last executing test programs: 1m33.206740234s ago: executing program 0 (id=2733): r0 = socket$igmp(0x2, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000500), 0x4) setsockopt$MRT_ADD_MFC(r0, 0x0, 0x5, &(0x7f00000019c0)={@loopback, @multicast2, 0xffc, "544e6b24af869c8bcbb43306faffff14001600000000000200005e00", 0xa5, 0x0, 0xfffffffd, 0x1}, 0x3c) 1m31.845397814s ago: executing program 0 (id=2735): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) lsm_list_modules(&(0x7f0000000980)=[0x0, 0x0], &(0x7f0000000a40)=0x10, 0x0) 1m30.418218586s ago: executing program 0 (id=2737): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0}], 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x9, 0x4, 0x7fe1, 0x4, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3}, &(0x7f0000000580), &(0x7f0000000480)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r4}, 0x10) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f0000000140)={0x28, 0x0, 0x0, @my=0x1}, 0x10) 58.639141079s ago: executing program 0 (id=2757): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 57.551690011s ago: executing program 0 (id=2759): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000140)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)={0x38, 0x1403, 0x1, 0x0, 0x0, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'team_slave_0\x00'}}]}, 0x38}}, 0x0) 56.650354537s ago: executing program 0 (id=2760): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x44, 0x0, 0x8, 0x101, 0x0, 0x0, {0x1, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8848}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x81}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x71a5039d}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x40) 56.646312557s ago: executing program 32 (id=2760): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x44, 0x0, 0x8, 0x101, 0x0, 0x0, {0x1, 0x0, 0x7}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x8848}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x81}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x71a5039d}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}]}, 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x40) 36.268594075s ago: executing program 1 (id=2772): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2}, 0x10) ioctl$TCSETSW2(r0, 0x5453, 0x0) 34.435190959s ago: executing program 1 (id=2773): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 32.084575798s ago: executing program 1 (id=2774): socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001dc0)=ANY=[@ANYBLOB="1b000000060000000300187200800000a95afe80", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000050000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$AUDIT_USER_AVC(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000005304"], 0x14}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) 29.109850635s ago: executing program 1 (id=2775): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000340)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) close(r2) 28.161417863s ago: executing program 1 (id=2776): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x11, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000100)='kfree\x00', r0}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 0s ago: executing program 1 (id=2777): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1}, 0x18) sendmmsg(r0, &(0x7f0000003e40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="b875a1431a05b9319c", 0x9}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/189}, {&(0x7f00000002c0)=""/182}, {&(0x7f0000000380)=""/4096}, {&(0x7f0000001380)=""/198}, {&(0x7f0000001480)=""/169}, {&(0x7f0000001540)=""/4096}], 0x10, &(0x7f0000002540)=""/216}}], 0x2, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000002880)=[{{0x0, 0x0, &(0x7f00000027c0)=[{&(0x7f0000000180)="f1", 0x1}], 0x1}}], 0x1, 0x0) kernel console output (not intermixed with test programs): scriptor read/64, error -71 [ 2371.602797][T11882] usb usb2-port1: attempt power cycle [ 2371.970300][T11882] usb 2-1: new low-speed USB device number 8 using dummy_hcd [ 2372.008970][T11882] usb 2-1: device descriptor read/8, error -71 [ 2372.261908][T11882] usb 2-1: new low-speed USB device number 9 using dummy_hcd [ 2372.305659][T11882] usb 2-1: device descriptor read/8, error -71 [ 2372.420832][T11882] usb usb2-port1: unable to enumerate USB device [ 2374.482326][ T31] kauditd_printk_skb: 120 callbacks suppressed [ 2374.482430][ T31] audit: type=1400 audit(2000000512.860:35411): avc: denied { prog_load } for pid=13929 comm="syz.0.2569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2374.492613][ T31] audit: type=1400 audit(2000000512.870:35412): avc: denied { bpf } for pid=13929 comm="syz.0.2569" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2374.504168][ T31] audit: type=1400 audit(2000000512.880:35413): avc: denied { prog_load } for pid=13929 comm="syz.0.2569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2374.507987][ T31] audit: type=1400 audit(2000000512.880:35414): avc: denied { bpf } for pid=13929 comm="syz.0.2569" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2374.508855][ T31] audit: type=1400 audit(2000000512.880:35415): avc: denied { perfmon } for pid=13929 comm="syz.0.2569" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2374.518511][ T31] audit: type=1400 audit(2000000512.890:35416): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2374.526071][ T31] audit: type=1400 audit(2000000512.900:35417): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2374.529009][ T31] audit: type=1400 audit(2000000512.900:35418): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2374.538453][ T31] audit: type=1400 audit(2000000512.920:35419): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2374.547619][ T31] audit: type=1400 audit(2000000512.930:35420): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2380.531735][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 2380.532014][ T31] audit: type=1400 audit(2000000518.910:35444): avc: denied { prog_load } for pid=13936 comm="syz.0.2571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2380.533026][ T31] audit: type=1400 audit(2000000518.910:35445): avc: denied { bpf } for pid=13936 comm="syz.0.2571" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2380.538161][ T31] audit: type=1400 audit(2000000518.910:35446): avc: denied { perfmon } for pid=13936 comm="syz.0.2571" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2380.538904][ T31] audit: type=1400 audit(2000000518.910:35447): avc: denied { perfmon } for pid=13936 comm="syz.0.2571" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2380.561884][ T31] audit: type=1400 audit(2000000518.930:35449): avc: denied { perfmon } for pid=13936 comm="syz.0.2571" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2380.562516][ T31] audit: type=1400 audit(2000000518.930:35450): avc: denied { perfmon } for pid=13936 comm="syz.0.2571" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2380.599689][ T31] audit: type=1400 audit(2000000518.930:35448): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2380.619100][ T31] audit: type=1400 audit(2000000518.990:35451): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2380.620443][ T31] audit: type=1400 audit(2000000518.990:35452): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2380.620891][ T31] audit: type=1400 audit(2000000518.990:35453): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2381.532696][T13944] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13944 comm=syz.0.2573 [ 2385.592375][ T31] kauditd_printk_skb: 77 callbacks suppressed [ 2385.596561][ T31] audit: type=1400 audit(2000000523.970:35531): avc: denied { prog_load } for pid=13952 comm="syz.1.2576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2385.611055][ T31] audit: type=1400 audit(2000000523.980:35532): avc: denied { bpf } for pid=13952 comm="syz.1.2576" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.620169][ T31] audit: type=1400 audit(2000000523.990:35533): avc: denied { perfmon } for pid=13952 comm="syz.1.2576" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.632103][ T31] audit: type=1400 audit(2000000524.010:35534): avc: denied { ioctl } for pid=13949 comm="syz.0.2575" path="/dev/snd/seq" dev="devtmpfs" ino=713 ioctlcmd=0x5335 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2385.649747][ T31] audit: type=1400 audit(2000000524.010:35535): avc: denied { perfmon } for pid=13952 comm="syz.1.2576" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.666839][ T31] audit: type=1400 audit(2000000524.040:35536): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2385.668399][ T31] audit: type=1400 audit(2000000524.040:35537): avc: denied { perfmon } for pid=13952 comm="syz.1.2576" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.672401][ T31] audit: type=1400 audit(2000000524.050:35538): avc: denied { perfmon } for pid=13952 comm="syz.1.2576" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.683552][ T31] audit: type=1400 audit(2000000524.060:35539): avc: denied { perfmon } for pid=13952 comm="syz.1.2576" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.694015][ T31] audit: type=1400 audit(2000000524.070:35540): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2388.323421][T13970] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2580'. [ 2388.324240][T13970] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2580'. [ 2388.339235][T13970] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2580'. [ 2388.353133][T13970] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2580'. [ 2390.879995][ T31] kauditd_printk_skb: 123 callbacks suppressed [ 2390.880104][ T31] audit: type=1400 audit(2000000529.240:35664): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2390.884068][ T31] audit: type=1400 audit(2000000529.260:35665): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2390.890135][ T31] audit: type=1400 audit(2000000529.260:35666): avc: denied { ioctl } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2390.955988][ T31] audit: type=1400 audit(2000000529.330:35667): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2390.984647][ T31] audit: type=1400 audit(2000000529.360:35668): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2390.989062][ T31] audit: type=1400 audit(2000000529.360:35669): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2391.010384][ T31] audit: type=1400 audit(2000000529.380:35670): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2391.014854][ T31] audit: type=1400 audit(2000000529.390:35671): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2391.037008][ T31] audit: type=1400 audit(2000000529.410:35672): avc: denied { create } for pid=13979 comm="syz.0.2585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2391.064956][ T31] audit: type=1400 audit(2000000529.430:35673): avc: denied { prog_load } for pid=13979 comm="syz.0.2585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2391.616054][T13982] IPv6: Can't replace route, no match found [ 2392.261865][T13984] netlink: 