last executing test programs: 25m31.717884943s ago: executing program 0 (id=2692): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) io_uring_setup(0x40c7, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, 0x0, 0x0) 25m31.180052904s ago: executing program 0 (id=2694): openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x5421, &(0x7f00000001c0)) 25m30.569226558s ago: executing program 0 (id=2696): r0 = socket$inet_tcp(0x2, 0x1, 0x0) close(0xffffffffffffffff) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x5450, 0x0) 25m30.001422111s ago: executing program 0 (id=2698): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) 25m29.629029095s ago: executing program 0 (id=2700): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000940)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000001a40)=@abs={0x1}, 0x6e) listen(r0, 0x0) 25m28.406259324s ago: executing program 0 (id=2702): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_FLUSH_PMKSA(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x4) 25m28.406137334s ago: executing program 32 (id=2702): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_FLUSH_PMKSA(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x81}, 0x4) 23m45.11685195s ago: executing program 1 (id=2893): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000240)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x41) 23m44.816681912s ago: executing program 1 (id=2894): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCGDEV(r1, 0x80045432, 0x0) 23m44.396423639s ago: executing program 1 (id=2895): r0 = openat$sequencer2(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r1, 0xc00464b4, 0x0) 23m44.049187883s ago: executing program 1 (id=2896): r0 = openat$sequencer2(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, 0x0) 23m43.488195895s ago: executing program 1 (id=2898): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x1e80c2, 0x0) 23m42.886651539s ago: executing program 1 (id=2900): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8040) 22m56.490303203s ago: executing program 33 (id=2900): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x8040) 20m31.767587636s ago: executing program 2 (id=3257): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000000), 0x4, 0x0) 20m29.708698418s ago: executing program 2 (id=3263): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) write$cgroup_devices(r1, 0x0, 0x0) 20m29.339659603s ago: executing program 2 (id=3264): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) 20m28.971248527s ago: executing program 2 (id=3266): socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) write$fb(r2, 0x0, 0x0) 20m28.680041149s ago: executing program 2 (id=3268): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)=0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) 20m28.260978005s ago: executing program 2 (id=3270): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x318}}, 0x0) 19m43.042128523s ago: executing program 34 (id=3270): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) sendmsg$NFQNL_MSG_VERDICT(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x318}}, 0x0) 6.49845836s ago: executing program 3 (id=6381): mkdir(&(0x7f0000000340)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) symlink(&(0x7f0000000080)='./file0/../file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00') 3.691990402s ago: executing program 3 (id=6391): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) rename(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)='./file0\x00') 3.019019839s ago: executing program 3 (id=6394): r0 = eventfd(0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 2.312076827s ago: executing program 3 (id=6397): r0 = openat$mixer(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, 0x0) 1.940244292s ago: executing program 4 (id=6398): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000580)=0x80) r2 = dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4c8c0}, 0x40) 1.806628527s ago: executing program 3 (id=6399): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount$tmpfs(0x0, &(0x7f0000000bc0)='./file0\x00', 0x0, 0x20000, 0x0) 1.468926691s ago: executing program 4 (id=6400): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r0) dup2(r0, r1) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 1.318772477s ago: executing program 3 (id=6401): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000a80)={0x48, r1, 0x1, 0xfffffffe, 0x0, {}, [@NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}, {0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r2}}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xfb2e77a8993c191f}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffff}]}, 0x48}}, 0x20000000) 1.106778045s ago: executing program 4 (id=6402): r0 = open(&(0x7f0000000080)='./file1\x00', 0x2040, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$sequencer2(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, 0x0) 716.600601ms ago: executing program 4 (id=6403): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.empty_time\x00', 0x275a, 0x0) dup3(r0, r1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x43, 0x0, &(0x7f0000000000)) 387.943174ms ago: executing program 4 (id=6404): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200c2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000005c0)={0x14, 0x0, 0x200, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x10040010}, 0x4004000) 0s ago: executing program 4 (id=6405): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x4, 0x70bd25, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x24044044}, 0x1e3155815e99245c) syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), r0) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:32018' (ED25519) to the list of known hosts. [ 211.341927][ T30] audit: type=1400 audit(210.870:46): avc: denied { name_bind } for pid=3313 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 211.827146][ T30] audit: type=1400 audit(211.360:47): avc: denied { execute } for pid=3314 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 211.839938][ T30] audit: type=1400 audit(211.370:48): avc: denied { execute_no_trans } for pid=3314 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 218.404432][ T30] audit: type=1400 audit(217.930:49): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 218.419072][ T30] audit: type=1400 audit(217.950:50): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 218.462734][ T3314] cgroup: Unknown subsys name 'net' [ 218.495317][ T30] audit: type=1400 audit(218.030:51): avc: denied { unmount } for pid=3314 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 218.801236][ T3314] cgroup: Unknown subsys name 'cpuset' [ 218.853880][ T3314] cgroup: Unknown subsys name 'rlimit' [ 219.169148][ T30] audit: type=1400 audit(218.700:52): avc: denied { setattr } for pid=3314 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 219.183797][ T30] audit: type=1400 audit(218.710:53): avc: denied { mounton } for pid=3314 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 219.188697][ T30] audit: type=1400 audit(218.710:54): avc: denied { mount } for pid=3314 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 220.019864][ T3316] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 220.032910][ T30] audit: type=1400 audit(219.560:55): avc: denied { relabelto } for pid=3316 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 220.051498][ T30] audit: type=1400 audit(219.580:56): avc: denied { write } for pid=3316 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 220.224022][ T30] audit: type=1400 audit(219.760:57): avc: denied { read } for pid=3314 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 220.227078][ T30] audit: type=1400 audit(219.760:58): avc: denied { open } for pid=3314 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 220.268454][ T3314] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 247.569848][ T30] audit: type=1400 audit(247.100:59): avc: denied { execmem } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 247.658013][ T30] audit: type=1400 audit(247.190:60): avc: denied { read } for pid=3319 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 247.665483][ T30] audit: type=1400 audit(247.200:61): avc: denied { open } for pid=3319 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 247.679240][ T30] audit: type=1400 audit(247.210:62): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 247.744799][ T30] audit: type=1400 audit(247.280:63): avc: denied { module_request } for pid=3319 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 247.749588][ T30] audit: type=1400 audit(247.280:64): avc: denied { module_request } for pid=3320 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 247.939335][ T30] audit: type=1400 audit(247.470:65): avc: denied { sys_module } for pid=3320 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 255.988990][ T3320] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.009427][ T3319] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 256.034186][ T3320] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 256.069005][ T3319] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 259.638658][ T3319] hsr_slave_0: entered promiscuous mode [ 259.656698][ T3319] hsr_slave_1: entered promiscuous mode [ 260.164810][ T3320] hsr_slave_0: entered promiscuous mode [ 260.176034][ T3320] hsr_slave_1: entered promiscuous mode [ 260.186658][ T3320] debugfs: 'hsr0' already exists in 'hsr' [ 260.188848][ T3320] Cannot create hsr debugfs directory [ 262.736961][ T30] audit: type=1400 audit(262.270:66): avc: denied { create } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 262.782278][ T30] audit: type=1400 audit(262.300:67): avc: denied { write } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 262.783155][ T30] audit: type=1400 audit(262.310:68): avc: denied { read } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 262.842334][ T3319] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 262.963422][ T3319] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 263.003871][ T3319] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 263.032051][ T3319] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 263.744731][ T3320] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 263.798938][ T3320] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 264.046494][ T3320] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 264.124098][ T3320] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 267.623090][ T3319] 8021q: adding VLAN 0 to HW filter on device bond0 [ 267.951788][ T3320] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.788618][ T3319] veth0_vlan: entered promiscuous mode [ 278.972999][ T3319] veth1_vlan: entered promiscuous mode [ 279.069147][ T3320] veth0_vlan: entered promiscuous mode [ 279.206654][ T3320] veth1_vlan: entered promiscuous mode [ 279.402935][ T3319] veth0_macvtap: entered promiscuous mode [ 279.546721][ T3319] veth1_macvtap: entered promiscuous mode [ 279.742458][ T3320] veth0_macvtap: entered promiscuous mode [ 279.876354][ T3320] veth1_macvtap: entered promiscuous mode [ 280.127787][ T1241] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.212801][ T722] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.213807][ T722] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.214583][ T722] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.986246][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.986741][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.987076][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.987208][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 281.229986][ T30] audit: type=1400 audit(280.760:69): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 281.277967][ T30] audit: type=1400 audit(280.800:70): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzkaller.qshiBl/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 281.303485][ T30] audit: type=1400 audit(280.830:71): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 281.337576][ T30] audit: type=1400 audit(280.870:72): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzkaller.qshiBl/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 281.352429][ T30] audit: type=1400 audit(280.880:73): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/syzkaller.qshiBl/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4418 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 281.421362][ T30] audit: type=1400 audit(280.950:74): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 281.509498][ T30] audit: type=1400 audit(281.040:75): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 281.611585][ T30] audit: type=1400 audit(281.130:76): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="gadgetfs" ino=3601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 281.702540][ T30] audit: type=1400 audit(281.230:77): avc: denied { mount } for pid=3319 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 281.708128][ T30] audit: type=1400 audit(281.240:78): avc: denied { mounton } for pid=3319 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 282.015751][ T3319] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 289.805904][ T3505] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3505 comm=syz.0.18 [ 293.659469][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 293.685680][ T30] audit: type=1400 audit(293.190:83): avc: denied { execute } for pid=3530 comm="syz.1.31" name="file0" dev="tmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 305.590965][ T30] audit: type=1400 audit(305.110:84): avc: denied { mounton } for pid=3615 comm="syz.1.72" path="/32/file1" dev="tmpfs" ino=182 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 305.755486][ T30] audit: type=1400 audit(305.270:85): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 312.424940][ T3652] capability: warning: `syz.0.89' uses deprecated v2 capabilities in a way that may be insecure [ 317.261398][ T30] audit: type=1400 audit(316.790:86): avc: denied { name_bind } for pid=3686 comm="syz.1.106" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 317.265514][ T30] audit: type=1400 audit(316.800:87): avc: denied { node_bind } for pid=3686 comm="syz.1.106" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 319.933835][ T3710] Zero length message leads to an empty skb [ 320.190891][ T30] audit: type=1400 audit(319.720:88): avc: denied { write } for pid=3713 comm="syz.1.119" name="arp" dev="proc" ino=4026532702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 334.998524][ T30] audit: type=1400 audit(334.530:89): avc: denied { write } for pid=3828 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 339.667020][ T30] audit: type=1400 audit(339.200:90): avc: denied { create } for pid=3865 comm="syz.1.