getopt } for pid=7462 comm="syz.0.1910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 981.384480][ T30] audit: type=1400 audit(980.780:247): avc: denied { node_bind } for pid=7558 comm="syz.0.1958" saddr=172.30.1.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 992.544119][ T30] audit: type=1400 audit(991.940:248): avc: denied { write } for pid=7620 comm="syz.0.1990" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 993.941888][ T30] audit: type=1400 audit(993.330:249): avc: denied { map } for pid=7633 comm="syz.1.1996" path="/proc/1811/smaps" dev="proc" ino=17253 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=file permissive=1 [ 996.647023][ T30] audit: type=1400 audit(996.040:250): avc: denied { write } for pid=7648 comm="syz.0.2003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 999.054124][ T7664] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1542 sclass=netlink_audit_socket pid=7664 comm=syz.1.2010 [ 1001.336085][ T30] audit: type=1400 audit(1000.730:251): avc: denied { getopt } for pid=7678 comm="syz.0.2018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1008.825799][ T30] audit: type=1400 audit(1008.220:252): avc: denied { write } for pid=7732 comm="syz.1.2045" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1020.003255][ T30] audit: type=1400 audit(1019.360:253): avc: denied { read } for pid=7816 comm="syz.1.2087" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1020.026953][ T30] audit: type=1400 audit(1019.420:254): avc: denied { open } for pid=7816 comm="syz.1.2087" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1020.101332][ T30] audit: type=1400 audit(1019.480:255): avc: denied { ioctl } for pid=7816 comm="syz.1.2087" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1036.766131][ T30] audit: type=1400 audit(1036.160:256): avc: denied { ioctl } for pid=7930 comm="syz.0.2144" path="socket:[19639]" dev="sockfs" ino=19639 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1043.798642][ T30] audit: type=1400 audit(1043.190:257): avc: denied { write } for pid=7974 comm="syz.0.2166" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1043.807992][ T7976] random: crng reseeded on system resumption [ 1045.012425][ T30] audit: type=1400 audit(1044.400:258): avc: denied { write } for pid=7984 comm="syz.1.2171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1047.475573][ T30] audit: type=1400 audit(1046.870:259): avc: denied { getopt } for pid=7998 comm="syz.0.2178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1049.043738][ T8013] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8013 comm=syz.0.2185 [ 1050.295051][ T8021] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8021 comm=syz.1.2189 [ 1052.477425][ T8041] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8041 comm=syz.1.2199 [ 1059.212513][ T8089] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8089 comm=syz.0.2223 [ 1064.697864][ T30] audit: type=1400 audit(1064.080:260): avc: denied { lock } for pid=8134 comm="syz.1.2246" path="socket:[19031]" dev="sockfs" ino=19031 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1066.854062][ T8148] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8148 comm=syz.0.2252 [ 1079.185705][ T8251] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8251 comm=syz.0.2303 [ 1080.022572][ T8259] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8259 comm=syz.0.2308 [ 1088.333553][ T8318] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8318 comm=syz.0.2337 [ 1102.132606][ T30] audit: type=1400 audit(1101.530:261): avc: denied { ioctl } for pid=8371 comm="syz.1.2364" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1110.202391][ T30] audit: type=1400 audit(1109.600:262): avc: denied { append } for pid=8428 comm="syz.0.2393" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1111.535652][ T30] audit: type=1400 audit(1110.920:263): avc: denied { read } for pid=8439 comm="syz.1.2398" dev="nsfs" ino=4026532762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1111.556588][ T30] audit: type=1400 audit(1110.940:264): avc: denied { open } for pid=8439 comm="syz.1.2398" path="net:[4026532762]" dev="nsfs" ino=4026532762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1112.563555][ T30] audit: type=1400 audit(1111.960:265): avc: denied { lock } for pid=8448 comm="syz.0.2403" path="socket:[21590]" dev="sockfs" ino=21590 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 1115.431677][ T8471] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8471 comm=syz.0.2412 [ 1117.458526][ T8485] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=261 sclass=netlink_tcpdiag_socket pid=8485 comm=syz.1.2419 [ 1118.512317][ T8494] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8494 comm=syz.1.2423 [ 1121.691787][ T8520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5131 sclass=netlink_route_socket pid=8520 comm=syz.0.2437 [ 1127.654639][ T8566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8566 comm=syz.0.2459 [ 1128.441261][ T30] audit: type=1400 audit(1127.830:266): avc: denied { read } for pid=8570 comm="syz.1.2462" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1128.485645][ T30] audit: type=1400 audit(1127.880:267): avc: denied { ioctl } for pid=8570 comm="syz.1.2462" path="/dev/input/mice" dev="devtmpfs" ino=705 ioctlcmd=0x660b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1146.458385][ T30] audit: type=1400 audit(1145.850:268): avc: denied { getopt } for pid=8697 comm="syz.0.2525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1152.105720][ T30] audit: type=1400 audit(1151.500:269): avc: denied { bind } for pid=8731 comm="syz.1.2542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1162.279361][ T8793] usb usb1: usbfs: process 8793 (syz.1.2572) did not claim interface 0 before use [ 1166.564290][ T30] audit: type=1400 audit(1165.960:270): avc: denied { setopt } for pid=8823 comm="syz.1.2588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1171.254694][ T30] audit: type=1400 audit(1170.650:271): avc: denied { read write } for pid=3654 comm="syz-executor" name="loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1171.257751][ T30] audit: type=1400 audit(1170.650:272): avc: denied { open } for pid=3654 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1171.262696][ T30] audit: type=1400 audit(1170.650:273): avc: denied { ioctl } for pid=3654 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1172.806967][ T30] audit: type=1400 audit(1172.200:274): avc: denied { create } for pid=8872 comm="syz.1.2612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1172.861518][ T30] audit: type=1400 audit(1172.250:275): avc: denied { getopt } for pid=8872 comm="syz.1.2612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1173.966698][ T8881] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8881 comm=syz.1.2616 [ 1174.205210][ T30] audit: type=1400 audit(1173.600:276): avc: denied { read } for pid=8882 comm="syz.0.2617" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1174.234489][ T30] audit: type=1400 audit(1173.620:277): avc: denied { open } for pid=8882 comm="syz.0.2617" path="net:[4026532615]" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1174.235389][ T30] audit: type=1400 audit(1173.620:278): avc: denied { create } for pid=8882 comm="syz.0.2617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1174.258089][ T30] audit: type=1400 audit(1173.650:279): avc: denied { setopt } for pid=8882 comm="syz.0.2617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1175.915737][ T30] audit: type=1400 audit(1175.310:280): avc: denied { create } for pid=8897 comm="syz.0.2625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1175.926119][ T30] audit: type=1400 audit(1175.320:281): avc: denied { read } for pid=8897 comm="syz.0.2625" path="socket:[22252]" dev="sockfs" ino=22252 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1176.455830][ T30] audit: type=1400 audit(1175.840:282): avc: denied { create } for pid=8900 comm="syz.0.2626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1176.490595][ T30] audit: type=1400 audit(1175.880:283): avc: denied { write } for pid=8900 comm="syz.0.2626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1177.830904][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1177.831741][ T30] audit: type=1400 audit(1177.210:285): avc: denied { setopt } for pid=8910 comm="syz.0.2631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1178.303955][ T30] audit: type=1400 audit(1177.700:286): avc: denied { read write } for pid=8914 comm="syz.0.2633" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1178.316361][ T30] audit: type=1400 audit(1177.700:287): avc: denied { open } for pid=8914 comm="syz.0.2633" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1178.366710][ T30] audit: type=1400 audit(1177.760:288): avc: denied { ioctl } for pid=8914 comm="syz.0.2633" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0x9403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 1178.937478][ T30] audit: type=1400 audit(1178.330:289): avc: denied { write } for pid=8919 comm="syz.1.2635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1181.342460][ T30] audit: type=1400 audit(1180.730:290): avc: denied { allowed } for pid=8942 comm="syz.1.2647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1181.368148][ T30] audit: type=1400 audit(1180.760:291): avc: denied { create } for pid=8942 comm="syz.1.2647" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1182.766954][ T30] audit: type=1400 audit(1182.160:292): avc: denied { module_request } for pid=8952 comm="syz.0.2653" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1186.031213][ T30] audit: type=1400 audit(1185.420:293): avc: denied { audit_write } for pid=8977 comm="syz.1.2664" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1187.601474][ T30] audit: type=1400 audit(1186.990:294): avc: denied { create } for pid=8989 comm="syz.0.2670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1187.634901][ T30] audit: type=1400 audit(1187.030:295): avc: denied { write } for pid=8989 comm="syz.0.2670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1190.008362][ T9006] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9006 comm=syz.0.2678 [ 1193.086298][ T30] audit: type=1400 audit(1192.480:296): avc: denied { prog_load } for pid=9025 comm="syz.0.2688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1193.108259][ T30] audit: type=1400 audit(1192.500:297): avc: denied { bpf } for pid=9025 comm="syz.0.2688" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1193.151848][ T30] audit: type=1400 audit(1192.540:298): avc: denied { perfmon } for pid=9025 comm="syz.0.2688" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1193.267878][ T30] audit: type=1400 audit(1192.660:299): avc: denied { prog_run } for pid=9025 comm="syz.0.2688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1193.993672][ T9032] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9032 comm=syz.0.2691 [ 1194.457105][ T30] audit: type=1400 audit(1193.850:300): avc: denied { create } for pid=9033 comm="syz.1.2692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1194.483404][ T30] audit: type=1400 audit(1193.880:301): avc: denied { ioctl } for pid=9033 comm="syz.1.2692" path="socket:[22590]" dev="sockfs" ino=22590 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1200.418900][ T30] audit: type=1400 audit(1199.810:302): avc: denied { setattr } for pid=9075 comm="syz.1.2713" name="timer" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1206.081280][ T30] audit: type=1400 audit(1205.470:303): avc: denied { write } for pid=9113 comm="syz.1.2732" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1206.082196][ T30] audit: type=1400 audit(1205.470:304): avc: denied { open } for pid=9113 comm="syz.1.2732" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1206.115444][ T30] audit: type=1400 audit(1205.510:305): avc: denied { ioctl } for pid=9113 comm="syz.1.2732" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4590 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1208.331408][ T30] audit: type=1400 audit(1207.710:306): avc: denied { ioctl } for pid=9128 comm="syz.0.2740" path="socket:[23686]" dev="sockfs" ino=23686 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1211.594975][ T30] audit: type=1400 audit(1210.990:307): avc: denied { write } for pid=9149 comm="syz.1.2750" name="tcp6" dev="proc" ino=4026532851 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1213.583085][ T30] audit: type=1400 audit(1212.980:308): avc: denied { setopt } for pid=9163 comm="syz.0.2757" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1216.890440][ T30] audit: type=1400 audit(1216.270:309): avc: denied { read write } for pid=9183 comm="syz.1.2767" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1216.905492][ T30] audit: type=1400 audit(1216.300:310): avc: denied { open } for pid=9183 comm="syz.1.2767" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1219.315233][ T30] audit: type=1400 audit(1218.710:311): avc: denied { create } for pid=9197 comm="syz.0.2774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1219.372966][ T30] audit: type=1400 audit(1218.770:312): avc: denied { ioctl } for pid=9197 comm="syz.0.2774" path="socket:[23771]" dev="sockfs" ino=23771 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1219.463762][ T9200] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2564 sclass=netlink_route_socket pid=9200 comm=syz.1.2775 [ 1219.855525][ T30] audit: type=1400 audit(1219.240:313): avc: denied { create } for pid=9201 comm="syz.0.2776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1219.901502][ T30] audit: type=1400 audit(1219.290:314): avc: denied { write } for pid=9201 comm="syz.0.2776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1219.902444][ T30] audit: type=1400 audit(1219.290:315): avc: denied { read } for pid=9201 comm="syz.0.2776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1220.713877][ T30] audit: type=1400 audit(1220.110:316): avc: denied { setopt } for pid=9207 comm="syz.1.2779" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1221.691993][ T30] audit: type=1400 audit(1221.080:317): avc: denied { write } for pid=9217 comm="syz.0.2784" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1222.753106][ T30] audit: type=1400 audit(1222.140:318): avc: denied { create } for pid=9226 comm="syz.0.2788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1222.823887][ T30] audit: type=1400 audit(1222.220:319): avc: denied { write } for pid=9226 comm="syz.0.2788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1223.365283][ T30] audit: type=1400 audit(1222.760:320): avc: denied { create } for pid=9229 comm="syz.0.2789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1223.375383][ T30] audit: type=1400 audit(1222.770:321): avc: denied { write } for pid=9229 comm="syz.0.2789" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1224.043251][ T30] audit: type=1400 audit(1223.410:322): avc: denied { search } for pid=9230 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1224.045874][ T30] audit: type=1400 audit(1223.440:323): avc: denied { search } for pid=9230 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=444 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1224.080495][ T30] audit: type=1400 audit(1223.470:324): avc: denied { search } for pid=9230 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=585 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1224.081401][ T30] audit: type=1400 audit(1223.470:325): avc: denied { search } for pid=9230 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=586 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1224.341329][ T30] audit: type=1400 audit(1223.730:326): avc: denied { read open } for pid=9237 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=586 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1224.343215][ T30] audit: type=1400 audit(1223.730:327): avc: denied { getattr } for pid=9237 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=586 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1229.432137][ T9276] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1550 sclass=netlink_tcpdiag_socket pid=9276 comm=syz.1.2809 [ 1231.652717][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 1231.654075][ T30] audit: type=1400 audit(1231.050:338): avc: denied { write } for pid=9291 comm="syz.0.2817" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1235.051401][ T30] audit: type=1400 audit(1234.430:339): avc: denied { ioctl } for pid=9312 comm="syz.1.2827" path="socket:[23082]" dev="sockfs" ino=23082 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1236.741923][ T9327] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9327 comm=syz.0.2835 [ 1237.146703][ T30] audit: type=1400 audit(1236.540:340): avc: denied { setopt } for pid=9329 comm="syz.0.2836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1239.647211][ T30] audit: type=1400 audit(1239.040:341): avc: denied { read write } for pid=9347 comm="syz.0.2845" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1239.661321][ T30] audit: type=1400 audit(1239.050:342): avc: denied { open } for pid=9347 comm="syz.0.2845" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1242.897533][ T30] audit: type=1400 audit(1242.290:343): avc: denied { ioctl } for pid=9371 comm="syz.0.2857" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=24035 ioctlcmd=0x660b scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1243.427790][ T30] audit: type=1400 audit(1242.820:344): avc: denied { create } for pid=9376 comm="syz.0.2860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1243.462773][ T30] audit: type=1400 audit(1242.860:345): avc: denied { write } for pid=9376 comm="syz.0.2860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1246.899134][ T30] audit: type=1400 audit(1246.290:346): avc: denied { map_create } for pid=9410 comm="syz.0.2877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1246.978436][ T30] audit: type=1400 audit(1246.340:347): avc: denied { map_read map_write } for pid=9410 comm="syz.0.2877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1250.270975][ T30] audit: type=1400 audit(1249.660:348): avc: denied { ioctl } for pid=9440 comm="syz.0.2892" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1250.726158][ T30] audit: type=1400 audit(1250.120:349): avc: denied { ioctl } for pid=9443 comm="syz.0.2893" path="/dev/input/mice" dev="devtmpfs" ino=705 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1251.366357][ T30] audit: type=1400 audit(1250.750:350): avc: denied { read } for pid=9449 comm="syz.0.2896" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1251.398959][ T30] audit: type=1400 audit(1250.760:351): avc: denied { open } for pid=9449 comm="syz.0.2896" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1253.147137][ T30] audit: type=1400 audit(1252.540:352): avc: denied { create } for pid=9460 comm="syz.1.2901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1253.195552][ T30] audit: type=1400 audit(1252.590:353): avc: denied { getopt } for pid=9460 comm="syz.1.2901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1255.873390][ T9479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=9479 comm=syz.1.2910 [ 1259.823008][ T9503] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9503 comm=syz.1.2922 [ 1261.045863][ T30] audit: type=1400 audit(1260.440:354): avc: denied { create } for pid=9509 comm="syz.0.2926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1261.221660][ T30] audit: type=1400 audit(1260.610:355): avc: denied { setopt } for pid=9509 comm="syz.0.2926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1261.684240][ T30] audit: type=1400 audit(1261.080:356): avc: denied { write } for pid=9512 comm="syz.1.2927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1264.654029][ T9534] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9534 comm=syz.1.2937 [ 