'syz.0.2587': attribute type 9 has an invalid length. [ 2396.122258][ T31] kauditd_printk_skb: 153 callbacks suppressed [ 2396.122349][ T31] audit: type=1326 audit(2000000534.500:35827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14004 comm="syz.1.2596" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2396.124028][ T31] audit: type=1326 audit(2000000534.500:35828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14004 comm="syz.1.2596" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2396.136591][ T31] audit: type=1400 audit(2000000534.510:35829): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2396.140282][ T31] audit: type=1326 audit(2000000534.510:35830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14004 comm="syz.1.2596" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 2396.167560][ T31] audit: type=1400 audit(2000000534.540:35831): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2396.168124][ T31] audit: type=1400 audit(2000000534.540:35832): avc: denied { map_create } for pid=14004 comm="syz.1.2596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2396.168546][ T31] audit: type=1400 audit(2000000534.540:35833): avc: denied { bpf } for pid=14004 comm="syz.1.2596" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2396.169104][ T31] audit: type=1400 audit(2000000534.540:35834): avc: denied { map_read map_write } for pid=14004 comm="syz.1.2596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2396.182110][ T31] audit: type=1326 audit(2000000534.540:35835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14004 comm="syz.1.2596" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2396.182682][ T31] audit: type=1400 audit(2000000534.550:35836): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2396.303304][T14006] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2597'. [ 2401.136030][ T31] kauditd_printk_skb: 121 callbacks suppressed [ 2401.136120][ T31] audit: type=1400 audit(2000000539.510:35958): avc: denied { bpf } for pid=14057 comm="syz.1.2604" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2401.144242][ T31] audit: type=1400 audit(2000000539.520:35959): avc: denied { perfmon } for pid=14057 comm="syz.1.2604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2401.150281][ T31] audit: type=1400 audit(2000000539.520:35960): avc: denied { perfmon } for pid=14057 comm="syz.1.2604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2401.151180][ T31] audit: type=1400 audit(2000000539.520:35961): avc: denied { sys_module } for pid=14051 comm="syz.0.2602" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2401.151847][ T31] audit: type=1400 audit(2000000539.520:35962): avc: denied { perfmon } for pid=14057 comm="syz.1.2604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2401.160305][ T31] audit: type=1400 audit(2000000539.530:35963): avc: denied { perfmon } for pid=14057 comm="syz.1.2604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2401.173715][ T31] audit: type=1400 audit(2000000539.540:35964): avc: denied { module_request } for pid=14051 comm="syz.0.2602" kmod="" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2401.206647][ T31] audit: type=1400 audit(2000000539.560:35965): avc: denied { perfmon } for pid=14057 comm="syz.1.2604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2401.207571][ T31] audit: type=1400 audit(2000000539.570:35966): avc: denied { bpf } for pid=14057 comm="syz.1.2604" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2401.208382][ T31] audit: type=1400 audit(2000000539.580:35967): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2406.300149][ T31] kauditd_printk_skb: 139 callbacks suppressed [ 2406.300261][ T31] audit: type=1400 audit(2000000544.670:36107): avc: denied { read write } for pid=13035 comm="syz-executor" name="loop0" dev="devtmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2406.301525][ T31] audit: type=1400 audit(2000000544.670:36108): avc: denied { read write open } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2406.302141][ T31] audit: type=1400 audit(2000000544.670:36109): avc: denied { ioctl } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=793 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2406.360046][ T31] audit: type=1400 audit(2000000544.720:36110): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2406.385188][ T31] audit: type=1400 audit(2000000544.760:36111): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2406.388863][ T31] audit: type=1400 audit(2000000544.760:36112): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2406.411512][ T31] audit: type=1400 audit(2000000544.790:36113): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2406.415813][ T31] audit: type=1400 audit(2000000544.790:36114): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2406.682119][ T31] audit: type=1400 audit(2000000545.060:36115): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2406.730703][ T31] audit: type=1400 audit(2000000545.100:36116): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2411.471514][ T31] kauditd_printk_skb: 108 callbacks suppressed [ 2411.471576][ T31] audit: type=1400 audit(2000000549.850:36225): avc: denied { map_create } for pid=14116 comm="syz.1.2618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2411.493498][ T31] audit: type=1400 audit(2000000549.870:36226): avc: denied { map_read map_write } for pid=14116 comm="syz.1.2618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2411.496857][ T31] audit: type=1400 