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 339.727514][ T30] audit: type=1400 audit(339.260:91): avc: denied { setopt } for pid=3865 comm="syz.1.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 339.811501][ T30] audit: type=1400 audit(339.340:92): avc: denied { write } for pid=3865 comm="syz.1.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 341.444428][ T3878] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3878 comm=syz.0.200 [ 346.322708][ T30] audit: type=1400 audit(345.850:93): avc: denied { create } for pid=3901 comm="syz.1.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 350.962393][ T30] audit: type=1400 audit(350.490:94): avc: denied { mount } for pid=3933 comm="syz.1.226" name="/" dev="autofs" ino=6157 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 351.040080][ T30] audit: type=1400 audit(350.550:95): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 352.901982][ T30] audit: type=1400 audit(352.430:96): avc: denied { prog_load } for pid=3944 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 352.928670][ T30] audit: type=1400 audit(352.430:97): avc: denied { bpf } for pid=3944 comm="syz.0.232" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 352.991974][ T30] audit: type=1400 audit(352.520:98): avc: denied { map_create } for pid=3944 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 353.054596][ T30] audit: type=1400 audit(352.590:99): avc: denied { map_read map_write } for pid=3944 comm="syz.0.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 354.689819][ T30] audit: type=1400 audit(354.220:100): avc: denied { read write } for pid=3955 comm="syz.1.237" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 354.697000][ T30] audit: type=1400 audit(354.230:101): avc: denied { open } for pid=3955 comm="syz.1.237" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 358.145472][ T30] audit: type=1400 audit(357.660:102): avc: denied { ioctl } for pid=3982 comm="syz.1.250" path="socket:[5558]" dev="sockfs" ino=5558 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 364.973801][ T30] audit: type=1400 audit(364.510:103): avc: denied { perfmon } for pid=4030 comm="syz.0.272" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 365.061696][ T30] audit: type=1400 audit(364.590:104): avc: denied { prog_run } for pid=4030 comm="syz.0.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 365.134554][ T30] audit: type=1400 audit(364.670:105): avc: denied { create } for pid=4030 comm="syz.0.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 365.149416][ T30] audit: type=1400 audit(364.680:106): avc: denied { setopt } for pid=4030 comm="syz.0.272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 366.096795][ T30] audit: type=1400 audit(365.630:107): avc: denied { create } for pid=4040 comm="syz.0.277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 366.851741][ T30] audit: type=1400 audit(366.380:108): avc: denied { read write } for pid=4048 comm="syz.0.281" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 366.856376][ T30] audit: type=1400 audit(366.380:109): avc: denied { open } for pid=4048 comm="syz.0.281" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 366.896470][ T30] audit: type=1400 audit(366.430:110): avc: denied { ioctl } for pid=4048 comm="syz.0.281" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 366.922825][ T4050] input: syz0 as /devices/virtual/input/input1 [ 372.075957][ T4082] capability: warning: `syz.0.296' uses 32-bit capabilities (legacy support in use) [ 393.822911][ T30] audit: type=1400 audit(393.320:111): avc: denied { create } for pid=4240 comm="syz.1.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 393.862956][ T30] audit: type=1400 audit(393.400:112): avc: denied { write } for pid=4240 comm="syz.1.373" path="socket:[5988]" dev="sockfs" ino=5988 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 407.049514][ T4346] process 'syz.1.427' launched './file1' with NULL argv: empty string added [ 407.096425][ T30] audit: type=1400 audit(406.630:113): avc: denied { execute_no_trans } for pid=4345 comm="syz.1.427" path="/206/file1" dev="tmpfs" ino=1071 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 415.632634][ T30] audit: type=1400 audit(415.160:114): avc: denied { allowed } for pid=4388 comm="syz.1.448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 415.694991][ T30] audit: type=1400 audit(415.220:115): avc: denied { create } for pid=4388 comm="syz.1.448" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 422.085934][ T30] audit: type=1400 audit(421.620:116): avc: denied { write } for pid=4420 comm="syz.0.464" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 422.088119][ T30] audit: type=1400 audit(421.620:117): avc: denied { open } for pid=4420 comm="syz.0.464" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 422.107313][ T30] audit: type=1400 audit(421.640:118): avc: denied { ioctl } for pid=4420 comm="syz.0.464" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 425.575569][ T30] audit: type=1400 audit(425.110:119): avc: denied { setopt } for pid=4446 comm="syz.1.477" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 425.609930][ T30] audit: type=1400 audit(425.140:120): avc: denied { create } for pid=4447 comm="syz.0.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 425.692945][ T30] audit: type=1400 audit(425.220:121): avc: denied { connect } for pid=4447 comm="syz.0.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 426.245130][ T30] audit: type=1400 audit(425.750:122): avc: denied { write } for pid=4447 comm="syz.0.478" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 426.505150][ T30] audit: type=1400 audit(426.040:123): avc: denied { read } for pid=4455 comm="syz.1.481" name="userfaultfd" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 426.509147][ T30] audit: type=1400 audit(426.040:124): avc: denied { open } for pid=4455 comm="syz.1.481" path="/dev/userfaultfd" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 428.502825][ T30] audit: type=1400 audit(428.030:125): avc: denied { create } for pid=4467 comm="syz.1.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 439.869824][ T30] audit: type=1400 audit(439.400:126): avc: denied { read } for pid=4553 comm="syz.0.529" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 439.876959][ T30] audit: type=1400 audit(439.410:127): avc: denied { open } for pid=4553 comm="syz.0.529" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 447.482506][ T4604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=4604 comm=syz.0.554 [ 450.877623][ T30] audit: type=1400 audit(450.390:128): avc: denied { open } for pid=4629 comm="syz.1.567" path="/dev/ptyq7" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 452.710011][ T30] audit: type=1400 audit(452.240:129): avc: denied { read } for pid=4642 comm="syz.1.574" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 452.720026][ T30] audit: type=1400 audit(452.250:130): avc: denied { open } for pid=4642 comm="syz.1.574" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 454.187487][ T30] audit: type=1400 audit(453.690:131): avc: denied { mounton } for pid=4653 comm="syz.0.579" path="/279/file0" dev="tmpfs" ino=1447 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 454.195036][ T30] audit: type=1400 audit(453.720:132): avc: denied { mount } for pid=4653 comm="syz.0.579" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 454.239512][ T30] audit: type=1400 audit(453.770:133): avc: denied { remount } for pid=4653 comm="syz.0.579" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 454.348093][ T30] audit: type=1400 audit(453.880:134): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 470.147970][ T30] audit: type=1400 audit(469.680:135): avc: denied { ioctl } for pid=4755 comm="syz.1.630" path="socket:[7880]" dev="sockfs" ino=7880 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 481.316589][ T30] audit: type=1400 audit(480.850:136): avc: denied { associate } for pid=4837 comm="syz.1.669" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 485.183841][ T30] audit: type=1400 audit(484.710:137): avc: denied { read write } for pid=4871 comm="syz.1.686" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 485.203643][ T30] audit: type=1400 audit(484.730:138): avc: denied { open } for pid=4871 comm="syz.1.686" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 485.306196][ T30] audit: type=1400 audit(484.830:139): avc: denied { setattr } for pid=4871 comm="syz.1.686" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 485.813131][ T30] audit: type=1400 audit(485.350:140): avc: denied { create } for pid=4874 comm="syz.0.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 486.455855][ T30] audit: type=1400 audit(485.990:141): avc: denied { create } for pid=4882 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 486.472630][ T30] audit: type=1400 audit(486.010:142): avc: denied { write } for pid=4882 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 486.476303][ T30] audit: type=1400 audit(486.010:143): avc: denied { read } for pid=4882 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 489.321241][ T30] audit: type=1400 audit(488.850:144): avc: denied { create } for pid=4906 comm="syz.1.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 489.343624][ T30] audit: type=1400 audit(488.880:145): avc: denied { connect } for pid=4906 comm="syz.1.704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 493.628303][ T30] audit: type=1400 audit(493.160:146): avc: denied { write } for pid=4942 comm="syz.0.722" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 493.667177][ T30] audit: type=1400 audit(493.200:147): avc: denied { ioctl } for pid=4942 comm="syz.0.722" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 493.805210][ T30] audit: type=1400 audit(493.340:148): avc: denied { read } for pid=4944 comm="syz.1.723" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 493.807773][ T30] audit: type=1400 audit(493.340:149): avc: denied { open } for pid=4944 comm="syz.1.723" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 493.833756][ T30] audit: type=1400 audit(493.360:150): avc: denied { ioctl } for pid=4944 comm="syz.1.723" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x1262 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 494.046334][ T3407] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 494.231878][ T3407] usb 1-1: Using ep0 maxpacket: 32 [ 494.386698][ T3407] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 494.393768][ T3407] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 494.396878][ T3407] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 494.403513][ T3407] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 494.405873][ T3407] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 494.408792][ T3407] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 494.411592][ T3407] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 494.485684][ T3407] usb 1-1: config 0 descriptor?? [ 494.867170][ T3407] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 2 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 497.274820][ T30] audit: type=1400 audit(496.810:151): avc: denied { write } for pid=4962 comm="syz.1.732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 497.282454][ T30] audit: type=1400 audit(496.810:152): avc: denied { nlmsg_read } for pid=4962 comm="syz.1.732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 497.293059][ T30] audit: type=1400 audit(496.820:153): avc: denied { read } for pid=4962 comm="syz.1.732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 504.909041][ T1911] usb 1-1: USB disconnect, device number 2 [ 505.146018][ T1911] usblp0: removed [ 511.193346][ T30] audit: type=1400 audit(510.730:154): avc: denied { create } for pid=5061 comm="syz.1.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 511.209269][ T30] audit: type=1400 audit(510.740:155): avc: denied { read } for pid=5061 comm="syz.1.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 516.621794][ T30] audit: type=1400 audit(516.150:156): avc: denied { read write } for pid=5097 comm="syz.1.798" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 516.631187][ T30] audit: type=1400 audit(516.150:157): avc: denied { open } for pid=5097 comm="syz.1.798" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 516.739158][ T30] audit: type=1400 audit(516.270:158): avc: denied { ioctl } for pid=5097 comm="syz.1.798" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0x552d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 517.347936][ T30] audit: type=1400 audit(516.880:159): avc: denied { ioctl } for pid=5101 comm="syz.0.800" path="socket:[9582]" dev="sockfs" ino=9582 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 520.304701][ T5126] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 520.327394][ T30] audit: type=1400 audit(519.860:160): avc: denied { ioctl } for pid=5124 comm="syz.1.811" path="socket:[9047]" dev="sockfs" ino=9047 ioctlcmd=0x89f6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 525.425750][ T30] audit: type=1400 audit(524.950:161): avc: denied { create } for pid=5164 comm="syz.0.831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 525.456998][ T30] audit: type=1400 audit(524.990:162): avc: denied { write } for pid=5164 comm="syz.0.831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 525.457577][ T30] audit: type=1400 audit(524.990:163): avc: denied { read } for pid=5164 comm="syz.0.831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 530.035557][ T30] audit: type=1400 audit(529.570:164): avc: denied { bind } for pid=5196 comm="syz.0.846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 530.055783][ T30] audit: type=1400 audit(529.570:165): avc: denied { node_bind } for pid=5196 comm="syz.0.846" saddr=127.