1265.930191][ T30] audit: type=1400 audit(1265.320:357): avc: denied { read } for pid=9542 comm="syz.0.2942" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1265.930713][ T30] audit: type=1400 audit(1265.320:358): avc: denied { open } for pid=9542 comm="syz.0.2942" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1265.965986][ T30] audit: type=1400 audit(1265.360:359): avc: denied { ioctl } for pid=9542 comm="syz.0.2942" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4602 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1267.997398][ T9559] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9559 comm=syz.1.2950 [ 1273.485661][ T9590] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=101 sclass=netlink_audit_socket pid=9590 comm=syz.0.2965 [ 1274.775602][ T30] audit: type=1400 audit(1274.170:360): avc: denied { setcheckreqprot } for pid=9595 comm="syz.0.2968" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1278.136403][ T30] audit: type=1400 audit(1277.530:361): avc: denied { ioctl } for pid=9611 comm="syz.1.2976" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1282.841054][ T30] audit: type=1400 audit(1282.230:362): avc: denied { getattr } for pid=9634 comm="syz.0.2988" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=24529 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1284.832162][ T30] audit: type=1400 audit(1284.220:363): avc: denied { read write } for pid=9646 comm="syz.0.2993" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1284.861363][ T30] audit: type=1400 audit(1284.220:364): avc: denied { open } for pid=9646 comm="syz.0.2993" path="/dev/virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1294.463538][ T9707] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9707 comm=syz.0.3021 [ 1301.487465][ T30] audit: type=1400 audit(1300.870:365): avc: denied { setattr } for pid=9747 comm="syz.0.3042" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 1302.098133][ T30] audit: type=1400 audit(1301.490:366): avc: denied { setattr } for pid=9751 comm="syz.0.3044" name="zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 1303.803052][ T30] audit: type=1400 audit(1303.200:367): avc: denied { getopt } for pid=9764 comm="syz.0.3051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1305.910935][ T30] audit: type=1400 audit(1305.290:368): avc: denied { sys_module } for pid=9773 comm="syz.0.3055" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1307.997988][ T30] audit: type=1400 audit(1307.390:369): avc: denied { getopt } for pid=9792 comm="syz.0.3064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1312.417747][ T30] audit: type=1400 audit(1311.790:370): avc: denied { create } for pid=9825 comm="syz.0.3080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1312.427594][ T30] audit: type=1400 audit(1311.810:371): avc: denied { ioctl } for pid=9825 comm="syz.0.3080" path="socket:[24839]" dev="sockfs" ino=24839 ioctlcmd=0x8953 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1316.531696][ T30] audit: type=1400 audit(1315.920:372): avc: denied { node_bind } for pid=9850 comm="syz.1.3093" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1321.277436][ T30] audit: type=1400 audit(1320.670:373): avc: denied { open } for pid=9880 comm="syz.0.3108" path="/dev/ptyq4" dev="devtmpfs" ino=115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1325.565616][ T9906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9906 comm=syz.0.3120 [ 1326.244697][ T30] audit: type=1400 audit(1325.640:374): avc: denied { ioctl } for pid=9908 comm="syz.0.3122" path="socket:[26034]" dev="sockfs" ino=26034 ioctlcmd=0x8990 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1327.482346][ T30] audit: type=1400 audit(1326.870:375): avc: denied { read append } for pid=9915 comm="syz.0.3125" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1327.484663][ T30] audit: type=1400 audit(1326.880:376): avc: denied { open } for pid=9915 comm="syz.0.3125" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1327.506184][ T30] audit: type=1400 audit(1326.890:377): avc: denied { ioctl } for pid=9915 comm="syz.0.3125" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1332.464730][ T9950] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9950 comm=syz.0.3142 [ 1354.526527][ T30] audit: type=1400 audit(1353.910:378): avc: denied { write } for pid=10080 comm="syz.1.3207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1364.594810][ T30] audit: type=1400 audit(1363.990:379): avc: denied { nlmsg_write } for pid=10149 comm="syz.0.3242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1365.272449][T10155] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10155 comm=syz.0.3244 [ 1376.207828][ T30] audit: type=1400 audit(1375.600:380): avc: denied { ioctl } for pid=10228 comm="syz.0.3281" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1376.482050][ T31] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1376.876828][ T31] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 1376.877200][ T31] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1376.879219][ T31] usb 1-1: Product: syz [ 1376.880289][ T31] usb 1-1: Manufacturer: syz [ 1376.880428][ T31] usb 1-1: SerialNumber: syz [ 1378.938353][ T30] audit: type=1400 audit(1378.330:381): avc: denied { mounton } for pid=10239 comm="syz.1.3286" path="/1560/file0" dev="tmpfs" ino=7947 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1378.963525][ T30] audit: type=1400 audit(1378.360:382): avc: denied { mount } for pid=10239 comm="syz.1.3286" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1379.006288][ T30] audit: type=1400 audit(1378.400:383): avc: denied { unmount } for pid=3654 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1386.441115][ T23] usb 1-1: USB disconnect, device number 3 [ 1392.891866][ T30] audit: type=1400 audit(1392.280:384): avc: denied { bind } for pid=10309 comm="syz.0.3320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1392.892906][ T30] audit: type=1400 audit(1392.280:385): avc: denied { name_bind } for pid=10309 comm="syz.0.3320" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 1392.893648][ T30] audit: type=1400 audit(1392.280:386): avc: denied { node_bind } for pid=10309 comm="syz.0.3320" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1398.794925][ T30] audit: type=1400 audit(1398.190:387): avc: denied { getopt } for pid=10350 comm="syz.1.3341" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1405.922145][ T30] audit: type=1400 audit(1405.310:388): avc: denied { create } for pid=10393 comm="syz.0.3363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1405.964470][ T30] audit: type=1400 audit(1405.360:389): avc: denied { ioctl } for pid=10393 comm="syz.0.3363" path="socket:[26935]" dev="sockfs" ino=26935 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1410.141256][ T30] audit: type=1400 audit(1409.530:390): avc: denied { connect } for pid=10422 comm="syz.0.3377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1415.437082][T10461] ======================================================= [ 1415.437082][T10461] WARNING: The mand mount option has been deprecated and [ 1415.437082][T10461] and is ignored by this kernel. Remove the mand [ 1415.437082][T10461] option from the mount to silence this warning. [ 1415.437082][T10461] ======================================================= [ 1415.478472][ T30] audit: type=1400 audit(1414.870:391): avc: denied { mount } for pid=10460 comm="syz.0.3396" name="/" dev="cgroup" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1415.681013][ T30] audit: type=1400 audit(1415.060:392): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1416.563211][ T30] audit: type=1400 audit(1415.960:393): avc: denied { setattr } for pid=10468 comm="syz.0.3400" path="/dev/net/tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 1417.595140][ T30] audit: type=1400 audit(1416.990:394): avc: denied { read } for pid=10475 comm="syz.0.3404" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1422.802436][ T30] audit: type=1400 audit(1422.200:395): avc: denied { lock } for pid=10514 comm="syz.1.3423" path="socket:[27846]" dev="sockfs" ino=27846 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1428.395494][ T30] audit: type=1400 audit(1427.790:396): avc: denied { mounton } for pid=10554 comm="syz.1.3444" path="/1646/file1" dev="tmpfs" ino=8385 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1431.705015][T10580] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10580 comm=syz.0.3456 [ 1434.563433][T10599] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10599 comm=syz.1.3464 [ 1437.420409][T10619] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10619 comm=syz.0.3473 [ 1448.590318][ T30] audit: type=1400 audit(1447.980:397): avc: denied { write } for pid=10684 comm="syz.0.3505" path="socket:[27502]" dev="sockfs" ino=27502 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1451.632996][T10708] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10708 comm=syz.1.3516 [ 1453.668367][ T30] audit: type=1400 audit(1453.060:398): avc: denied { setopt } for pid=10719 comm="syz.0.3523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1454.276812][T10725] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10725 comm=syz.0.3525 [ 1457.544102][ T30] audit: type=1400 audit(1456.930:399): avc: denied { read write } for pid=10744 comm="syz.1.3535" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1457.548819][ T30] audit: type=1400 audit(1456.940:400): avc: denied { open } for pid=10744 comm="syz.1.3535" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1457.622101][ T30] audit: type=1400 audit(1457.010:401): avc: denied { ioctl } for pid=10744 comm="syz.1.3535" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1468.812353][ T30] audit: type=1400 audit(1468.200:402): avc: denied { read } for pid=10814 comm="syz.1.3570" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1468.832628][ T30] audit: type=1400 audit(1468.210:403): avc: denied { open } for pid=10814 comm="syz.1.3570" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1471.437147][ T30] audit: type=1400 audit(1470.830:404): avc: denied { ioctl } for pid=10830 comm="syz.0.3576" path="socket:[28307]" dev="sockfs" ino=28307 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1474.312032][ T30] audit: type=1400 audit(1473.700:405): avc: denied { getopt } for pid=10850 comm="syz.1.3586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1476.271218][ T30] audit: type=1400 audit(1475.650:406): avc: denied { create } for pid=10862 comm="syz.1.3592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1476.375926][ T30] audit: type=1400 audit(1475.770:407): avc: denied { write } for pid=10862 comm="syz.1.3592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1478.846238][ T30] audit: type=1400 audit(1478.240:408): avc: denied { write } for pid=10882 comm="syz.0.3603" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1480.193891][ T30] audit: type=1400 audit(1479.590:409): avc: denied { read } for pid=10890 comm="syz.0.3606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1480.747854][ T30] audit: type=1400 audit(1480.140:410): avc: denied { map } for pid=10894 comm="syz.0.3608" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28894 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1480.748813][ T30] audit: type=1400 audit(1480.140:411): avc: denied { read write } for pid=10894 comm="syz.0.3608" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28894 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1487.235005][T10944] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10944 comm=syz.1.3632 [ 1489.052667][ T30] audit: type=1400 audit(1488.440:412): avc: denied { setopt } for pid=10961 comm="syz.0.3642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1490.171985][ T30] audit: type=1400 audit(1489.570:413): avc: denied { ioctl } for pid=10969 comm="syz.1.3646" path="socket:[29036]" dev="sockfs" ino=29036 ioctlcmd=0x8970 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1503.346911][ T30] audit: type=1400 audit(1502.740:414): avc: denied { write } for pid=11071 comm="syz.0.3697" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1503.717322][T11076] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5126 sclass=netlink_audit_socket pid=11076 comm=syz.0.3698 [ 1511.639102][ T30] audit: type=1400 audit(1511.030:415): avc: denied { map } for pid=11136 comm="syz.1.3729" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 1515.445089][ T30] audit: type=1400 audit(1514.830:416): avc: denied { bind } for pid=11160 comm="syz.1.3741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1518.216536][ T30] audit: type=1400 audit(1517.610:417): avc: denied { setattr } for pid=11182 comm="syz.1.3753" name="cuse" dev="devtmpfs" ino=93 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 1518.957892][T11191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=11191 comm=syz.0.3755 [ 1525.375521][ T30] audit: type=1400 audit(1524.770:418): avc: denied { bind } for pid=11229 comm="syz.0.3776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1526.475156][T11239] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11239 comm=syz.0.3780 [ 1534.126500][ T30] audit: type=1400 audit(1533.520:419): avc: denied { getopt } for pid=11292 comm="syz.0.3807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1539.313491][ T30] audit: type=1400 audit(1538.710:420): avc: denied { setattr } for pid=11326 comm="syz.1.3824" name="NETLINK" dev="sockfs" ino=29633 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1547.015299][ T30] audit: type=1400 audit(1546.410:421): avc: denied { setopt } for pid=11385 comm="syz.0.3853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1553.285239][T11427] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5122 sclass=netlink_audit_socket pid=11427 comm=syz.0.3873 [ 1563.954078][T11490] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=125 sclass=netlink_audit_socket pid=11490 comm=syz.0.3904 [ 1565.038681][ T30] audit: type=1400 audit(1564.430:422): avc: denied { getopt } for pid=11495 comm="syz.1.3908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1572.813807][T11543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pid=11543 comm=syz.1.3931 [ 1573.913330][T11549] capability: warning: `syz.0.3934' uses 32-bit capabilities (legacy support in use) [ 1574.324968][T11553] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11553 comm=syz.0.3936 [ 1576.982090][ T30] audit: type=1400 audit(1576.370:423): avc: denied { read } for pid=11567 comm="syz.1.3943" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1576.997809][ T30] audit: type=1400 audit(1576.390:424): avc: denied { open } for pid=11567 comm="syz.1.3943" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1582.304130][ T30] audit: type=1400 audit(1581.660:425): avc: denied { checkpoint_restore } for pid=11596 comm="syz.0.3958" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1596.512542][T11663] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=5136 sclass=netlink_tcpdiag_socket pid=11663 comm=syz.1.3989 [ 1608.088176][T11728] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11728 comm=syz.1.4021 [ 1614.752143][ T30] audit: type=1400 audit(1614.130:426): avc: denied { read } for pid=11761 comm="syz.1.4038" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1614.765599][ T30] audit: type=1400 audit(1614.160:427): avc: denied { open } for pid=11761 comm="syz.1.4038" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1614.855587][ T30] audit: type=1400 audit(1614.250:428): avc: denied { ioctl } for pid=11761 comm="syz.1.4038" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1621.217238][ T30] audit: type=1400 audit(1620.610:429): avc: denied { getopt } for pid=11796 comm="syz.0.4056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1623.631710][T11815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=11815 comm=syz.0.4064 [ 1644.829409][ T30] audit: type=1400 audit(1644.220:430): avc: denied { setattr } for pid=11952 comm="syz.1.4132" name="nbd1" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1646.412863][ T30] audit: type=1400 audit(1645.790:431): avc: denied { mount } for pid=11956 comm="syz.1.4134" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1654.440617][ T30] audit: type=1400 audit(1653.820:432): avc: denied { setopt } for pid=12010 comm="syz.1.4160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1663.768918][ T30] audit: type=1400 audit(1663.160:433): avc: denied { read } for pid=12072 comm="syz.0.4191" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1663.820723][ T30] audit: type=1400 audit(1663.210:434): avc: denied { open } for pid=12072 comm="syz.0.4191" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1663.859054][ T30] audit: type=1400 audit(1663.250:435): avc: denied { ioctl } for pid=12072 comm="syz.0.4191" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1670.482022][ T30] audit: type=1400 audit(1669.870:436): avc: denied { create } for pid=12120 comm="syz.1.4215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1670.535408][ T30] audit: type=1400 audit(1669.930:437): avc: denied { ioctl } for pid=12120 comm="syz.1.4215" path="socket:[33066]" dev="sockfs" ino=33066 ioctlcmd=0x8917 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1672.900734][T12138] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1547 sclass=netlink_tcpdiag_socket pid=12138 comm=syz.1.4223 [ 1681.343820][T12194] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12194 comm=syz.0.4250 [ 1684.955727][ T30] audit: type=1400 audit(1684.340:438): avc: denied { getopt } for pid=12218 comm="syz.1.4263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1691.594381][ T30] audit: type=1400 audit(1690.990:439): avc: denied { ioctl } for pid=12262 comm="syz.1.4285" path="socket:[33276]" dev="sockfs" ino=33276 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1701.123443][T12321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12321 comm=syz.1.4313 [ 1704.253319][T12342] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1010 sclass=netlink_route_socket pid=12342 comm=syz.1.4323 [ 1717.021362][ T30] audit: type=1400 audit(1716.400:440): avc: granted { setsecparam } for pid=12411 comm="syz.1.4358" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1718.464769][T12421] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=513 sclass=netlink_audit_socket pid=12421 comm=syz.1.4362 [ 1722.537216][T12447] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1005 sclass=netlink_tcpdiag_socket pid=12447 comm=syz.1.4375 [ 1734.026946][T12527] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12527 comm=syz.1.4415 [ 1758.166613][ T30] audit: type=1400 audit(1757.560:441): avc: denied { read write } for pid=12665 comm="syz.1.4485" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1758.178651][ T30] audit: type=1400 audit(1757.570:442): avc: denied { open } for pid=12665 comm="syz.1.4485" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1767.421939][T12724] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=12724 comm=syz.1.4511 [ 1776.317044][ T30] audit: type=1400 audit(1775.710:443): avc: denied { ioctl } for pid=12771 comm="syz.1.4533" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1796.235053][T12918] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=12918 comm=syz.1.4604 [ 1799.651626][T12938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12938 comm=syz.1.4615 [ 1806.149281][T12980] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1806.168603][T12980] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1806.571402][ T30] audit: type=1400 audit(1805.960:444): avc: denied { write } for pid=12983 comm="syz.0.4638" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1807.081612][T12989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12989 comm=syz.0.4640 [ 1808.327296][ T30] audit: type=1400 audit(1807.720:445): avc: denied { setattr } for pid=12998 comm="syz.0.4645" name="NETLINK" dev="sockfs" ino=35532 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1809.066407][T13007] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13007 comm=syz.0.4649 [ 1813.775131][ T30] audit: type=1400 audit(1813.170:446): avc: granted { setsecparam } for pid=13046 comm="syz.1.4669" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1821.528166][ T30] audit: type=1400 audit(1820.920:447): avc: denied { read } for pid=13093 comm="syz.1.4692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1822.167439][ T30] audit: type=1400 audit(1821.530:448): avc: denied { getopt } for pid=13098 comm="syz.0.4694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1827.297417][ T30] audit: type=1400 audit(1826.690:449): avc: denied { write } for pid=13129 comm="syz.1.4710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1838.487490][T13186] could not allocate digest TFM handle sha384-avx2 [ 1844.702568][ T30] audit: type=1400 audit(1844.070:450): avc: denied { create } for pid=13231 comm="syz.0.4760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1844.727304][ T30] audit: type=1400 audit(1844.120:451): avc: denied { write } for pid=13231 comm="syz.0.4760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1849.008192][T13265] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13265 comm=syz.1.4776 [ 1864.487010][ T30] audit: type=1400 audit(1863.880:452): avc: denied { setopt } for pid=13366 comm="syz.1.4828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1868.812398][ T30] audit: type=1400 audit(1868.200:453): avc: denied { accept } for pid=13394 comm="syz.1.4841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1871.817598][ T30] audit: type=1400 audit(1871.210:454): avc: denied { create } for pid=13420 comm="syz.0.4854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1871.854339][ T30] audit: type=1400 audit(1871.250:455): avc: denied { write } for pid=13420 comm="syz.0.4854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1887.157636][T13526] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13526 comm=syz.0.4906 [ 1901.094755][ T30] audit: type=1400 audit(1900.480:456): avc: denied { append } for pid=13610 comm="syz.1.4946" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1910.021287][ T30] audit: type=1400 audit(1909.410:457): avc: denied { execmem } for pid=13667 comm="syz.0.4975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1915.195477][T13702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13702 comm=syz.0.4991 [ 1921.843073][T13749] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13749 comm=syz.1.5015 [ 1923.753845][T13765] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13765 comm=syz.0.5023 [ 1936.906145][ T30] audit: type=1400 audit(1936.300:458): avc: denied { read write } for pid=13848 comm="syz.0.5065" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1936.938161][ T30] audit: type=1400 audit(1936.330:459): avc: denied { open } for pid=13848 comm="syz.0.5065" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1937.021263][ T30] audit: type=1400 audit(1936.400:460): avc: denied { ioctl } for pid=13848 comm="syz.0.5065" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0xf506 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1937.034109][T13851] binder: 13848:13851 ioctl 4004f506 0 returned -22 [ 1941.891410][ T30] audit: type=1400 audit(1941.270:461): avc: denied { write } for pid=13884 comm="syz.1.5083" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1950.552969][T13942] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13942 comm=syz.0.5111 [ 1960.229115][ T30] audit: type=1400 audit(1959.620:462): avc: denied { append } for pid=13997 comm="syz.1.5138" name="card0" dev="devtmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1963.088135][T13984] infiniband syz1: set down [ 1963.104627][T13984] infiniband syz1: added ipvlan0 [ 1963.138264][T13984] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 1963.166412][T13984] infiniband syz1: Couldn't open port 1 [ 1963.768239][T13984] RDS/IB: syz1: added [ 1963.806888][T13984] smc: adding ib device syz1 with port count 1 [ 1963.808485][T13984] smc: ib device syz1 port 1 has pnetid [ 1969.945377][ T30] audit: type=1400 audit(1969.340:463): avc: denied { mounton } for pid=14035 comm="syz.1.5156" path="/2526/bus" dev="tmpfs" ino=12869 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 1981.196435][T14094] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14094 comm=syz.1.5182 [ 1984.334063][T14111] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=14111 comm=syz.0.5191 [ 1984.815817][ T30] audit: type=1400 audit(1984.210:464): avc: denied { setopt } for pid=14112 comm="syz.1.5192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1987.262924][T14126] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14126 comm=syz.0.5199 [ 1989.714659][T14144] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14144 comm=syz.0.5207 [ 2003.062158][T14215] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14215 comm=syz.1.5243 [ 2017.778293][T14283] could not allocate digest TFM handle sha1-ssse3 [ 2019.302482][T14297] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14297 comm=syz.1.5282 [ 2024.133088][T14029] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 2024.374047][T14029] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 2024.422636][T14029] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 2024.423280][T14029] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 2024.423723][T14029] usb 1-1: SerialNumber: syz [ 2025.093531][T14029] cdc_ether 1-1:1.0: probe with driver cdc_ether failed with error -71 [ 2025.270718][T14029] usb 1-1: USB disconnect, device number 4 [ 2027.813962][T14345] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14345 comm=syz.1.5306 [ 2057.702468][ T30] audit: type=1400 audit(2057.090:465): avc: denied { write } for pid=14539 comm="syz.1.5404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2060.983569][ T30] audit: type=1400 audit(2060.380:466): avc: denied { mount } for pid=14565 comm="syz.0.5418" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2061.030399][ T30] audit: type=1400 audit(2060.420:467): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2065.002463][ T30] audit: type=1400 audit(2064.390:468): avc: denied { connect } for pid=14587 comm="syz.1.5428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2070.377436][ T30] audit: type=1400 audit(2069.770:469): avc: denied { accept } for pid=14625 comm="syz.0.5447" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 2083.591291][T14702] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14702 comm=syz.1.5483 [ 2089.192695][T14742] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14742 comm=syz.1.5503 [ 2132.723004][T14995] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14995 comm=syz.1.5627 [ 2142.724387][T15046] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15046 comm=syz.0.5652 [ 2146.121205][T15067] binder: 15065:15067 ioctl 4004f506 0 returned -22 [ 2162.326188][T15158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15158 comm=syz.1.5708 [ 2170.732561][T15211] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15211 comm=syz.1.5740 [ 2172.382152][ T30] audit: type=1400 audit(2171.770:470): avc: denied { setopt } for pid=15221 comm="syz.1.5746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2176.703239][ T30] audit: type=1400 audit(2176.100:471): avc: denied { map } for pid=15247 comm="syz.0.5755" path="/2889" dev="tmpfs" ino=14694 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2181.096970][T15274] rdma_rxe: rxe_newlink: failed to add ipvlan0 [ 2187.431904][T15313] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15313 comm=syz.0.5787 [ 2190.493014][T15326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=15326 comm=syz.1.5796 [ 2193.341643][T15342] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15342 comm=syz.1.5804 [ 2197.375455][T15364] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15364 comm=syz.1.5811 [ 2218.238325][ T30] audit: type=1400 audit(2217.630:472): avc: denied { setattr } for pid=15487 comm="syz.0.5875" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 2222.436926][T15509] could not allocate digest TFM handle sha1-ssse3 [ 2222.536178][T15517] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15517 comm=syz.0.5883 [ 2231.808164][T15584] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15584 comm=syz.0.5917 [ 2233.343328][T15596] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15596 comm=syz.0.5922 [ 2241.125661][T15643] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2241.192034][T15643] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2243.656878][T15660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15660 comm=syz.0.5955 [ 2272.215055][T15843] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15843 comm=syz.0.6046 [ 2287.023409][T15946] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15946 comm=syz.0.6095 [ 2296.929143][T16009] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16009 comm=syz.0.6129 [ 2308.697067][T16101] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=16101 comm=syz.1.6175 [ 2315.123450][T16150] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=16150 comm=syz.1.6199 [ 2316.045630][T16157] misc userio: Invalid payload size [ 2318.235150][ C0] vkms_vblank_simulate: vblank timer overrun [ 2318.445469][ T30] audit: type=1400 audit(2317.760:473): avc: denied { ioctl } for pid=16172 comm="syz.1.6211" path="socket:[45898]" dev="sockfs" ino=45898 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2352.278785][ T30] audit: type=1400 audit(2351.670:474): avc: denied { append } for pid=16371 comm="syz.0.6309" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2359.917124][T16413] SELinux: Context system_u:object_r:semanage_exec_t:s0 is not valid (left unmapped). [ 2359.976466][ T30] audit: type=1400 audit(2359.330:475): avc: denied { relabelto } for pid=16411 comm="syz.1.6329" name=".log" dev="tmpfs" ino=15797 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:semanage_exec_t:s0" [ 2359.983465][ T30] audit: type=1400 audit(2359.370:476): avc: denied { associate } for pid=16411 comm="syz.1.6329" name=".log" dev="tmpfs" ino=15797 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:semanage_exec_t:s0" [ 2360.463079][ T30] audit: type=1400 audit(2359.800:477): avc: denied { unlink } for pid=3654 comm="syz-executor" name=".log" dev="tmpfs" ino=15797 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:semanage_exec_t:s0" [ 2367.276277][T16458] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16458 comm=syz.0.6349 [ 2383.985944][T16556] binder: 16555:16556 ioctl 4004f506 0 returned -22 [ 2410.144112][T16714] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16714 comm=syz.1.6476 [ 2410.963669][T16720] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16720 comm=syz.1.6480 [ 2413.075167][T16737] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16737 comm=syz.0.6487 [ 2416.247132][T16756] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16756 comm=syz.0.6497 [ 2421.438624][T16778] could not allocate digest TFM handle sha1-ssse3 [ 2439.782929][T16899] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16899 comm=syz.1.6567 [ 2466.415720][T17072] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17072 comm=syz.1.6652 [ 2470.898709][T17099] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17099 comm=syz.0.6667 [ 2486.673771][T17192] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=17192 comm=syz.1.6712 [ 2489.753255][T17207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17207 comm=syz.1.6719 [ 2519.916133][T17368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=17368 comm=syz.0.6798 [ 2525.976721][T17402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17402 comm=syz.1.6815 [ 2531.235413][T17435] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17435 comm=syz.0.6832 [ 2541.039171][T17499] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=17499 comm=syz.0.6863 [ 2546.701391][ T30] audit: type=1326 audit(2546.090:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17541 comm="syz.0.6885" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c44 code=0x0 [ 2559.792568][ T30] audit: type=1400 audit(2559.170:479): avc: denied { ioctl } for pid=17621 comm="syz.1.6923" path="/dev/ptyq6" dev="devtmpfs" ino=117 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 2565.601570][ T30] audit: type=1400 audit(2564.990:480): avc: denied { setattr } for pid=17661 comm="syz.0.6944" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 2573.265188][T17716] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5122 sclass=netlink_xfrm_socket pid=17716 comm=syz.0.6970 [ 2582.638230][T10583] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 2582.939158][T10583] usb 1-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 2582.953236][T10583] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2583.098214][T10583] usb 1-1: config 0 descriptor?? [ 2583.248014][T10583] cp210x 1-1:0.0: cp210x converter detected [ 2583.433111][T10583] cp210x 1-1:0.0: failed to get vendor val 0x370b size 1: -121 [ 2583.434012][T10583] cp210x 1-1:0.0: querying part number failed [ 2583.568269][T10583] usb 1-1: cp210x converter now attached to ttyUSB0 [ 2583.675892][T10583] usb 1-1: USB disconnect, device number 5 [ 2584.027280][T10583] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 2584.083875][T10583] cp210x 1-1:0.0: device disconnected [ 2584.162828][ T30] audit: type=1400 audit(2583.550:481): avc: denied { create } for pid=17796 comm="syz.0.7011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2584.178831][ T30] audit: type=1400 audit(2583.560:482): avc: denied { getopt } for pid=17796 comm="syz.0.7011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2586.884233][ T30] audit: type=1400 audit(2586.280:483): avc: denied { append } for pid=17812 comm="syz.1.7019" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 2596.238923][T17881] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=17881 comm=syz.1.7052 [ 2609.863661][T17962] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17962 comm=syz.0.7091 [ 2614.833244][T17991] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1281 sclass=netlink_audit_socket pid=17991 comm=syz.0.7105 [ 2641.633541][ T30] audit: type=1400 audit(2641.010:484): avc: denied { ioctl } for pid=18135 comm="syz.1.7177" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x1284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2645.853987][ T30] audit: type=1400 audit(2645.250:485): avc: denied { setattr } for pid=18160 comm="syz.1.7189" name="PACKET" dev="sockfs" ino=52394 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2648.951000][ T30] audit: type=1400 audit(2648.340:486): avc: denied { read write } for pid=18179 comm="syz.1.7199" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2648.975858][ T30] audit: type=1400 audit(2648.360:487): avc: denied { open } for pid=18179 comm="syz.1.7199" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 2671.468423][T18311] binder: 18310:18311 ioctl 4004f506 0 returned -22 [ 2692.844698][T18448] syz1: rxe_newlink: already configured on ipvlan0 [ 2696.895112][T18472] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18472 comm=syz.1.7347 [ 2700.941849][T18502] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=18502 comm=syz.0.7358 [ 2703.556979][T18519] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=512 sclass=netlink_route_socket pid=18519 comm=syz.1.7365 [ 2704.252256][T18525] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=18525 comm=syz.1.7369 [ 2710.864052][T18565] could not allocate digest TFM handle sha1-ssse3 [ 2727.537336][T18675] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18675 comm=syz.1.7444 [ 2734.471746][T18719] misc userio: Invalid payload size [ 2735.743611][T18726] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=18726 comm=syz.0.7473 [ 2740.354959][T18762] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=18762 comm=syz.1.7487 [ 2749.651830][T18817] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=18817 comm=syz.1.7515 [ 2762.985567][ T30] audit: type=1326 audit(2762.380:488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18868 comm="syz.1.7539" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c44 code=0x0 [ 2810.355987][T19128] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=19128 comm=syz.0.7668 [ 2812.275520][ T30] audit: type=1400 audit(2811.660:489): avc: denied { connect } for pid=19132 comm="syz.0.7671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2833.065214][T19266] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=19266 comm=syz.0.7737 [ 2833.341536][ T30] audit: type=1400 audit(2832.730:490): avc: denied { ioctl } for pid=19267 comm="syz.1.7738" path="socket:[56079]" dev="sockfs" ino=56079 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2836.533004][T19286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19286 comm=syz.1.7747 [ 2838.898474][ T30] audit: type=1400 audit(2838.290:491): avc: denied { write } for pid=19299 comm="syz.0.7755" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2840.403944][T19310] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19310 comm=syz.1.7758 [ 2867.264971][T19468] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19468 comm=syz.1.7835 [ 2870.374066][T19487] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19487 comm=syz.0.7844 [ 2886.242027][T19569] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=769 sclass=netlink_xfrm_socket pid=19569 comm=syz.0.7884 [ 2889.387922][ T30] audit: type=1400 audit(2888.780:492): avc: denied { ioctl } for pid=19584 comm="syz.1.7893" path="socket:[57599]" dev="sockfs" ino=57599 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2894.725154][ T30] audit: type=1400 audit(2894.110:493): avc: denied { create } for pid=19613 comm="syz.1.7907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2894.756969][ T30] audit: type=1400 audit(2894.150:494): avc: denied { write } for pid=19613 comm="syz.1.7907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2898.438478][ T30] audit: type=1400 audit(2897.830:495): avc: denied { getopt } for pid=19634 comm="syz.1.7917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2908.006052][T19698] SELinux: Context system_u:object_r:initctl_t:s0 is not valid (left unmapped). [ 2908.023143][ T30] audit: type=1400 audit(2907.410:496): avc: denied { relabelto } for pid=19696 comm="syz.1.7948" name="loop8" dev="devtmpfs" ino=645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:initctl_t:s0" [ 2908.051911][ T30] audit: type=1400 audit(2907.420:497): avc: denied { associate } for pid=19696 comm="syz.1.7948" name="loop8" dev="devtmpfs" ino=645 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:initctl_t:s0" [ 2927.521375][ T30] audit: type=1400 audit(2926.890:498): avc: denied { write } for pid=19800 comm="syz.0.7999" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2927.525958][T19802] random: crng reseeded on system resumption [ 2930.642122][T13929] usb 1-1: new low-speed USB device number 6 using dummy_hcd [ 2930.931662][T13929] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 2930.932531][T13929] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 2930.933460][T13929] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 65535, setting to 8 [ 2930.933982][T13929] usb 1-1: New USB device found, idVendor=0225, idProduct=0000, bcdDevice= 0.00 [ 2930.934209][T13929] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2931.023800][T19821] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2931.110656][T13929] hub 1-1:1.0: bad descriptor, ignoring hub [ 2931.113103][T13929] hub 1-1:1.0: probe with driver hub failed with error -5 [ 2931.126456][T13929] cdc_wdm 1-1:1.0: skipping garbage [ 2931.129196][T13929] cdc_wdm 1-1:1.0: skipping garbage [ 2931.176925][T13929] cdc_wdm 1-1:1.0: cdc-wdm0: USB WDM device [ 2931.415227][T17794] usb 1-1: USB disconnect, device number 6 [ 2942.961412][ T30] audit: type=1400 audit(2942.350:499): avc: denied { setattr } for pid=19893 comm="syz.0.8045" name="udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2957.055076][ T30] audit: type=1400 audit(2956.450:500): avc: denied { ioctl } for pid=19991 comm="syz.0.8093" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2958.333195][ T30] audit: type=1400 audit(2957.730:501): avc: denied { read } for pid=20002 comm="syz.1.8099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2969.866270][ T30] audit: type=1400 audit(2969.250:502): avc: denied { unlink } for pid=3654 comm="syz-executor" name="file4" dev="tmpfs" ino=20428 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2976.335385][ T30] audit: type=1400 audit(2975.730:503): avc: denied { read } for pid=20125 comm="syz.0.8161" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2976.337398][ T30] audit: type=1400 audit(2975.730:504): avc: denied { open } for pid=20125 comm="syz.0.8161" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2979.686333][T20159] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=20159 comm=syz.0.8176 [ 2987.293491][T20218] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=20218 comm=syz.0.8206 [ 2999.852048][T20307] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=20307 comm=syz.1.8251 [ 3006.791789][T20359] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=20359 comm=syz.0.8277 [ 3027.263313][T20504] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=20504 comm=syz.1.8348 [ 3029.975999][T20524] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20524 comm=syz.0.8357 [ 3031.185339][T20532] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20532 comm=syz.1.8362 [ 3034.804088][T20558] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20558 comm=syz.1.8376 [ 3077.171662][T20822] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1281 sclass=netlink_audit_socket pid=20822 comm=syz.1.8507 [ 3085.014136][T20858] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3085.032162][T20858] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3105.056534][ T30] audit: type=1326 audit(3104.450:505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20965 comm="syz.1.8579" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c44 code=0x0 [ 3108.031691][T20977] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=20977 comm=syz.1.8584 [ 3111.854843][T21000] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21000 comm=syz.1.8599 [ 3147.926394][T21180] random: crng reseeded on system resumption [ 3187.783692][ T30] audit: type=1400 audit(3187.140:506): avc: denied { execute } for pid=21369 comm="syz.0.8773" path="/proc/locks" dev="proc" ino=4026531996 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=file permissive=1 [ 3189.519142][T21382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=21382 comm=syz.1.8779 [ 3192.036622][T21400] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21400 comm=syz.0.8788 [ 3203.782631][T21464] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=21464 comm=syz.1.8821 [ 3222.046635][ T30] audit: type=1400 audit(3221.420:507): avc: denied { accept } for pid=21573 comm="syz.1.8875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3224.906109][ T30] audit: type=1400 audit(3224.300:508): avc: denied { read } for pid=21587 comm="syz.0.8882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3230.622728][ T30] audit: type=1400 audit(3230.010:509): avc: denied { mount } for pid=21610 comm="syz.1.8893" name="/" dev="ramfs" ino=63088 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3230.699470][ T30] audit: type=1400 audit(3230.090:510): avc: denied { remount } for pid=21610 comm="syz.1.8893" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3230.869117][ T30] audit: type=1400 audit(3230.260:511): avc: denied { unmount } for pid=3654 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 3253.665829][ T30] audit: type=1400 audit(3253.060:512): avc: denied { nlmsg_write } for pid=21701 comm="syz.0.8938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 3299.421413][ T30] audit: type=1400 audit(3298.810:513): avc: denied { setattr } for pid=21918 comm="syz.0.9045" name="RAWv6" dev="sockfs" ino=64634 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3314.094271][ T3466] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 3314.095046][ T3466] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 3314.095293][ T3466] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 3314.095460][ T3466] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 3314.095656][ T3466] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 3314.095831][ T3466] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 3314.095979][ T3466] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 3314.096152][ T3466] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 3314.096350][ T3466] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 3314.096500][ T3466] hid-generic 0002:0004:0009.0001: unknown main item tag 0x0 [ 3314.282339][ T3466] hid-generic 0002:0004:0009.0001: hidraw0: HID v0.04 Device [syz0] on syz0 [ 3317.988985][T21993] fido_id[21993]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 3328.473886][T22052] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22052 comm=syz.1.9108 [ 3362.403772][T22215] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=22215 comm=syz.1.9187 [ 3365.793057][ T30] audit: type=1400 audit(3365.180:514): avc: denied { mount } for pid=22223 comm="syz.1.9192" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3366.102159][ T30] audit: type=1400 audit(3365.460:515): avc: denied { unmount } for pid=3654 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3366.576499][ T30] audit: type=1400 audit(3365.970:516): avc: denied { mount } for pid=22229 comm="syz.0.9195" name="/" dev="pstore" ino=3304 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 3366.606884][ T30] audit: type=1400 audit(3366.000:517): avc: denied { remount } for pid=22229 comm="syz.0.9195" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 3366.952010][ T30] audit: type=1400 audit(3366.320:518): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 3429.933967][T22542] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=22542 comm=syz.0.9350 [ 3431.700664][ T30] audit: type=1326 audit(3431.090:519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22548 comm="syz.1.9354" exe="/syz-executor" sig=9 arch=40000028 syscall=403 compat=1 ip=0x125c44 code=0x0 [ 3452.711588][T22554] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 3452.911765][T22554] usb 1-1: New USB device found, idVendor=0bed, idProduct=1100, bcdDevice=ec.c3 [ 3452.913888][T22554] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3452.965619][T22554] usb 1-1: config 0 descriptor?? [ 3453.093170][T22554] cp210x 1-1:0.0: cp210x converter detected [ 3453.306982][T22554] cp210x 1-1:0.0: failed to get vendor val 0x370b size 1: -121 [ 3453.309366][T22554] cp210x 1-1:0.0: querying part number failed [ 3453.434326][T22554] usb 1-1: cp210x converter now attached to ttyUSB0 [ 3453.555480][T22580] usb 1-1: USB disconnect, device number 7 [ 3453.845990][T22580] cp210x ttyUSB0: cp210x converter now disconnected from ttyUSB0 [ 3453.931498][T22580] cp210x 1-1:0.0: device disconnected [ 3461.862505][T22693] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=22693 comm=syz.1.9421 [ 3469.006308][T22733] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1281 sclass=netlink_audit_socket pid=22733 comm=syz.0.9442 [ 3488.502614][T22833] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=22833 comm=syz.0.9494 [ 3504.051738][T22911] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22911 comm=syz.1.9527 [ 3512.702326][T22964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=22964 comm=syz.1.9555 [ 3544.324581][T23126] random: crng reseeded on system resumption [ 3555.348900][ T30] audit: type=1400 audit(3554.730:520): avc: denied { read } for pid=23185 comm="syz.0.9665" name="loop8" dev="devtmpfs" ino=645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:initctl_t:s0" [ 3555.366285][ T30] audit: type=1400 audit(3554.750:521): avc: denied { open } for pid=23185 comm="syz.0.9665" path="/dev/loop8" dev="devtmpfs" ino=645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=1 trawcon="system_u:object_r:initctl_t:s0" [ 3577.985785][T23299] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23299 comm=syz.1.9719 [ 3578.812085][T23306] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23306 comm=syz.0.9724 [ 3588.713419][T23367] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=23367 comm=syz.0.9754 [ 3680.046061][ T30] audit: type=1400 audit(3679.440:522): avc: denied { connect } for pid=23699 comm="syz.1.9917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3681.757757][T23710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=23710 comm=syz.1.9921 [ 3698.565346][T23780] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23780 comm=syz.1.9955 [ 3777.833072][ T30] audit: type=1400 audit(3777.230:523): avc: denied { read } for pid=24131 comm="syz.0.10128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3793.327208][ T30] audit: type=1400 audit(3792.720:524): avc: denied { setattr } for pid=3320 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 3810.077677][T24227] netlink: 45 bytes leftover after parsing attributes in process `syz.1.10176'. [ 3811.523676][ T30] audit: type=1400 audit(3810.910:525): avc: denied { remount } for pid=24228 comm="syz.1.10177" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3839.901996][ T30] audit: type=1400 audit(3839.290:526): avc: denied { execute } for pid=24279 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3839.952711][ T30] audit: type=1400 audit(3839.330:527): avc: denied { execute_no_trans } for pid=24279 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3840.205007][ T30] audit: type=1400 audit(3839.590:528): avc: denied { mounton } for pid=24280 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3840.457094][T11507] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3840.813413][T11507] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3841.167269][T11507] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3841.461535][T11507] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3842.425434][ T30] audit: type=1400 audit(3841.820:529): avc: denied { read } for pid=3165 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 3846.843125][T11507] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3846.955000][T11507] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3847.068847][T11507] bond0 (unregistering): Released all slaves [ 3854.286032][T11507] hsr_slave_0: left promiscuous mode [ 3854.343670][T11507] hsr_slave_1: left promiscuous mode [ 3854.739002][T11507] veth1_macvtap: left promiscuous mode [ 3854.765795][T11507] veth0_macvtap: left promiscuous mode [ 3854.785990][T11507] veth1_vlan: left promiscuous mode [ 3854.787652][T11507] veth0_vlan: left promiscuous mode [ 3860.416249][ T26] smc: removing ib device syz1 [ 3866.565090][T17794] ================================================================== [ 3866.566337][T17794] BUG: KASAN: slab-use-after-free in __ethtool_get_link_ksettings+0x13c/0x164 [ 3866.567885][T17794] Read of size 8 at addr ffff0000206ea2e8 by task kworker/0:2/17794 [ 3866.568005][T17794] [ 3866.569270][T17794] CPU: 0 UID: 0 PID: 17794 Comm: kworker/0:2 Not tainted syzkaller #0 PREEMPT [ 3866.569542][T17794] Hardware name: linux,dummy-virt (DT) [ 3866.569980][T17794] Workqueue: events smc_ib_port_event_work [ 3866.570828][T17794] Call trace: [ 3866.571220][T17794] show_stack+0x18/0x24 (C) [ 3866.571526][T17794] dump_stack_lvl+0xa4/0xf4 [ 3866.571657][T17794] print_report+0xf4/0x5a0 [ 3866.571781][T17794] kasan_report+0xc8/0x108 [ 3866.571882][T17794] __asan_report_load8_noabort+0x20/0x2c [ 3866.571975][T17794] __ethtool_get_link_ksettings+0x13c/0x164 [ 3866.572095][T17794] ipvlan_ethtool_get_link_ksettings+0x34/0x54 [ 3866.572198][T17794] __ethtool_get_link_ksettings+0xd4/0x164 [ 3866.572339][T17794] ib_get_eth_speed+0xe8/0x908 [ 3866.572451][T17794] rxe_query_port+0xec/0x298 [ 3866.572558][T17794] ib_query_port+0x300/0x5f4 [ 3866.572659][T17794] smc_ib_port_event_work+0x104/0x8f8 [ 3866.572751][T17794] process_one_work+0x7cc/0x18d4 [ 3866.572856][T17794] worker_thread+0x734/0xb84 [ 3866.572953][T17794] kthread+0x348/0x5fc [ 3866.573155][T17794] ret_from_fork+0x10/0x20 [ 3866.573610][T17794] [ 3866.573710][T17794] Allocated by task 3320: [ 3866.574177][T17794] kasan_save_stack+0x3c/0x64 [ 3866.574351][T17794] kasan_save_track+0x20/0x3c [ 3866.574448][T17794] kasan_save_alloc_info+0x40/0x54 [ 3866.574528][T17794] __kasan_kmalloc+0xb8/0xbc [ 3866.574615][T17794] __kvmalloc_node_noprof+0x268/0x648 [ 3866.574696][T17794] alloc_netdev_mqs+0x6c/0xfc4 [ 3866.574789][T17794] rtnl_create_link+0x904/0xc18 [ 3866.574866][T17794] rtnl_newlink+0x9bc/0x1810 [ 3866.574940][T17794] rtnetlink_rcv_msg+0x65c/0x8d4 [ 3866.575015][T17794] netlink_rcv_skb+0x19c/0x338 [ 3866.575127][T17794] rtnetlink_rcv+0x18/0x24 [ 3866.575205][T17794] netlink_unicast+0x424/0x700 [ 3866.575289][T17794] netlink_sendmsg+0x644/0xa54 [ 3866.575372][T17794] __sock_sendmsg+0xc8/0x168 [ 3866.575462][T17794] __sys_sendto+0x1d8/0x270 [ 3866.575536][T17794] __arm64_sys_sendto+0xc0/0x134 [ 3866.575607][T17794] invoke_syscall+0x6c/0x258 [ 3866.575693][T17794] el0_svc_common.constprop.0+0xac/0x230 [ 3866.575771][T17794] do_el0_svc_compat+0x40/0x68 [ 3866.575848][T17794] el0_svc_compat+0x4c/0x184 [ 3866.575934][T17794] el0t_32_sync_handler+0x88/0xac [ 3866.576013][T17794] el0t_32_sync+0x19c/0x1a0 [ 3866.576163][T17794] [ 3866.576287][T17794] Freed by task 11507: [ 3866.576388][T17794] kasan_save_stack+0x3c/0x64 [ 3866.576486][T17794] kasan_save_track+0x20/0x3c [ 3866.576568][T17794] kasan_save_free_info+0x4c/0x74 [ 3866.576643][T17794] __kasan_slab_free+0x58/0x78 [ 3866.576720][T17794] kfree+0x1bc/0x444 [ 3866.576790][T17794] kvfree+0x3c/0x4c [ 3866.576861][T17794] netdev_release+0x70/0x98 [ 3866.576942][T17794] device_release+0xe4/0x1e8 [ 3866.577035][T17794] kobject_put+0x17c/0x430 [ 3866.577136][T17794] netdev_run_todo+0x570/0xd38 [ 3866.577213][T17794] rtnl_unlock+0x10/0x1c [ 3866.577287][T17794] default_device_exit_batch+0x614/0x888 [ 3866.577363][T17794] ops_undo_list+0x31c/0x71c [ 3866.577442][T17794] cleanup_net+0x31c/0x724 [ 3866.577518][T17794] process_one_work+0x7cc/0x18d4 [ 3866.577608][T17794] worker_thread+0x734/0xb84 [ 3866.577691][T17794] kthread+0x348/0x5fc [ 3866.577769][T17794] ret_from_fork+0x10/0x20 [ 3866.577878][T17794] [ 3866.578012][T17794] The buggy address belongs to the object at ffff0000206ea000 [ 3866.578012][T17794] which belongs to the cache kmalloc-cg-4k of size 4096 [ 3866.578208][T17794] The buggy address is located 744 bytes inside of [ 3866.578208][T17794] freed 4096-byte region [ffff0000206ea000, ffff0000206eb000) [ 3866.578312][T17794] [ 3866.578480][T17794] The buggy address belongs to the physical page: [ 3866.579572][T17794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x606e8 [ 3866.579999][T17794] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 3866.580251][T17794] flags: 0x1ffc00000000040(head|node=0|zone=0|lastcpupid=0x7ff) [ 3866.581129][T17794] page_type: f5(slab) [ 3866.581806][T17794] raw: 01ffc00000000040 ffff00000dc0b500 dead000000000100 dead000000000122 [ 3866.581913][T17794] raw: 0000000000000000 0000000000040004 00000000f5000000 0000000000000000 [ 3866.582124][T17794] head: 01ffc00000000040 ffff00000dc0b500 dead000000000100 dead000000000122 [ 3866.582200][T17794] head: 0000000000000000 0000000000040004 00000000f5000000 0000000000000000 [ 3866.582272][T17794] head: 01ffc00000000003 fffffdffc081ba01 00000000ffffffff 00000000ffffffff [ 3866.582348][T17794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 3866.582489][T17794] page dumped because: kasan: bad access detected [ 3866.582568][T17794] [ 3866.582629][T17794] Memory state around the buggy address: [ 3866.583192][T17794] ffff0000206ea180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3866.583328][T17794] ffff0000206ea200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3866.583431][T17794] >ffff0000206ea280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3866.583532][T17794] ^ [ 3866.583621][T17794] ffff0000206ea300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3866.583689][T17794] ffff0000206ea380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 3866.583855][T17794] ================================================================== [ 3866.704595][ T30] audit: type=1400 audit(3866.070:530): avc: denied { write } for pid=3315 comm="syz-executor" path="pipe:[3534]" dev="pipefs" ino=3534 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 3866.704983][T17794] Disabling lock debugging due to kernel taint SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 3870.507751][T11507] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3870.768063][T11507] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3871.083937][T11507] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3871.257384][T11507] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3873.301897][T11507] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3873.367071][T11507] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3873.417357][T11507] bond0 (unregistering): Released all slaves [ 3873.945842][T11507] hsr_slave_0: left promiscuous mode [ 3873.956908][T11507] hsr_slave_1: left promiscuous mode [ 3874.004394][T11507] veth1_macvtap: left promiscuous mode [ 3874.005192][T11507] veth0_macvtap: left promiscuous mode [ 3874.010552][T11507] veth1_vlan: left promiscuous mode [ 3874.012300][T11507] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 05:47:46 Registers: info registers vcpu 0 CPU#0 PC=ffff8000814a08d8 X00=0000000000000000 X01=ffff00001bf70698 X02=0000000000000000 X03=1fffe00001da83c9 X04=00000000f4b80ea3 X05=0000000000000000 X06=ffff00000ed42970 X07=ff1d6d071acae078 X08=0000000000000000 X09=ffff8000897e6000 X10=ffff00000ed428d0 X11=0000000000000002 X12=0000000000000006 X13=0000000000000000 X14=1fffe0000271fc65 X15=ffff000013947dc0 X16=0000000000000000 X17=1fffe0000271fb78 X18=1fffe00003d3a203 X19=ffff00001e85dc00 X20=0000000000000000 X21=0000000000000000 X22=ffff80008d4809c0 X23=0000000000000000 X24=0000000000000000 X25=1fffe000037ee0d3 X26=1fffe0000271fbd7 X27=ffff0000138fd940 X28=ffff0000138fdeb8 X29=ffff8000800069f0 X30=ffff800080398148 SP=ffff8000800069f0 PSTATE=80000005 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=2e2e2e2e2e2e2e2e:2e2e2e2e2e2e2e2e Q01=360074696d696c5f:706f682f30687465 Q02=00cc000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:0c00000000000000 Q06=0000ffffc992d1ce:0000ffffc992d1c0 Q07=0000ffffc992d1e9:0000ffffc992d1db Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc993c2c0:0000ffffc993c2c0 Q17=ffffff80ffffffd8:0000ffffc993c290 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000854424d0 X00=ffff00006a0c1f98 X01=0000000000000000 X02=0000000000000000 X03=dfff800000000000 X04=1fffe00001c51001 X05=ffff80008d4e7b00 X06=ffff700011a9cf60 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011a9cf60 X11=1ffff00011a9cf60 X12=ffff700011a9cf61 X13=0000000000000000 X14=00004c4b40000000 X15=0000000000000000 X16=ffff80008d4e0000 X17=ffff7fffe3003000 X18=0000000000000000 X19=ffff8000873536b0 X20=ffff00000e288000 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff800087353680 X25=0000000000000000 X26=0000000000000004 X27=ffff8000873536b0 X28=00000000000010c0 X29=ffff80008d4e7aa0 X30=ffff800080438d74 SP=ffff80008d4e7aa0 PSTATE=000000c5 ---- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000