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 532.523850][ T5212] netlink: 56 bytes leftover after parsing attributes in process `syz.0.852'. [ 532.553288][ T5212] netlink: 56 bytes leftover after parsing attributes in process `syz.0.852'. [ 533.265146][ T30] audit: type=1400 audit(532.790:166): avc: denied { create } for pid=5215 comm="syz.0.855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 533.324686][ T30] audit: type=1400 audit(532.860:167): avc: denied { write } for pid=5215 comm="syz.0.855" path="socket:[9750]" dev="sockfs" ino=9750 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 534.311665][ T30] audit: type=1400 audit(533.840:168): avc: denied { read } for pid=5224 comm="syz.0.860" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 534.331930][ T30] audit: type=1400 audit(533.840:169): avc: denied { open } for pid=5224 comm="syz.0.860" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 534.344411][ T30] audit: type=1400 audit(533.880:170): avc: denied { ioctl } for pid=5224 comm="syz.0.860" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 541.806066][ T5269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5269 comm=syz.1.881 [ 545.215441][ T30] audit: type=1400 audit(544.750:171): avc: denied { connect } for pid=5290 comm="syz.0.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 552.924925][ T30] audit: type=1400 audit(552.450:172): avc: denied { append } for pid=5346 comm="syz.1.920" name="system" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 557.457300][ T30] audit: type=1400 audit(556.990:173): avc: denied { write } for pid=5379 comm="syz.1.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 558.093326][ T30] audit: type=1400 audit(557.630:174): avc: denied { name_bind } for pid=5385 comm="syz.0.938" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 558.781875][ T30] audit: type=1400 audit(558.290:175): avc: denied { create } for pid=5389 comm="syz.0.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 558.782635][ T30] audit: type=1400 audit(558.310:176): avc: denied { write } for pid=5389 comm="syz.0.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 562.503170][ T30] audit: type=1400 audit(562.040:177): avc: denied { block_suspend } for pid=5416 comm="syz.0.953" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 565.453897][ T5445] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 565.507110][ T30] audit: type=1400 audit(565.040:178): avc: denied { connect } for pid=5442 comm="syz.0.966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 571.069209][ T30] audit: type=1400 audit(570.600:179): avc: denied { setopt } for pid=5477 comm="syz.0.982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 576.231843][ T30] audit: type=1400 audit(575.760:180): avc: denied { create } for pid=5519 comm="syz.1.1002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 595.352141][ T30] audit: type=1400 audit(594.880:181): avc: denied { bind } for pid=5664 comm="syz.1.1073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 595.375956][ T30] audit: type=1400 audit(594.910:182): avc: denied { setopt } for pid=5664 comm="syz.1.1073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 608.581896][ T30] audit: type=1400 audit(608.110:183): avc: denied { relabelfrom } for pid=5755 comm="syz.1.1117" name="NETLINK" dev="sockfs" ino=11059 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 608.601746][ T30] audit: type=1400 audit(608.110:184): avc: denied { relabelto } for pid=5755 comm="syz.1.1117" name="NETLINK" dev="sockfs" ino=11059 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=netlink_audit_socket permissive=1 [ 615.026947][ T30] audit: type=1400 audit(614.560:185): avc: denied { setopt } for pid=5797 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 625.586025][ T5882] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1180'. [ 637.791937][ T30] audit: type=1400 audit(637.320:186): avc: denied { write } for pid=5965 comm="syz.1.1222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 637.828327][ T30] audit: type=1400 audit(637.360:187): avc: denied { read } for pid=5965 comm="syz.1.1222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 642.548501][ T30] audit: type=1400 audit(642.080:188): avc: denied { append } for pid=5999 comm="syz.1.1238" name="loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 648.568884][ T6042] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6042 comm=syz.1.1259 [ 660.060927][ T30] audit: type=1400 audit(659.590:189): avc: denied { setattr } for pid=6112 comm="syz.1.1294" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 689.402748][ T30] audit: type=1400 audit(688.930:190): avc: denied { setattr } for pid=6329 comm="syz.1.1400" name="" dev="pipefs" ino=13033 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 691.675911][ T30] audit: type=1400 audit(691.210:191): avc: denied { create } for pid=6343 comm="syz.1.1407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 691.723733][ T30] audit: type=1400 audit(691.260:192): avc: denied { write } for pid=6343 comm="syz.1.1407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 691.753772][ T30] audit: type=1400 audit(691.290:193): avc: denied { read } for pid=6343 comm="syz.1.1407" path="socket:[13051]" dev="sockfs" ino=13051 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 694.484289][ T6365] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1793 sclass=netlink_route_socket pid=6365 comm=syz.0.1418 [ 712.432199][ T30] audit: type=1400 audit(711.960:194): avc: denied { nlmsg_write } for pid=6495 comm="syz.1.1481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 713.159019][ T30] audit: type=1400 audit(712.690:195): avc: denied { getopt } for pid=6499 comm="syz.0.1483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 714.641775][ T30] audit: type=1400 audit(714.160:196): avc: denied { read } for pid=6507 comm="syz.0.1487" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 714.646811][ T30] audit: type=1400 audit(714.160:197): avc: denied { open } for pid=6507 comm="syz.0.1487" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 714.715026][ T30] audit: type=1400 audit(714.230:198): avc: denied { ioctl } for pid=6507 comm="syz.0.1487" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6209 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 746.862404][ T30] audit: type=1400 audit(746.380:199): avc: denied { setopt } for pid=6738 comm="syz.1.1601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 752.296463][ T30] audit: type=1400 audit(751.830:200): avc: denied { write } for pid=6777 comm="syz.1.1620" path="socket:[14763]" dev="sockfs" ino=14763 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 762.135926][ T6851] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6851 comm=syz.0.1656 [ 767.621713][ T30] audit: type=1400 audit(767.150:201): avc: denied { write } for pid=6894 comm="syz.1.1676" path="socket:[15735]" dev="sockfs" ino=15735 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 771.085911][ T30] audit: type=1400 audit(770.620:202): avc: denied { ioctl } for pid=6913 comm="syz.0.1685" path="/dev/ptyq4" dev="devtmpfs" ino=115 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 777.540899][ T30] audit: type=1400 audit(777.070:203): avc: denied { ioctl } for pid=6954 comm="syz.1.1705" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=15843 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 780.237299][ T30] audit: type=1400 audit(779.770:204): avc: denied { ioctl } for pid=6976 comm="syz.0.1716" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 781.449544][ T30] audit: type=1400 audit(780.980:205): avc: denied { append } for pid=6989 comm="syz.0.1722" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 781.463641][ T6990] usb usb1: usbfs: process 6990 (syz.0.1722) did not claim interface 0 before use [ 801.868518][ T30] audit: type=1400 audit(801.400:206): avc: denied { execute } for pid=7138 comm="syz.1.1793" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=15331 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 801.958139][ T30] audit: type=1400 audit(801.490:207): avc: denied { setopt } for pid=7138 comm="syz.1.1793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 802.666313][ T30] audit: type=1400 audit(802.200:208): avc: denied { write } for pid=7147 comm="syz.0.1797" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 802.682984][ T7148] binder: 7147:7148 ioctl 400c620e 0 returned -14 [ 815.668661][ T30] audit: type=1400 audit(815.200:209): avc: denied { name_bind } for pid=7258 comm="syz.0.1852" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 818.681915][ T30] audit: type=1400 audit(818.210:210): avc: denied { getopt } for pid=7290 comm="syz.0.1867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 827.466927][ T30] audit: type=1400 audit(827.000:211): avc: denied { setattr } for pid=7358 comm="syz.1.1900" name="" dev="pipefs" ino=2890 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 827.672498][ T7361] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7361 comm=syz.0.1901 [ 835.171300][ T30] audit: type=1400 audit(834.700:212): avc: denied { read } for pid=7416 comm="syz.1.1928" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 835.191289][ T30] audit: type=1400 audit(834.710:213): avc: denied { open } for pid=7416 comm="syz.1.1928" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 835.275428][ T30] audit: type=1400 audit(834.810:214): avc: denied { ioctl } for pid=7416 comm="syz.1.1928" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 840.296727][ T30] audit: type=1400 audit(839.830:215): avc: denied { create } for pid=7449 comm="syz.1.1944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 840.385622][ T30] audit: type=1400 audit(839.920:216): avc: denied { write } for pid=7449 comm="syz.1.1944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 841.656939][ T7459] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7459 comm=syz.1.1948 [ 841.716875][ T30] audit: type=1400 audit(841.250:217): avc: denied { read } for pid=7458 comm="syz.0.1949" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 841.721942][ T30] audit: type=1400 audit(841.250:218): avc: denied { open } for pid=7458 comm="syz.0.1949" path="net:[4026532615]" dev="nsfs" ino=4026532615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 847.728917][ T30] audit: type=1400 audit(847.260:219): avc: denied { create } for pid=7505 comm="syz.0.1971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 847.781842][ T30] audit: type=1400 audit(847.300:220): avc: denied { write } for pid=7505 comm="syz.0.1971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 850.322406][ T7525] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7525 comm=syz.1.1980 [ 851.685418][ T30] audit: type=1400 audit(851.220:221): avc: denied { unlink } for pid=3319 comm="syz-executor" name="file0" dev="tmpfs" ino=4955 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 855.947012][ T30] audit: type=1400 audit(855.480:222): avc: denied { bind } for pid=7562 comm="syz.1.1999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 855.979452][ T30] audit: type=1400 audit(855.510:223): avc: denied { write } for pid=7562 comm="syz.1.1999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 856.449769][ T7565] syz.1.2000 uses obsolete (PF_INET,SOCK_PACKET) [ 869.763032][ T7669] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7669 comm=syz.1.2050 [ 870.534073][ T30] audit: type=1400 audit(870.070:224): avc: denied { accept } for pid=7676 comm="syz.1.2054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 870.848930][ T7679] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7679 comm=syz.1.2055 [ 872.333855][ T7693] ======================================================= [ 872.333855][ T7693] WARNING: The mand mount option has been deprecated and [ 872.333855][ T7693] and is ignored by this kernel. Remove the mand [ 872.333855][ T7693] option from the mount to silence this warning. [ 872.333855][ T7693] ======================================================= [ 872.357930][ T30] audit: type=1400 audit(871.890:225): avc: denied { remount } for pid=7691 comm="syz.0.2061" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 872.453219][ T7693] option changes via remount are deprecated (pid=7691 comm=syz.0.2061) [ 873.294597][ T30] audit: type=1400 audit(872.830:226): avc: denied { bind } for pid=7696 comm="syz.0.2063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 881.021442][ T30] audit: type=1400 audit(880.550:227): avc: denied { create } for pid=7757 comm="syz.0.2094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 889.633028][ T30] audit: type=1400 audit(889.170:228): avc: denied { ioctl } for pid=7812 comm="syz.1.2121" path="socket:[18482]" dev="sockfs" ino=18482 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 889.891248][ T30] audit: type=1400 audit(889.420:229): avc: denied { ioctl } for pid=7814 comm="syz.0.2122" path="socket:[18285]" dev="sockfs" ino=18285 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 897.758945][ T30] audit: type=1400 audit(897.290:230): avc: denied { compute_member } for pid=7876 comm="syz.1.2153" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 905.013237][ T30] audit: type=1400 audit(904.540:231): avc: denied { setopt } for pid=7927 comm="syz.1.2176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 905.269244][ T30] audit: type=1400 audit(904.800:232): avc: denied { ioctl } for pid=7929 comm="syz.0.2178" path="socket:[18663]" dev="sockfs" ino=18663 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 911.283877][ T30] audit: type=1400 audit(910.820:233): avc: denied { setattr } for pid=7973 comm="syz.1.2199" name="sequencer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 912.302355][ T30] audit: type=1400 audit(911.830:234): avc: denied { write } for pid=7982 comm="syz.1.2203" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 912.573789][ T6238] hid-generic 007F:6E8D:0005.0001: item fetching failed at offset 1/5 [ 912.586714][ T6238] hid-generic 007F:6E8D:0005.0001: probe with driver hid-generic failed with error -22 [ 917.521549][ T30] audit: type=1400 audit(917.030:235): avc: denied { create } for pid=8026 comm="syz.1.2225" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 917.535428][ T30] audit: type=1400 audit(917.050:236): avc: denied { read } for pid=8026 comm="syz.1.2225" name="file2" dev="tmpfs" ino=5898 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 917.538497][ T30] audit: type=1400 audit(917.070:237): avc: denied { open } for pid=8026 comm="syz.1.2225" path="/1147/file2" dev="tmpfs" ino=5898 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 917.577428][ T30] audit: type=1400 audit(917.110:238): avc: denied { ioctl } for pid=8026 comm="syz.1.2225" path="/1147/file2" dev="tmpfs" ino=5898 ioctlcmd=0x4c07 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 917.736157][ T30] audit: type=1400 audit(917.270:239): avc: denied { unlink } for pid=3320 comm="syz-executor" name="file2" dev="tmpfs" ino=5898 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 922.814703][ T1584] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.815337][ T1584] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.815499][ T1584] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.815764][ T1584] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 948.819406][ T8257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=8257 comm=syz.1.2338 [ 956.111848][ T30] audit: type=1400 audit(955.640:240): avc: denied { setattr } for pid=8306 comm="syz.1.2361" name="RAW" dev="sockfs" ino=20147 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 975.251144][ T30] audit: type=1400 audit(974.780:241): avc: denied { read write } for pid=8432 comm="syz.1.2422" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 975.251602][ T30] audit: type=1400 audit(974.780:242): avc: denied { open } for pid=8432 comm="syz.1.2422" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 979.666571][ T30] audit: type=1400 audit(979.200:243): avc: denied { read write } for pid=3319 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 979.701522][ T30] audit: type=1400 audit(979.200:244): avc: denied { open } for pid=3319 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 979.702048][ T30] audit: type=1400 audit(979.230:245): avc: denied { ioctl } for pid=3319 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 980.618131][ T30] audit: type=1400 audit(980.150:246): avc: denied { mounton } for pid=8471 comm="syz.0.2441" path="/1184/bus" dev="tmpfs" ino=6083 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 980.739408][ T30] audit: type=1400 audit(980.270:247): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 983.594112][ T30] audit: type=1400 audit(983.120:248): avc: denied { write } for pid=8494 comm="syz.1.2453" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 984.902196][ T30] audit: type=1400 audit(984.420:249): avc: denied { execmem } for pid=8503 comm="syz.1.2457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 987.248725][ T30] audit: type=1400 audit(986.780:250): avc: denied { create } for pid=8519 comm="syz.0.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 987.299568][ T30] audit: type=1400 audit(986.830:251): avc: denied { setopt } for pid=8519 comm="syz.0.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 987.855501][ T30] audit: type=1400 audit(987.390:252): avc: denied { create } for pid=8523 comm="syz.0.2467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 987.878234][ T30] audit: type=1400 audit(987.410:253): avc: denied { read } for pid=8523 comm="syz.0.2467" path="socket:[20471]" dev="sockfs" ino=20471 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 988.314956][ T30] audit: type=1400 audit(987.850:254): avc: denied { allowed } for pid=8527 comm="syz.1.2470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 988.343487][ T30] audit: type=1400 audit(987.870:255): avc: denied { create } for pid=8527 comm="syz.1.2470" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 988.344041][ T30] audit: type=1400 audit(987.870:256): avc: denied { map } for pid=8527 comm="syz.1.2470" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 988.361552][ T30] audit: type=1400 audit(987.870:257): avc: denied { read write } for pid=8527 comm="syz.1.2470" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=20693 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 989.289197][ T30] audit: type=1400 audit(988.820:258): avc: denied { read write } for pid=8533 comm="syz.0.2472" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 989.305244][ T30] audit: type=1400 audit(988.820:259): avc: denied { open } for pid=8533 comm="syz.0.2472" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 995.258204][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 995.258668][ T30] audit: type=1400 audit(994.790:265): avc: denied { create } for pid=8577 comm="syz.0.2493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 995.276537][ T30] audit: type=1400 audit(994.810:266): avc: denied { write } for pid=8577 comm="syz.0.2493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 996.482029][ T30] audit: type=1400 audit(996.010:267): avc: denied { read } for pid=8587 comm="syz.0.2498" name="nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 996.487462][ T30] audit: type=1400 audit(996.020:268): avc: denied { open } for pid=8587 comm="syz.0.2498" path="/dev/nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 998.234031][ T30] audit: type=1400 audit(997.760:269): avc: denied { create } for pid=8598 comm="syz.0.2504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 998.241993][ T30] audit: type=1400 audit(997.770:270): avc: denied { write } for pid=8598 comm="syz.0.2504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 998.815851][ T30] audit: type=1400 audit(998.340:271): avc: denied { create } for pid=8602 comm="syz.0.2505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 999.411452][ T30] audit: type=1400 audit(998.940:272): avc: denied { write } for pid=8607 comm="syz.0.2508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 999.702079][ T8613] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8613 comm=syz.1.2510 [ 1001.985957][ T30] audit: type=1400 audit(1001.520:273): avc: denied { create } for pid=8628 comm="syz.1.2519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1002.055588][ T30] audit: type=1400 audit(1001.570:274): avc: denied { write } for pid=8628 comm="syz.1.2519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1003.162449][ T30] audit: type=1400 audit(1002.690:275): avc: denied { open } for pid=8637 comm="syz.1.2523" path="/dev/ptyq6" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 1004.560040][ T30] audit: type=1400 audit(1004.090:276): avc: denied { read } for pid=8647 comm="syz.1.2528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1004.877947][ T30] audit: type=1400 audit(1004.400:277): avc: denied { mount } for pid=8650 comm="syz.1.2529" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1005.964002][ T30] audit: type=1400 audit(1005.500:278): avc: denied { nlmsg_write } for pid=8656 comm="syz.1.2532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1011.533693][ T30] audit: type=1400 audit(1011.060:279): avc: denied { write } for pid=8693 comm="syz.1.2550" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1015.015371][ T8723] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2564'. [ 1022.838637][ T30] audit: type=1400 audit(1022.370:280): avc: denied { connect } for pid=8759 comm="syz.0.2582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1024.871367][ T30] audit: type=1400 audit(1024.400:281): avc: denied { sys_module } for pid=8775 comm="syz.0.2590" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1024.874872][ T30] audit: type=1400 audit(1024.410:282): avc: denied { module_request } for pid=8775 comm="syz.0.2590" kmod="tty-ldisc-14" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1024.933762][ T30] audit: type=1400 audit(1024.460:283): avc: denied { read } for pid=8776 comm="syz.1.2591" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1024.964206][ T30] audit: type=1400 audit(1024.480:284): avc: denied { open } for pid=8776 comm="syz.1.2591" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1025.727770][ T8782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8782 comm=syz.1.2592 [ 1028.186408][ T30] audit: type=1400 audit(1027.700:285): avc: denied { map_create } for pid=8796 comm="syz.1.2600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1028.268664][ T30] audit: type=1400 audit(1027.800:286): avc: denied { map_read map_write } for pid=8796 comm="syz.1.2600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1030.587570][ T30] audit: type=1400 audit(1030.120:287): avc: denied { execute } for pid=8820 comm="syz.1.2612" path="/dev/dsp" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 1031.305184][ T30] audit: type=1400 audit(1030.840:288): avc: denied { create } for pid=8824 comm="syz.1.2614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1031.373664][ T30] audit: type=1400 audit(1030.910:289): avc: denied { write } for pid=8824 comm="syz.1.2614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1031.375672][ T30] audit: type=1400 audit(1030.910:290): avc: denied { nlmsg_read } for pid=8824 comm="syz.1.2614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1031.405500][ T30] audit: type=1400 audit(1030.940:291): avc: denied { read } for pid=8824 comm="syz.1.2614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1032.125029][ T30] audit: type=1400 audit(1031.650:292): avc: denied { create } for pid=8830 comm="syz.0.2617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1032.199489][ T30] audit: type=1400 audit(1031.730:293): avc: denied { setopt } for pid=8830 comm="syz.0.2617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1032.959388][ T30] audit: type=1400 audit(1032.490:294): avc: denied { read } for pid=8838 comm="syz.0.2620" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1035.316376][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1035.331692][ T30] audit: type=1400 audit(1034.850:297): avc: denied { search } for pid=8852 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1035.332626][ T30] audit: type=1400 audit(1034.860:298): avc: denied { search } for pid=8852 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=630 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1035.333253][ T30] audit: type=1400 audit(1034.860:299): avc: denied { search } for pid=8852 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=796 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1035.333433][ T30] audit: type=1400 audit(1034.860:300): avc: denied { search } for pid=8852 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=797 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1035.611067][ T30] audit: type=1400 audit(1035.130:301): avc: denied { read open } for pid=8859 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=797 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1035.642585][ T30] audit: type=1400 audit(1035.130:302): avc: denied { getattr } for pid=8859 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=797 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1036.029109][ T30] audit: type=1400 audit(1035.560:303): avc: denied { add_name } for pid=8852 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1036.043454][ T30] audit: type=1400 audit(1035.580:304): avc: denied { create } for pid=8852 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1036.046829][ T30] audit: type=1400 audit(1035.580:305): avc: denied { write open } for pid=8852 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=5613 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1036.096174][ T30] audit: type=1400 audit(1035.630:306): avc: denied { append } for pid=8852 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=5613 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1044.863709][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1044.870186][ T30] audit: type=1400 audit(1044.400:311): avc: denied { ioctl } for pid=8910 comm="syz.0.2654" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1044.907268][ T30] audit: type=1400 audit(1044.440:312): avc: denied { create } for pid=8913 comm="syz.1.2656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1044.996849][ T30] audit: type=1400 audit(1044.520:313): avc: denied { write } for pid=8913 comm="syz.1.2656" path="socket:[21313]" dev="sockfs" ino=21313 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1058.357772][ T30] audit: type=1400 audit(1057.890:314): avc: denied { mounton } for pid=8999 comm="syz.0.2698" path="/1311/file0" dev="tmpfs" ino=6732 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1058.408143][ T30] audit: type=1400 audit(1057.940:315): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1059.517347][ T1584] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1059.649759][ T30] audit: type=1400 audit(1059.180:316): avc: denied { execute } for pid=9005 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1059.659267][ T30] audit: type=1400 audit(1059.190:317): avc: denied { execute_no_trans } for pid=9005 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1059.726859][ T1584] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1059.862569][ T30] audit: type=1400 audit(1059.390:318): avc: denied { read } for pid=9008 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1059.864773][ T30] audit: type=1400 audit(1059.400:319): avc: denied { open } for pid=9008 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1059.898515][ T30] audit: type=1400 audit(1059.430:320): avc: denied { mounton } for pid=9008 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1060.032207][ T1584] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1060.338188][ T1584] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1060.657157][ T30] audit: type=1400 audit(1060.190:321): avc: denied { create } for pid=9015 comm="syz.1.2707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1060.667515][ T30] audit: type=1400 audit(1060.200:322): avc: denied { setopt } for pid=9015 comm="syz.1.2707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1062.102758][ T30] audit: type=1400 audit(1061.620:323): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1064.149207][ T30] audit: type=1400 audit(1063.680:324): avc: denied { create } for pid=9036 comm="syz.1.2716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1064.914962][ T1584] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1065.072315][ T1584] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1065.135574][ T1584] bond0 (unregistering): Released all slaves [ 1065.824490][ T1584] hsr_slave_0: left promiscuous mode [ 1065.849776][ T1584] hsr_slave_1: left promiscuous mode [ 1066.124712][ T1584] veth1_macvtap: left promiscuous mode [ 1066.125612][ T1584] veth0_macvtap: left promiscuous mode [ 1066.126390][ T1584] veth1_vlan: left promiscuous mode [ 1066.126806][ T1584] veth0_vlan: left promiscuous mode [ 1089.016154][ T30] audit: type=1400 audit(1088.550:325): avc: denied { mac_admin } for pid=9120 comm="syz.1.2741" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1089.016356][ T9121] SELinux: Context system_u:object_r:hald_var_run_t:s0 is not valid (left unmapped). [ 1089.038783][ T30] audit: type=1400 audit(1088.570:326): avc: denied { relabelto } for pid=9120 comm="syz.1.2741" name="file0" dev="tmpfs" ino=7324 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 1089.064662][ T30] audit: type=1400 audit(1088.590:327): avc: denied { associate } for pid=9120 comm="syz.1.2741" name="file0" dev="tmpfs" ino=7324 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_var_run_t:s0" [ 1089.255187][ T30] audit: type=1400 audit(1088.780:328): avc: denied { unlink } for pid=3320 comm="syz-executor" name="file0" dev="tmpfs" ino=7324 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sock_file permissive=1 trawcon="system_u:object_r:hald_var_run_t:s0" [ 1089.437773][ T9008] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1089.547653][ T9008] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1097.863026][ T30] audit: type=1400 audit(1097.400:329): avc: denied { read } for pid=9168 comm="syz.1.2757" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1097.864994][ T30] audit: type=1400 audit(1097.400:330): avc: denied { open } for pid=9168 comm="syz.1.2757" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1097.876739][ T30] audit: type=1400 audit(1097.410:331): avc: denied { write } for pid=9168 comm="syz.1.2757" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1098.399331][ T9008] hsr_slave_0: entered promiscuous mode [ 1098.415306][ T9008] hsr_slave_1: entered promiscuous mode [ 1102.659423][ T30] audit: type=1400 audit(1102.190:332): avc: denied { setopt } for pid=9192 comm="syz.1.2766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1103.372909][ T9008] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1103.434788][ T9008] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1103.543956][ T9008] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1103.645103][ T9008] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1108.062183][ T30] audit: type=1400 audit(1107.590:333): avc: denied { read write } for pid=9213 comm="syz.1.2767" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1108.062687][ T30] audit: type=1400 audit(1107.590:334): avc: denied { open } for pid=9213 comm="syz.1.2767" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1108.143530][ T9008] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1109.773060][ T30] audit: type=1400 audit(1109.300:335): avc: denied { ioctl } for pid=9225 comm="syz.1.2770" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x7001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1132.378672][ T9008] veth0_vlan: entered promiscuous mode [ 1132.673027][ T9008] veth1_vlan: entered promiscuous mode [ 1133.254679][ T9008] veth0_macvtap: entered promiscuous mode [ 1133.348760][ T9008] veth1_macvtap: entered promiscuous mode [ 1134.191481][ T55] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1134.194151][ T55] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1134.195622][ T55] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1134.196842][ T55] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1134.969351][ T30] audit: type=1400 audit(1134.500:336): avc: denied { mounton } for pid=9008 comm="syz-executor" path="/syzkaller.QmHwY3/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1134.977296][ T30] audit: type=1400 audit(1134.510:337): avc: denied { mount } for pid=9008 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1134.996500][ T30] audit: type=1400 audit(1134.530:338): avc: denied { mount } for pid=9008 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1135.019683][ T30] audit: type=1400 audit(1134.550:339): avc: denied { mounton } for pid=9008 comm="syz-executor" path="/syzkaller.QmHwY3/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1135.028792][ T30] audit: type=1400 audit(1134.560:340): avc: denied { mounton } for pid=9008 comm="syz-executor" path="/syzkaller.QmHwY3/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=24008 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1135.067526][ T30] audit: type=1400 audit(1134.600:341): avc: denied { unmount } for pid=9008 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1135.078284][ T30] audit: type=1400 audit(1134.610:342): avc: denied { mounton } for pid=9008 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1135.085045][ T30] audit: type=1400 audit(1134.620:343): avc: denied { mount } for pid=9008 comm="syz-executor" name="/" dev="gadgetfs" ino=3601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1135.097355][ T30] audit: type=1400 audit(1134.630:344): avc: denied { mount } for pid=9008 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1135.104496][ T30] audit: type=1400 audit(1134.640:345): avc: denied { mounton } for pid=9008 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1140.735536][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 1140.736200][ T30] audit: type=1400 audit(1140.250:347): avc: denied { unlink } for pid=9008 comm="syz-executor" name="file1" dev="tmpfs" ino=60 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1157.746966][ T30] audit: type=1400 audit(1157.280:348): avc: denied { setattr } for pid=9503 comm="syz.1.2878" name="nbd1" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1165.182209][ T30] audit: type=1400 audit(1164.710:349): avc: denied { setattr } for pid=3320 comm="syz-executor" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 1166.595550][ T30] audit: type=1400 audit(1166.130:350): avc: denied { create } for pid=9552 comm="syz.2.2903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1166.623682][ T30] audit: type=1400 audit(1166.160:351): avc: denied { connect } for pid=9552 comm="syz.2.2903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1172.172966][ T9566] netlink: 'syz.2.2909': attribute type 29 has an invalid length. [ 1172.190010][ T9566] netlink: 'syz.2.2909': attribute type 29 has an invalid length. [ 1188.827195][ T30] audit: type=1400 audit(1188.360:352): avc: denied { audit_write } for pid=9624 comm="syz.2.2937" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1189.988805][ T30] audit: type=1400 audit(1189.520:353): avc: denied { getopt } for pid=9628 comm="syz.2.2939" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1200.325047][ T9670] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9670 comm=syz.2.2959 [ 1206.138848][ T30] audit: type=1400 audit(1205.670:354): avc: denied { read } for pid=9691 comm="syz.2.2970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1209.715392][ T30] audit: type=1400 audit(1209.250:355): avc: denied { getopt } for pid=9704 comm="syz.2.2976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1218.098972][ T9048] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1218.226042][ T9048] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1218.299063][ T9048] bond0 (unregistering): Released all slaves [ 1219.139038][ T9048] hsr_slave_0: left promiscuous mode [ 1219.158667][ T9048] hsr_slave_1: left promiscuous mode [ 1223.264908][ T30] audit: type=1400 audit(1222.800:356): avc: denied { write } for pid=9750 comm="syz.2.2995" name="snmp" dev="proc" ino=4026532645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1242.738597][ T9712] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1242.949636][ T9712] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1248.908302][ T30] audit: type=1400 audit(1248.440:357): avc: denied { ioctl } for pid=9873 comm="syz.2.3036" path="socket:[25209]" dev="sockfs" ino=25209 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1251.749154][ T9712] hsr_slave_0: entered promiscuous mode [ 1251.794123][ T9712] hsr_slave_1: entered promiscuous mode [ 1251.799738][ T9712] debugfs: 'hsr0' already exists in 'hsr' [ 1251.804104][ T9712] Cannot create hsr debugfs directory [ 1258.295185][ T9712] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1258.495439][ T9712] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1258.697117][ T9712] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1258.937512][ T9712] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1262.093145][ T30] audit: type=1400 audit(1261.580:358): avc: denied { create } for pid=9922 comm="syz.2.3048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1262.202851][ T30] audit: type=1400 audit(1261.730:359): avc: denied { write } for pid=9922 comm="syz.2.3048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1267.912662][ T9712] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1280.231584][ T9997] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=9997 comm=syz.2.3070 [ 1281.445445][ T30] audit: type=1400 audit(1280.980:360): avc: denied { bind } for pid=10002 comm="syz.2.3072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1281.478066][ T30] audit: type=1400 audit(1281.000:361): avc: denied { node_bind } for pid=10002 comm="syz.2.3072" saddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1281.926976][ T30] audit: type=1400 audit(1281.460:362): avc: denied { bind } for pid=10004 comm="syz.2.3073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1282.004639][ T30] audit: type=1400 audit(1281.510:363): avc: denied { setopt } for pid=10004 comm="syz.2.3073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1288.286122][ T30] audit: type=1400 audit(1287.800:364): avc: denied { create } for pid=10035 comm="syz.2.3081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1294.463390][ T30] audit: type=1400 audit(1293.980:365): avc: denied { write } for pid=10061 comm="syz.2.3087" name="udmabuf" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1294.508352][ T30] audit: type=1400 audit(1294.040:366): avc: denied { ioctl } for pid=10061 comm="syz.2.3087" path="/dev/udmabuf" dev="devtmpfs" ino=677 ioctlcmd=0x7543 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1295.412292][ T9712] veth0_vlan: entered promiscuous mode [ 1295.647614][ T9712] veth1_vlan: entered promiscuous mode [ 1296.209078][ T9712] veth0_macvtap: entered promiscuous mode [ 1296.364207][ T9712] veth1_macvtap: entered promiscuous mode [ 1296.947198][ T9773] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1296.949744][ T9773] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1296.967001][ T9773] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1296.969674][ T9773] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1299.801886][ T30] audit: type=1400 audit(1299.330:367): avc: denied { setattr } for pid=10078 comm="syz.3.2979" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1299.848709][ T30] audit: type=1400 audit(1299.380:368): avc: denied { write } for pid=10079 comm="syz.2.3094" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1306.048249][ T30] audit: type=1400 audit(1305.580:369): avc: denied { create } for pid=10119 comm="syz.3.3111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1306.065255][ T30] audit: type=1400 audit(1305.600:370): avc: denied { getopt } for pid=10119 comm="syz.3.3111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1318.014671][ T30] audit: type=1400 audit(1317.550:371): avc: denied { setopt } for pid=10196 comm="syz.2.3148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1322.688715][ T30] audit: type=1400 audit(1322.220:372): avc: denied { read } for pid=10220 comm="syz.2.3160" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1322.708800][ T30] audit: type=1400 audit(1322.240:373): avc: denied { open } for pid=10220 comm="syz.2.3160" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1322.747845][ T30] audit: type=1400 audit(1322.270:374): avc: denied { ioctl } for pid=10220 comm="syz.2.3160" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1322.786944][T10222] binder: 10220:10222 ioctl c0306201 0 returned -14 [ 1322.837243][T10222] binder: 10220:10222 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1322.838580][T10222] binder: 10222 RLIMIT_NICE not set [ 1322.877818][ T30] audit: type=1400 audit(1322.410:375): avc: denied { create } for pid=10221 comm="syz.3.3161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1344.794352][ T30] audit: type=1400 audit(1344.330:376): avc: denied { read } for pid=10353 comm="syz.3.3222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1352.936001][ T30] audit: type=1400 audit(1352.460:377): avc: denied { write } for pid=10398 comm="syz.2.3243" path="socket:[27861]" dev="sockfs" ino=27861 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1370.313380][ T30] audit: type=1400 audit(1369.840:378): avc: denied { mount } for pid=10494 comm="syz.3.3291" name="/" dev="autofs" ino=27326 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1370.454689][ T30] audit: type=1400 audit(1369.990:379): avc: denied { unmount } for pid=9712 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1372.203751][T10501] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3294'. [ 1372.231956][ T30] audit: type=1400 audit(1371.740:380): avc: denied { read } for pid=10500 comm="syz.3.3294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1384.195397][ T30] audit: type=1400 audit(1383.720:381): avc: denied { ioctl } for pid=10545 comm="syz.3.3315" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=27412 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1387.474285][T10556] SELinux: syz.3.3320 (10556) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1397.309908][ C1] vkms_vblank_simulate: vblank timer overrun [ 1397.405096][ C1] vkms_vblank_simulate: vblank timer overrun [ 1400.407821][ T30] audit: type=1400 audit(1399.940:382): avc: denied { read } for pid=10591 comm="syz.3.3336" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1400.416677][ T30] audit: type=1400 audit(1399.950:383): avc: denied { open } for pid=10591 comm="syz.3.3336" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1400.569701][ T30] audit: type=1400 audit(1400.100:384): avc: denied { ioctl } for pid=10591 comm="syz.3.3336" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x9203 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1404.734832][ T30] audit: type=1400 audit(1404.270:385): avc: denied { read write } for pid=10606 comm="syz.3.3343" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1404.744131][ T30] audit: type=1400 audit(1404.270:386): avc: denied { open } for pid=10606 comm="syz.3.3343" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1404.759031][ T30] audit: type=1400 audit(1404.290:387): avc: denied { setattr } for pid=10606 comm="syz.3.3343" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1406.017001][ T55] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1406.425277][ T55] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1406.810098][ T55] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1407.325805][ T55] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1413.565302][ T55] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1413.663142][ T55] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1413.716784][ T55] bond0 (unregistering): Released all slaves [ 1414.352991][ T55] hsr_slave_0: left promiscuous mode [ 1414.432065][ T55] hsr_slave_1: left promiscuous mode [ 1414.608102][ T55] veth1_macvtap: left promiscuous mode [ 1414.609978][ T55] veth0_macvtap: left promiscuous mode [ 1414.631818][ T55] veth1_vlan: left promiscuous mode [ 1414.632858][ T55] veth0_vlan: left promiscuous mode [ 1417.587203][T10662] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10662 comm=syz.3.3365 [ 1431.092888][ T30] audit: type=1400 audit(1430.620:388): avc: denied { append } for pid=10709 comm="syz.3.3380" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1431.287596][T10711] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 1435.146123][T10610] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1435.267457][T10610] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1437.722067][ T30] audit: type=1400 audit(1437.250:389): avc: denied { remount } for pid=10742 comm="syz.3.3390" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1442.835448][ T30] audit: type=1400 audit(1442.340:390): avc: denied { read write } for pid=10768 comm="syz.3.3397" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1442.836465][ T30] audit: type=1400 audit(1442.370:391): avc: denied { open } for pid=10768 comm="syz.3.3397" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1443.289290][T10610] hsr_slave_0: entered promiscuous mode [ 1443.319528][T10610] hsr_slave_1: entered promiscuous mode [ 1449.242606][T10610] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1449.343288][T10610] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1449.405154][T10610] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1449.444358][T10610] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1450.567992][T10803] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=10803 comm=syz.3.3406 [ 1457.505147][T10610] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1473.543937][ T30] audit: type=1400 audit(1473.070:392): avc: denied { create } for pid=10909 comm="syz.3.3437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1473.630732][ T30] audit: type=1400 audit(1473.160:393): avc: denied { write } for pid=10909 comm="syz.3.3437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1485.271198][T10610] veth0_vlan: entered promiscuous mode [ 1485.578292][T10610] veth1_vlan: entered promiscuous mode [ 1486.473092][T10610] veth0_macvtap: entered promiscuous mode [ 1486.708570][T10610] veth1_macvtap: entered promiscuous mode [ 1488.004732][ T9773] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1488.014740][ T9773] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1488.018190][ T9773] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1488.019563][ T9773] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1490.748414][ T30] audit: type=1400 audit(1490.280:394): avc: denied { ioctl } for pid=10986 comm="syz.3.3460" path="socket:[29873]" dev="sockfs" ino=29873 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1497.052963][T11024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11024 comm=syz.4.3476 [ 1500.294889][ T30] audit: type=1400 audit(1499.830:395): avc: denied { getopt } for pid=11042 comm="syz.4.3485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1500.528522][T11044] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 1500.528522][T11044] The task syz.3.3484 (11044) triggered the difference, watch for misbehavior. [ 1503.242641][ T30] audit: type=1400 audit(1502.770:396): avc: denied { read } for pid=11056 comm="syz.4.3491" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1516.603520][ T30] audit: type=1400 audit(1516.130:397): avc: denied { checkpoint_restore } for pid=11130 comm="syz.4.3526" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1523.159203][ T30] audit: type=1400 audit(1522.690:398): avc: denied { bind } for pid=11166 comm="syz.3.3543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1523.173343][ T30] audit: type=1400 audit(1522.700:399): avc: denied { write } for pid=11166 comm="syz.3.3543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1525.064194][ T30] audit: type=1400 audit(1524.590:400): avc: denied { create } for pid=11177 comm="syz.4.3549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1525.156873][ T30] audit: type=1400 audit(1524.690:401): avc: denied { setopt } for pid=11177 comm="syz.4.3549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1532.264226][ T30] audit: type=1400 audit(1531.790:402): avc: denied { read write } for pid=11219 comm="syz.3.3570" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1532.266193][ T30] audit: type=1400 audit(1531.800:403): avc: denied { open } for pid=11219 comm="syz.3.3570" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1554.148625][ T30] audit: type=1400 audit(1553.680:404): avc: denied { validate_trans } for pid=11364 comm="syz.3.3642" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1562.458929][ T30] audit: type=1400 audit(1561.990:405): avc: denied { write } for pid=11414 comm="syz.4.3667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1564.104769][ T30] audit: type=1400 audit(1563.630:406): avc: denied { create } for pid=11426 comm="syz.3.3673" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1564.188124][ T30] audit: type=1400 audit(1563.720:407): avc: denied { write } for pid=11426 comm="syz.3.3673" name="file0" dev="tmpfs" ino=1991 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1564.207213][ T30] audit: type=1400 audit(1563.720:408): avc: denied { open } for pid=11426 comm="syz.3.3673" path="/384/file0" dev="tmpfs" ino=1991 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1564.210020][ T30] audit: type=1400 audit(1563.740:409): avc: denied { ioctl } for pid=11426 comm="syz.3.3673" path="/384/file0" dev="tmpfs" ino=1991 ioctlcmd=0x1260 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1564.383148][ T30] audit: type=1400 audit(1563.900:410): avc: denied { unlink } for pid=9712 comm="syz-executor" name="file0" dev="tmpfs" ino=1991 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1566.378435][T11446] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11446 comm=syz.3.3682 [ 1603.061482][ T30] audit: type=1400 audit(1602.590:411): avc: denied { read } for pid=11642 comm="syz.4.3777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1604.383478][ T30] audit: type=1400 audit(1603.910:412): avc: denied { write } for pid=11652 comm="syz.3.3781" path="socket:[32031]" dev="sockfs" ino=32031 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1608.026668][T11674] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11674 comm=syz.4.3791 [ 1622.662337][ T30] audit: type=1400 audit(1622.190:413): avc: denied { write } for pid=11780 comm="syz.4.3842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1622.707087][ T30] audit: type=1400 audit(1622.240:414): avc: denied { read } for pid=11780 comm="syz.4.3842" path="socket:[31681]" dev="sockfs" ino=31681 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1626.139508][ T30] audit: type=1400 audit(1625.670:415): avc: denied { read } for pid=11801 comm="syz.4.3852" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1633.275135][ T30] audit: type=1400 audit(1632.810:416): avc: denied { bind } for pid=11839 comm="syz.4.3870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1659.195597][ T30] audit: type=1400 audit(1658.730:417): avc: denied { execute } for pid=11990 comm="syz.4.3944" name="file1" dev="tmpfs" ino=1185 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1676.153186][ T30] audit: type=1400 audit(1675.670:418): avc: denied { read } for pid=12097 comm="syz.3.3996" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1676.170976][ T30] audit: type=1400 audit(1675.700:419): avc: denied { open } for pid=12097 comm="syz.3.3996" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1676.201926][ T30] audit: type=1400 audit(1675.730:420): avc: denied { block_suspend } for pid=12097 comm="syz.3.3996" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1691.723856][ T30] audit: type=1400 audit(1691.240:421): avc: denied { unmount } for pid=9712 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1693.385861][T12208] Injecting memory failure for pfn 0x58f6c at process virtual address 0x2036c000 [ 1693.393042][T12208] Memory failure: 0x58f6c: recovery action for unsplit thp: Failed [ 1694.446687][ T30] audit: type=1400 audit(1693.980:422): avc: denied { lock } for pid=12213 comm="syz.3.4053" path="socket:[34033]" dev="sockfs" ino=34033 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1704.533415][ T30] audit: type=1400 audit(1704.070:423): avc: denied { ioctl } for pid=12273 comm="syz.4.4083" path="/dev/input/event0" dev="devtmpfs" ino=748 ioctlcmd=0x4590 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1730.321841][ T30] audit: type=1400 audit(1729.850:424): avc: denied { read write } for pid=12403 comm="syz.3.4146" name="uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1730.346727][ T30] audit: type=1400 audit(1729.860:425): avc: denied { open } for pid=12403 comm="syz.3.4146" path="/dev/uhid" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1730.510097][ T3466] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1730.522782][ T3466] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1730.523451][ T3466] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1730.523690][ T3466] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1730.523975][ T3466] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1730.524272][ T3466] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1730.524527][ T3466] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1730.524805][ T3466] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1730.525067][ T3466] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1730.525338][ T3466] hid-generic 0003:0004:0000.0002: unknown main item tag 0x0 [ 1730.664298][ T3466] hid-generic 0003:0004:0000.0002: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 1733.939970][T12415] fido_id[12415]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1749.241071][ T30] audit: type=1400 audit(1748.770:426): avc: denied { sqpoll } for pid=12513 comm="syz.4.4197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1751.895707][ T30] audit: type=1400 audit(1751.430:427): avc: denied { getopt } for pid=12530 comm="syz.3.4205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1752.007174][T12532] SELinux: Context system_u:object_r:dhcp_etc_t:s0 is not valid (left unmapped). [ 1752.875587][ T30] audit: type=1400 audit(1752.400:428): avc: denied { read } for pid=12533 comm="syz.3.4206" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1752.876655][ T30] audit: type=1400 audit(1752.400:429): avc: denied { open } for pid=12533 comm="syz.3.4206" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1767.476314][ T30] audit: type=1400 audit(1767.010:430): avc: denied { ioctl } for pid=12618 comm="syz.3.4246" path="socket:[34716]" dev="sockfs" ino=34716 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1767.519418][T12621] netlink: 'syz.4.4247': attribute type 13 has an invalid length. [ 1774.995519][ T722] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1774.996075][ T722] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1775.007495][ T722] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1775.010052][ T722] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1777.973610][ T30] audit: type=1400 audit(1777.510:431): avc: denied { bind } for pid=12662 comm="syz.4.4266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1781.443010][ T30] audit: type=1400 audit(1780.970:432): avc: denied { mount } for pid=12688 comm="syz.3.4279" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1781.473707][ T30] audit: type=1400 audit(1781.010:433): avc: denied { unmount } for pid=12688 comm="syz.3.4279" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1796.027879][ T30] audit: type=1400 audit(1795.560:434): avc: denied { execute } for pid=12797 comm="syz.4.4333" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=36022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 1799.889940][ T30] audit: type=1400 audit(1799.420:435): avc: denied { create } for pid=12828 comm="syz.4.4348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1801.747522][ T30] audit: type=1400 audit(1801.280:436): avc: denied { getopt } for pid=12841 comm="syz.3.4355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1804.529008][ T30] audit: type=1400 audit(1804.060:437): avc: denied { mount } for pid=12861 comm="syz.4.4365" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1804.598748][ T30] audit: type=1400 audit(1804.130:438): avc: denied { remount } for pid=12861 comm="syz.4.4365" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1804.855489][ T30] audit: type=1400 audit(1804.370:439): avc: denied { unmount } for pid=10610 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 1831.323468][ T30] audit: type=1400 audit(1830.850:440): avc: denied { setopt } for pid=12998 comm="syz.3.4432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1831.603399][T13002] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13002 comm=syz.4.4433 [ 1859.846261][ T30] audit: type=1400 audit(1859.380:441): avc: denied { read } for pid=13145 comm="syz.4.4503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1860.405513][ T30] audit: type=1400 audit(1859.940:442): avc: denied { write } for pid=13145 comm="syz.4.4503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1860.877464][ T30] audit: type=1400 audit(1860.410:443): avc: denied { setopt } for pid=13150 comm="syz.3.4505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1872.692818][T13202] ucma_write: process 1675 (syz.3.4530) changed security contexts after opening file descriptor, this is not allowed. [ 1875.010026][T13210] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=13210 comm=syz.3.4534 [ 1893.152741][T13287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13287 comm=syz.3.4569 [ 1911.903072][ T30] audit: type=1400 audit(1911.390:444): avc: denied { unmount } for pid=10610 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1912.304339][T13384] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13384 comm=syz.4.4618 [ 1915.251593][ T30] audit: type=1400 audit(1914.780:445): avc: denied { bind } for pid=13401 comm="syz.3.4627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1915.301291][ T30] audit: type=1400 audit(1914.820:446): avc: denied { connect } for pid=13401 comm="syz.3.4627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1917.306264][ T30] audit: type=1400 audit(1916.840:447): avc: denied { name_bind } for pid=13412 comm="syz.3.4632" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1938.119495][ T30] audit: type=1400 audit(1937.650:448): avc: denied { ioctl } for pid=13513 comm="syz.3.4682" path="socket:[37470]" dev="sockfs" ino=37470 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1942.403846][T13532] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=13532 comm=syz.3.4690 [ 1952.437038][T13577] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=13577 comm=syz.4.4711 [ 1955.297778][ T30] audit: type=1400 audit(1954.830:449): avc: granted { setsecparam } for pid=13595 comm="syz.4.4721" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1981.473509][ T30] audit: type=1400 audit(1981.010:450): avc: denied { setattr } for pid=13707 comm="syz.4.4775" name="CAN_J1939" dev="sockfs" ino=38614 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1987.956600][T13747] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13747 comm=syz.3.4793 [ 1994.444538][ T30] audit: type=1400 audit(1993.970:451): avc: denied { connect } for pid=13770 comm="syz.4.4805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1995.447639][ T30] audit: type=1400 audit(1994.970:452): avc: denied { setopt } for pid=13776 comm="syz.3.4808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2001.038542][ T30] audit: type=1400 audit(2000.570:453): avc: denied { ioctl } for pid=13808 comm="syz.4.4824" path="socket:[38793]" dev="sockfs" ino=38793 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2004.417095][ T30] audit: type=1400 audit(2003.950:454): avc: denied { shutdown } for pid=13820 comm="syz.4.4830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2004.593903][T13825] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13825 comm=syz.3.4831 [ 2022.472950][T13947] loop7: detected capacity change from 0 to 7 [ 2023.126944][T13949] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4892'. [ 2037.656088][T13987] usb usb1: usbfs: process 13987 (syz.3.4910) did not claim interface 0 before use [ 2038.447025][T13992] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=13992 comm=syz.4.4914 [ 2057.667806][ T30] audit: type=1400 audit(2057.200:455): avc: denied { create } for pid=14093 comm="syz.4.4964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2057.733752][ T30] audit: type=1400 audit(2057.270:456): avc: denied { setopt } for pid=14093 comm="syz.4.4964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2061.502277][ T30] audit: type=1400 audit(2061.030:457): avc: denied { create } for pid=14114 comm="syz.4.4975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 2061.528160][ T30] audit: type=1400 audit(2061.050:458): avc: denied { write } for pid=14114 comm="syz.4.4975" path="socket:[40416]" dev="sockfs" ino=40416 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 2066.046293][ T30] audit: type=1400 audit(2065.580:459): avc: denied { accept } for pid=14139 comm="syz.3.4987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2079.747140][ T30] audit: type=1400 audit(2079.280:460): avc: denied { ioctl } for pid=14221 comm="syz.4.5028" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2090.917806][ T30] audit: type=1400 audit(2090.450:461): avc: denied { map } for pid=14288 comm="syz.4.5060" path="socket:[39669]" dev="sockfs" ino=39669 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 2108.036138][ T30] audit: type=1400 audit(2107.570:462): avc: denied { write } for pid=14389 comm="syz.3.5110" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2125.918264][T14488] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14488 comm=syz.4.5156 [ 2138.784773][ T30] audit: type=1400 audit(2138.290:463): avc: denied { name_bind } for pid=14544 comm="syz.3.5183" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2138.808299][ T30] audit: type=1400 audit(2138.340:464): avc: denied { node_bind } for pid=14544 comm="syz.3.5183" saddr=255.255.255.255 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2145.107619][T14578] block nbd4: shutting down sockets [ 2145.558079][ T30] audit: type=1400 audit(2145.090:465): avc: denied { setattr } for pid=14580 comm="syz.3.5200" name="fd" dev="proc" ino=41213 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2183.052541][ T30] audit: type=1400 audit(2182.550:466): avc: denied { write } for pid=14751 comm="syz.3.5283" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2184.403065][ T30] audit: type=1400 audit(2183.930:467): avc: denied { set_context_mgr } for pid=14760 comm="syz.4.5288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2184.416738][T14761] binder: BINDER_SET_CONTEXT_MGR already set [ 2184.419005][T14761] binder: 14760:14761 ioctl 40046207 0 returned -16 [ 2221.534947][ T30] audit: type=1400 audit(2221.040:468): avc: denied { remount } for pid=14918 comm="syz.4.5364" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2234.585279][T14999] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14999 comm=syz.4.5402 [ 2234.787379][T14999] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 2237.403350][ T30] audit: type=1400 audit(2236.910:469): avc: denied { ioctl } for pid=15017 comm="syz.4.5411" path="socket:[42908]" dev="sockfs" ino=42908 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2249.216243][ T30] audit: type=1400 audit(2248.750:470): avc: denied { ioctl } for pid=15080 comm="syz.3.5441" path="socket:[43090]" dev="sockfs" ino=43090 ioctlcmd=0x89f5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2250.339525][ T30] audit: type=1400 audit(2249.870:471): avc: denied { connect } for pid=15084 comm="syz.4.5443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2258.586147][T15141] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65498 sclass=netlink_audit_socket pid=15141 comm=syz.4.5472 [ 2259.492860][ T30] audit: type=1400 audit(2259.030:472): avc: denied { map } for pid=15146 comm="syz.4.5475" path="/proc/2228/net/pfkey" dev="proc" ino=4026532893 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2259.496774][ T30] audit: type=1400 audit(2259.030:473): avc: denied { execute } for pid=15146 comm="syz.4.5475" path="/proc/2228/net/pfkey" dev="proc" ino=4026532893 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2277.226437][ C0] vkms_vblank_simulate: vblank timer overrun [ 2285.939032][T10981] hid (null): global environment stack underflow [ 2286.068543][T10981] hid-generic 0003:0005:7FFF.0003: global environment stack underflow [ 2286.069222][T10981] hid-generic 0003:0005:7FFF.0003: item 0 0 1 11 parsing failed [ 2286.085430][T10981] hid-generic 0003:0005:7FFF.0003: probe with driver hid-generic failed with error -22 [ 2293.070049][T15338] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2293.109700][T15338] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2319.220582][ C0] hrtimer: interrupt took 1200816 ns [ 2335.767795][T15554] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2335.821456][T15554] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2386.199264][ T30] audit: type=1400 audit(2385.730:474): avc: denied { write } for pid=15811 comm="syz.4.5793" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2386.214833][T15812] usb usb1: usbfs: process 15812 (syz.4.5793) did not claim interface 6 before use [ 2393.084227][T15854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15854 comm=syz.3.5814 [ 2397.047818][ T30] audit: type=1400 audit(2396.580:475): avc: denied { write } for pid=15874 comm="syz.3.5824" path="socket:[46322]" dev="sockfs" ino=46322 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2403.228251][T15911] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15911 comm=syz.3.5842 [ 2403.818539][ T30] audit: type=1400 audit(2403.350:476): avc: denied { bind } for pid=15916 comm="syz.4.5845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2403.827423][ T30] audit: type=1400 audit(2403.360:477): avc: denied { name_bind } for pid=15916 comm="syz.4.5845" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 2403.828208][ T30] audit: type=1400 audit(2403.360:478): avc: denied { node_bind } for pid=15916 comm="syz.4.5845" saddr=600::920:0:0:0 src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 2404.009853][ T30] audit: type=1400 audit(2403.540:479): avc: denied { write } for pid=15918 comm="syz.4.5847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2413.705432][ T30] audit: type=1400 audit(2413.240:480): avc: denied { bind } for pid=15977 comm="syz.3.5875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2419.305408][ T30] audit: type=1400 audit(2418.840:481): avc: denied { setattr } for pid=16000 comm="syz.3.5885" name="tun" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 2422.134019][ T30] audit: type=1400 audit(2421.670:482): avc: denied { ioctl } for pid=16020 comm="syz.4.5895" path="socket:[45693]" dev="sockfs" ino=45693 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2428.953228][ T30] audit: type=1400 audit(2428.480:483): avc: denied { ioctl } for pid=16060 comm="syz.3.5913" path="socket:[45749]" dev="sockfs" ino=45749 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2436.942097][ T30] audit: type=1400 audit(2436.470:484): avc: denied { write } for pid=16104 comm="syz.4.5935" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2437.055309][ T30] audit: type=1400 audit(2436.590:485): avc: denied { ioctl } for pid=16104 comm="syz.4.5935" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9376 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2441.204972][ T30] audit: type=1400 audit(2440.740:486): avc: denied { name_bind } for pid=16133 comm="syz.3.5950" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 2444.114898][ T30] audit: type=1400 audit(2443.650:487): avc: denied { getopt } for pid=16156 comm="syz.4.5961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2456.032074][ T30] audit: type=1400 audit(2455.560:488): avc: denied { read } for pid=16226 comm="syz.3.5996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2480.557765][ T30] audit: type=1400 audit(2480.090:489): avc: denied { execute_no_trans } for pid=16354 comm="syz.3.6059" path="/1444/file0" dev="tmpfs" ino=7430 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2483.323842][T16376] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16376 comm=syz.4.6069 [ 2489.048662][ T30] audit: type=1400 audit(2488.580:490): avc: denied { remount } for pid=16406 comm="syz.3.6084" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2510.715154][ T30] audit: type=1400 audit(2510.250:491): avc: denied { lock } for pid=16519 comm="syz.3.6138" path="socket:[47588]" dev="sockfs" ino=47588 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 2522.767512][T16586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=30238 sclass=netlink_route_socket pid=16586 comm=syz.4.6172 [ 2530.032208][ T30] audit: type=1400 audit(2529.560:492): avc: denied { write } for pid=16636 comm="syz.4.6195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2533.004281][ T30] audit: type=1400 audit(2532.530:493): avc: denied { ioctl } for pid=16655 comm="syz.4.6204" path="cgroup:[4026532776]" dev="nsfs" ino=4026532776 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2540.333388][T16692] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16692 comm=syz.4.6221 [ 2564.343470][ T30] audit: type=1400 audit(2563.880:494): avc: denied { ioctl } for pid=16868 comm="syz.3.6309" path="socket:[49291]" dev="sockfs" ino=49291 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2567.714632][T16895] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16895 comm=syz.4.6322 [ 2569.356513][ T30] audit: type=1400 audit(2568.890:495): avc: denied { setopt } for pid=16907 comm="syz.4.6329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2581.285542][T17010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=17010 comm=syz.3.6378 [ 2587.926782][T17062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17062 comm=syz.4.6404 [ 2588.452228][T17056] nbd0: detected capacity change from 0 to 127 [ 2588.519064][T17017] [ 2588.521692][T17017] ====================================================== [ 2588.522118][T17017] WARNING: possible circular locking dependency detected [ 2588.523159][T17017] syzkaller #0 Not tainted [ 2588.523492][T17017] ------------------------------------------------------ [ 2588.523928][T17017] udevd/17017 is trying to acquire lock: [ 2588.524329][T17017] ffff00001ecdf670 (&nsock->tx_lock){+.+.}-{4:4}, at: nbd_queue_rq+0x2cc/0xb54 [ 2588.528084][T17017] [ 2588.528084][T17017] but task is already holding lock: [ 2588.528604][T17017] ffff0000201051f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 2588.529314][T17017] [ 2588.529314][T17017] which lock already depends on the new lock. [ 2588.529314][T17017] [ 2588.529868][T17017] [ 2588.529868][T17017] the existing dependency chain (in reverse order) is: [ 2588.530661][T17017] [ 2588.530661][T17017] -> #6 (&cmd->lock){+.+.}-{4:4}: [ 2588.531532][T17017] __mutex_lock+0x144/0xffc [ 2588.531978][T17017] mutex_lock_nested+0x24/0x30 [ 2588.532359][T17017] nbd_queue_rq+0xa8/0xb54 [ 2588.532682][T17017] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 2588.533102][T17017] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 2588.533490][T17017] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 2588.533878][T17017] blk_mq_run_hw_queue+0x1e4/0x500 [ 2588.534172][T17017] blk_mq_dispatch_list+0x348/0xa50 [ 2588.534403][T17017] blk_mq_flush_plug_list+0xe8/0x508 [ 2588.534592][T17017] __blk_flush_plug+0x208/0x3b8 [ 2588.534876][T17017] __submit_bio+0x3a4/0x4ac [ 2588.535111][T17017] submit_bio_noacct_nocheck+0x59c/0xa8c [ 2588.535446][T17017] submit_bio_noacct+0x858/0x18f8 [ 2588.535932][T17017] submit_bio+0x32c/0x5f0 [ 2588.536259][T17017] submit_bh_wbc+0x310/0x480 [ 2588.536798][T17017] block_read_full_folio+0x26c/0x640 [ 2588.537175][T17017] blkdev_read_folio+0x1c/0x28 [ 2588.537584][T17017] filemap_read_folio+0xac/0x1fc [ 2588.537946][T17017] do_read_cache_folio+0x1c4/0x480 [ 2588.538508][T17017] read_cache_folio+0x44/0x6c [ 2588.538931][T17017] read_part_sector+0xac/0x5f4 [ 2588.539364][T17017] read_lba+0x15c/0x2ec [ 2588.539642][T17017] efi_partition+0x1dc/0x2154 [ 2588.540214][T17017] bdev_disk_changed+0x508/0xf0c [ 2588.540609][T17017] blkdev_get_whole+0x144/0x1e4 [ 2588.541072][T17017] bdev_open+0x1dc/0xa84 [ 2588.541382][T17017] blkdev_open+0x1d4/0x324 [ 2588.541703][T17017] do_dentry_open+0x6a4/0x103c [ 2588.542053][T17017] vfs_open+0x5c/0x2fc [ 2588.542350][T17017] path_openat+0x1490/0x24b4 [ 2588.542668][T17017] do_filp_open+0x184/0x360 [ 2588.542984][T17017] do_sys_openat2+0xe0/0x160 [ 2588.543295][T17017] __arm64_sys_openat+0x12c/0x1bc [ 2588.543620][T17017] invoke_syscall+0x6c/0x258 [ 2588.544005][T17017] el0_svc_common.constprop.0+0xac/0x230 [ 2588.544355][T17017] do_el0_svc+0x40/0x58 [ 2588.544641][T17017] el0_svc+0x50/0x1a0 [ 2588.544948][T17017] el0t_64_sync_handler+0xa0/0xe4 [ 2588.545279][T17017] el0t_64_sync+0x198/0x19c [ 2588.545730][T17017] [ 2588.545730][T17017] -> #5 (set->srcu){.+.+}-{0:0}: [ 2588.546278][T17017] __synchronize_srcu+0xa8/0x268 [ 2588.546462][T17017] synchronize_srcu+0x12c/0x370 [ 2588.546670][T17017] blk_mq_quiesce_queue+0xf4/0x15c [ 2588.546857][T17017] elevator_switch+0x11c/0x414 [ 2588.547030][T17017] elevator_change+0x294/0x424 [ 2588.547195][T17017] elevator_set_default+0x22c/0x2ac [ 2588.547367][T17017] blk_register_queue+0x278/0x3ac [ 2588.547536][T17017] __add_disk+0x518/0xb80 [ 2588.547696][T17017] add_disk_fwnode+0x114/0x4c0 [ 2588.547872][T17017] device_add_disk+0x14/0x20 [ 2588.548127][T17017] nbd_dev_add+0x5f0/0x9c0 [ 2588.548290][T17017] nbd_init+0xd4/0x1a8 [ 2588.548455][T17017] do_one_initcall+0x130/0x7f0 [ 2588.548616][T17017] kernel_init_freeable+0x48c/0x70c [ 2588.548808][T17017] kernel_init+0x24/0x1dc [ 2588.548968][T17017] ret_from_fork+0x10/0x20 [ 2588.549168][T17017] [ 2588.549168][T17017] -> #4 (&q->elevator_lock){+.+.}-{4:4}: [ 2588.549475][T17017] __mutex_lock+0x144/0xffc [ 2588.549647][T17017] mutex_lock_nested+0x24/0x30 [ 2588.549818][T17017] elevator_change+0x130/0x424 [ 2588.549990][T17017] elevator_set_none+0x90/0xe4 [ 2588.550257][T17017] __blk_mq_update_nr_hw_queues+0x3b4/0xd38 [ 2588.550492][T17017] blk_mq_update_nr_hw_queues+0x44/0x68 [ 2588.550804][T17017] nbd_start_device+0x128/0xa38 [ 2588.550984][T17017] nbd_genl_connect+0xcb4/0x14c4 [ 2588.551153][T17017] genl_family_rcv_msg_doit+0x1b8/0x280 [ 2588.551414][T17017] genl_rcv_msg+0x3ec/0x5bc [ 2588.551644][T17017] netlink_rcv_skb+0x19c/0x338 [ 2588.551836][T17017] genl_rcv+0x38/0x50 [ 2588.552095][T17017] netlink_unicast+0x424/0x700 [ 2588.552276][T17017] netlink_sendmsg+0x644/0xa54 [ 2588.552472][T17017] __sock_sendmsg+0xc8/0x168 [ 2588.552778][T17017] ____sys_sendmsg+0x500/0x764 [ 2588.553099][T17017] ___sys_sendmsg+0x11c/0x19c [ 2588.553496][T17017] __sys_sendmsg+0x114/0x19c [ 2588.553687][T17017] __arm64_compat_sys_sendmsg+0x74/0xa4 [ 2588.553893][T17017] invoke_syscall+0x6c/0x258 [ 2588.554113][T17017] el0_svc_common.constprop.0+0xac/0x230 [ 2588.554514][T17017] do_el0_svc_compat+0x40/0x68 [ 2588.554892][T17017] el0_svc_compat+0x4c/0x184 [ 2588.554974][T17065] block nbd0: Receive control failed (result -32) [ 2588.556336][T17017] el0t_32_sync_handler+0x88/0xac [ 2588.556758][T17017] el0t_32_sync+0x19c/0x1a0 [ 2588.557107][T17017] [ 2588.557107][T17017] -> #3 (&q->q_usage_counter(io)#33){++++}-{0:0}: [ 2588.558021][T17017] blk_alloc_queue+0x538/0x644 [ 2588.558455][T17017] blk_mq_alloc_queue+0x144/0x220 [ 2588.558848][T17017] __blk_mq_alloc_disk+0x20/0x1a4 [ 2588.559177][T17017] nbd_dev_add+0x3c0/0x9c0 [ 2588.559496][T17017] nbd_init+0xd4/0x1a8 [ 2588.559827][T17017] do_one_initcall+0x130/0x7f0 [ 2588.560412][T17017] kernel_init_freeable+0x48c/0x70c [ 2588.560782][T17017] kernel_init+0x24/0x1dc [ 2588.561071][T17017] ret_from_fork+0x10/0x20 [ 2588.561349][T17017] [ 2588.561349][T17017] -> #2 (fs_reclaim){+.+.}-{0:0}: [ 2588.561758][T17017] fs_reclaim_acquire+0x138/0x160 [ 2588.561999][T17017] kmem_cache_alloc_node_noprof+0x64/0x3b8 [ 2588.562396][T17017] __alloc_skb+0x208/0x2f0 [ 2588.562882][T17017] tcp_stream_alloc_skb+0x2c/0x450 [ 2588.563256][T17017] tcp_sendmsg_locked+0xf34/0x39e8 [ 2588.563584][T17017] tcp_sendmsg+0x38/0x60 [ 2588.563970][T17017] inet_sendmsg+0x90/0xd4 [ 2588.564289][T17017] __sock_sendmsg+0xc8/0x168 [ 2588.564647][T17017] sock_write_iter+0x1cc/0x300 [ 2588.565009][T17017] vfs_write+0x7bc/0xb88 [ 2588.565313][T17017] ksys_write+0x18c/0x1d8 [ 2588.565620][T17017] __arm64_sys_write+0x6c/0x9c [ 2588.566018][T17017] invoke_syscall+0x6c/0x258 [ 2588.566420][T17017] el0_svc_common.constprop.0+0xac/0x230 [ 2588.566799][T17017] do_el0_svc+0x40/0x58 [ 2588.567090][T17017] el0_svc+0x50/0x1a0 [ 2588.567627][T17017] el0t_64_sync_handler+0xa0/0xe4 [ 2588.568119][T17017] el0t_64_sync+0x198/0x19c [ 2588.568324][T17017] [ 2588.568324][T17017] -> #1 (sk_lock-AF_INET){+.+.}-{0:0}: [ 2588.568634][T17017] lock_sock_nested+0x38/0xe8 [ 2588.568802][T17017] inet_shutdown+0x50/0x348 [ 2588.568960][T17017] kernel_sock_shutdown+0x54/0x84 [ 2588.569151][T17017] nbd_mark_nsock_dead+0x100/0x534 [ 2588.569343][T17017] sock_shutdown+0x134/0x234 [ 2588.569641][T17017] nbd_config_put+0x154/0x5b0 [ 2588.569960][T17017] nbd_release+0x7c/0x128 [ 2588.570467][T17017] blkdev_put_whole+0x98/0xf0 [ 2588.570886][T17017] bdev_release+0x2a4/0x510 [ 2588.571200][T17017] blkdev_release+0x14/0x24 [ 2588.571435][T17017] __fput+0x2c8/0x954 [ 2588.571591][T17017] ____fput+0x14/0x20 [ 2588.571793][T17017] task_work_run+0x128/0x210 [ 2588.572019][T17017] do_notify_resume+0x1d8/0x260 [ 2588.572202][T17017] el0_svc_compat+0x104/0x184 [ 2588.572379][T17017] el0t_32_sync_handler+0x88/0xac [ 2588.572545][T17017] el0t_32_sync+0x19c/0x1a0 [ 2588.572895][T17017] [ 2588.572895][T17017] -> #0 (&nsock->tx_lock){+.+.}-{4:4}: [ 2588.573477][T17017] __lock_acquire+0x1638/0x2380 [ 2588.573808][T17017] lock_acquire+0x310/0x38c [ 2588.574026][T17017] __mutex_lock+0x144/0xffc [ 2588.574183][T17017] mutex_lock_nested+0x24/0x30 [ 2588.574344][T17017] nbd_queue_rq+0x2cc/0xb54 [ 2588.574501][T17017] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 2588.574725][T17017] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 2588.574927][T17017] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 2588.575205][T17017] blk_mq_run_hw_queue+0x1e4/0x500 [ 2588.575383][T17017] blk_mq_dispatch_list+0x348/0xa50 [ 2588.575585][T17017] blk_mq_flush_plug_list+0xe8/0x508 [ 2588.575773][T17017] __blk_flush_plug+0x208/0x3b8 [ 2588.575998][T17017] __submit_bio+0x3a4/0x4ac [ 2588.576163][T17017] submit_bio_noacct_nocheck+0x59c/0xa8c [ 2588.576348][T17017] submit_bio_noacct+0x858/0x18f8 [ 2588.576518][T17017] submit_bio+0x32c/0x5f0 [ 2588.576676][T17017] submit_bh_wbc+0x310/0x480 [ 2588.576842][T17017] block_read_full_folio+0x26c/0x640 [ 2588.577023][T17017] blkdev_read_folio+0x1c/0x28 [ 2588.577192][T17017] filemap_read_folio+0xac/0x1fc [ 2588.577359][T17017] do_read_cache_folio+0x1c4/0x480 [ 2588.577527][T17017] read_cache_folio+0x44/0x6c [ 2588.577694][T17017] read_part_sector+0xac/0x5f4 [ 2588.577865][T17017] read_lba+0x15c/0x2ec [ 2588.578018][T17017] efi_partition+0x1dc/0x2154 [ 2588.578163][T17017] bdev_disk_changed+0x508/0xf0c [ 2588.578330][T17017] blkdev_get_whole+0x144/0x1e4 [ 2588.578496][T17017] bdev_open+0x1dc/0xa84 [ 2588.578658][T17017] blkdev_open+0x1d4/0x324 [ 2588.578824][T17017] do_dentry_open+0x6a4/0x103c [ 2588.578987][T17017] vfs_open+0x5c/0x2fc [ 2588.579139][T17017] path_openat+0x1490/0x24b4 [ 2588.579313][T17017] do_filp_open+0x184/0x360 [ 2588.579478][T17017] do_sys_openat2+0xe0/0x160 [ 2588.579680][T17017] __arm64_sys_openat+0x12c/0x1bc [ 2588.579856][T17017] invoke_syscall+0x6c/0x258 [ 2588.580082][T17017] el0_svc_common.constprop.0+0xac/0x230 [ 2588.580422][T17017] do_el0_svc+0x40/0x58 [ 2588.580763][T17017] el0_svc+0x50/0x1a0 [ 2588.581021][T17017] el0t_64_sync_handler+0xa0/0xe4 [ 2588.581341][T17017] el0t_64_sync+0x198/0x19c [ 2588.581765][T17017] [ 2588.581765][T17017] other info that might help us debug this: [ 2588.581765][T17017] [ 2588.582157][T17017] Chain exists of: [ 2588.582157][T17017] &nsock->tx_lock --> set->srcu --> &cmd->lock [ 2588.582157][T17017] [ 2588.582857][T17017] Possible unsafe locking scenario: [ 2588.582857][T17017] [ 2588.583276][T17017] CPU0 CPU1 [ 2588.583566][T17017] ---- ---- [ 2588.583879][T17017] lock(&cmd->lock); [ 2588.584327][T17017] lock(set->srcu); [ 2588.584707][T17017] lock(&cmd->lock); [ 2588.585029][T17017] lock(&nsock->tx_lock); [ 2588.585250][T17017] [ 2588.585250][T17017] *** DEADLOCK *** [ 2588.585250][T17017] [ 2588.585513][T17017] 3 locks held by udevd/17017: [ 2588.585727][T17017] #0: ffff0000145af358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 2588.586206][T17017] #1: ffff000014586810 (set->srcu){.+.+}-{0:0}, at: blk_mq_run_hw_queue+0x19c/0x500 [ 2588.586671][T17017] #2: ffff0000201051f8 (&cmd->lock){+.+.}-{4:4}, at: nbd_queue_rq+0xa8/0xb54 [ 2588.587124][T17017] [ 2588.587124][T17017] stack backtrace: [ 2588.588156][T17017] CPU: 1 UID: 0 PID: 17017 Comm: udevd Not tainted syzkaller #0 PREEMPT [ 2588.588470][T17017] Hardware name: linux,dummy-virt (DT) [ 2588.588936][T17017] Call trace: [ 2588.589244][T17017] show_stack+0x18/0x24 (C) [ 2588.589561][T17017] dump_stack_lvl+0xa4/0xf4 [ 2588.589769][T17017] dump_stack+0x1c/0x28 [ 2588.589924][T17017] print_circular_bug+0x28c/0x370 [ 2588.590152][T17017] check_noncircular+0x168/0x17c [ 2588.590321][T17017] __lock_acquire+0x1638/0x2380 [ 2588.590597][T17017] lock_acquire+0x310/0x38c [ 2588.590863][T17017] __mutex_lock+0x144/0xffc [ 2588.591153][T17017] mutex_lock_nested+0x24/0x30 [ 2588.591322][T17017] nbd_queue_rq+0x2cc/0xb54 [ 2588.591486][T17017] blk_mq_dispatch_rq_list+0x2d0/0x161c [ 2588.591668][T17017] __blk_mq_sched_dispatch_requests+0xa44/0xe24 [ 2588.591872][T17017] blk_mq_sched_dispatch_requests+0x7c/0x100 [ 2588.592159][T17017] blk_mq_run_hw_queue+0x1e4/0x500 [ 2588.592335][T17017] blk_mq_dispatch_list+0x348/0xa50 [ 2588.592512][T17017] blk_mq_flush_plug_list+0xe8/0x508 [ 2588.592688][T17017] __blk_flush_plug+0x208/0x3b8 [ 2588.592866][T17017] __submit_bio+0x3a4/0x4ac [ 2588.593021][T17017] submit_bio_noacct_nocheck+0x59c/0xa8c [ 2588.593202][T17017] submit_bio_noacct+0x858/0x18f8 [ 2588.593376][T17017] submit_bio+0x32c/0x5f0 [ 2588.593529][T17017] submit_bh_wbc+0x310/0x480 [ 2588.593688][T17017] block_read_full_folio+0x26c/0x640 [ 2588.593919][T17017] blkdev_read_folio+0x1c/0x28 [ 2588.594252][T17017] filemap_read_folio+0xac/0x1fc [ 2588.594594][T17017] do_read_cache_folio+0x1c4/0x480 [ 2588.594905][T17017] read_cache_folio+0x44/0x6c [ 2588.595083][T17017] read_part_sector+0xac/0x5f4 [ 2588.595257][T17017] read_lba+0x15c/0x2ec [ 2588.595564][T17017] efi_partition+0x1dc/0x2154 [ 2588.595959][T17017] bdev_disk_changed+0x508/0xf0c [ 2588.596289][T17017] blkdev_get_whole+0x144/0x1e4 [ 2588.596471][T17017] bdev_open+0x1dc/0xa84 [ 2588.596629][T17017] blkdev_open+0x1d4/0x324 [ 2588.596803][T17017] do_dentry_open+0x6a4/0x103c [ 2588.596976][T17017] vfs_open+0x5c/0x2fc [ 2588.597128][T17017] path_openat+0x1490/0x24b4 [ 2588.597291][T17017] do_filp_open+0x184/0x360 [ 2588.597583][T17017] do_sys_openat2+0xe0/0x160 [ 2588.597810][T17017] __arm64_sys_openat+0x12c/0x1bc [ 2588.597993][T17017] invoke_syscall+0x6c/0x258 [ 2588.598158][T17017] el0_svc_common.constprop.0+0xac/0x230 [ 2588.598364][T17017] do_el0_svc+0x40/0x58 [ 2588.598521][T17017] el0_svc+0x50/0x1a0 [ 2588.598674][T17017] el0t_64_sync_handler+0xa0/0xe4 [ 2588.598853][T17017] el0t_64_sync+0x198/0x19c [ 2588.604088][ T48] block nbd0: Receive control failed (result -32) [ 2588.608894][T17017] block nbd0: Dead connection, failed to find a fallback [ 2588.609072][T17017] block nbd0: shutting down sockets [ 2588.609586][T17017] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2588.609901][T17017] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2588.612050][T17017] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2588.612148][T17017] Buffer I/O error on dev nbd0, logical block 1, async page read [ 2588.613906][T17017] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2588.614024][T17017] Buffer I/O error on dev nbd0, logical block 2, async page read [ 2588.614452][T17017] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2588.614517][T17017] Buffer I/O error on dev nbd0, logical block 3, async page read [ 2588.615266][T17017] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2588.615339][T17017] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2588.615706][T17017] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2588.615828][T17017] Buffer I/O error on dev nbd0, logical block 1, async page read [ 2588.616195][T17017] I/O error, dev nbd0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2588.616258][T17017] Buffer I/O error on dev nbd0, logical block 2, async page read [ 2588.616596][T17017] I/O error, dev nbd0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2588.616659][T17017] Buffer I/O error on dev nbd0, logical block 3, async page read [ 2588.616986][T17017] nbd0: unable to read partition table [ 2588.662094][T17017] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2588.662449][T17017] Buffer I/O error on dev nbd0, logical block 0, async page read [ 2588.663311][T17017] I/O error, dev nbd0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 2588.663390][T17017] Buffer I/O error on dev nbd0, logical block 1, async page read [ 2588.666812][T17017] nbd0: unable to read partition table VM DIAGNOSIS: 17:32:56 Registers: info registers vcpu 0 CPU#0 PC=ffff800084acb88c X00=0000000080029820 X01=0000000000000000 X02=0000000000000000 X03=1fffe00002e0d080 X04=0000000000000000 X05=0000000000000000 X06=ffff800084acb9a4 X07=ffff00001ec045c8 X08=ffff000017068000 X09=dfff800000000000 X10=ffff600002a99a40 X11=1fffe00002a99a40 X12=ffff600002a99a41 X13=0000000000000000 X14=1fffe00002a99acd X15=ffff00001efcec80 X16=0000000000000000 X17=1fffe00002a999e0 X18=ffff00001efcec90 X19=ffff00000f009200 X20=ffff00001ec04500 X21=ffff800080006980 X22=1fffe00001e01240 X23=ffff0000154ccc80 X24=ffff00000f009200 X25=ffff0000173b0000 X26=ffff000022f0b9d8 X27=ffff0000154ccc80 X28=1fffe00003d808b9 X29=ffff800080006860 X30=ffff80008031d294 SP=ffff800080006860 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000854230c4 X00=0000000000000002 X01=0000000000000000 X02=1ffff00010d5a0f7 X03=0000000000000000 X04=ffffffffffffffd0 X05=0000000000000040 X06=000000000000003f X07=0000000000000000 X08=ffff8000a16c598a X09=0000000000000000 X10=ffff7000142d8b31 X11=1ffff000142d8b31 X12=ffff7000142d8b32 X13=0000000000000006 X14=0000000000000000 X15=fffffffffffec928 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff8000a16c5dd8 X20=ffff800086ad07ba X21=dfff800000000000 X22=1ffff000142d8ad6 X23=ffff8000820701f8 X24=ffff8000a16c5dd8 X25=ffff8000a16c5bb0 X26=00000000ffffffff X27=ffff8000a16c5dd8 X28=0000000000000006 X29=ffff8000a16c5650 X30=ffff800085423088 SP=ffff8000a16c5650 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000