audit(2000000549.870:36227): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2411.499921][ T31] audit: type=1400 audit(2000000549.870:36228): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2411.524128][ T31] audit: type=1400 audit(2000000549.880:36229): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2411.525134][ T31] audit: type=1400 audit(2000000549.900:36230): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2411.525866][ T31] audit: type=1400 audit(2000000549.900:36231): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2411.580253][ T31] audit: type=1400 audit(2000000549.950:36232): avc: denied { create } for pid=14116 comm="syz.1.2618" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2411.581332][ T31] audit: type=1400 audit(2000000549.950:36233): avc: denied { map } for pid=14116 comm="syz.1.2618" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28442 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2411.593478][ T31] audit: type=1400 audit(2000000549.970:36234): avc: denied { read write } for pid=14116 comm="syz.1.2618" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28442 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2415.678051][T14150] syz.1.2626: attempt to access beyond end of device [ 2415.678051][T14150] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 2416.485294][ T31] kauditd_printk_skb: 283 callbacks suppressed [ 2416.485379][ T31] audit: type=1326 audit(2000000554.860:36518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14153 comm="syz.0.2627" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000 [ 2416.500129][ T31] audit: type=1326 audit(2000000554.860:36519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14153 comm="syz.0.2627" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000 [ 2416.501574][ T31] audit: type=1326 audit(2000000554.860:36520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14153 comm="syz.0.2627" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x133450 code=0x7ffc0000 [ 2416.502362][ T31] audit: type=1326 audit(2000000554.870:36521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14153 comm="syz.0.2627" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000 [ 2416.503259][ T31] audit: type=1326 audit(2000000554.870:36522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14153 comm="syz.0.2627" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000 [ 2416.505467][ T31] audit: type=1326 audit(2000000554.870:36523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14153 comm="syz.0.2627" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x133450 code=0x7ffc0000 [ 2416.506326][ T31] audit: type=1326 audit(2000000554.880:36524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14153 comm="syz.0.2627" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000 [ 2416.507921][ T31] audit: type=1326 audit(2000000554.880:36525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14153 comm="syz.0.2627" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000 [ 2416.529953][ T31] audit: type=1326 audit(2000000554.900:36526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14153 comm="syz.0.2627" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000 [ 2416.531009][ T31] audit: type=1326 audit(2000000554.900:36527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14153 comm="syz.0.2627" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000 [ 2421.599970][ T31] kauditd_printk_skb: 658 callbacks suppressed [ 2421.600079][ T31] audit: type=1400 audit(2000000559.970:37186): avc: denied { create } for pid=14177 comm="syz.0.2634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2421.628642][ T31] audit: type=1400 audit(2000000560.000:37187): avc: denied { bind } for pid=14177 comm="syz.0.2634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2421.663679][ T31] audit: type=1400 audit(2000000560.020:37188): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2421.664590][ T31] audit: type=1400 audit(2000000560.020:37189): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2421.665326][ T31] audit: type=1400 audit(2000000560.030:37190): avc: denied { connect } for pid=14177 comm="syz.0.2634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2421.688478][ T31] audit: type=1400 audit(2000000560.060:37191): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2421.703159][ T31] audit: type=1400 audit(2000000560.080:37192): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2421.713700][ T31] audit: type=1400 audit(2000000560.090:37193): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2421.949218][ T31] audit: type=1400 audit(2000000560.320:37194): avc: denied { read write } for pid=13035 comm="syz-executor" name="loop0" dev="devtmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2421.963821][ T31] audit: type=1400 audit(2000000560.340:37195): avc: denied { read write open } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2426.613006][ T31] kauditd_printk_skb: 136 callbacks suppressed [ 2426.613093][ T31] audit: type=1400 audit(2000000564.990:37332): avc: denied { read } for pid=14223 comm="syz.0.2641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2426.615283][ T31] audit: type=1400 audit(2000000564.990:37333): avc: denied { write } for pid=14223 comm="syz.0.2641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2426.673717][ T31] audit: type=1400 audit(2000000565.050:37334): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2426.693603][ T31] audit: type=1400 audit(2000000565.070:37335): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2426.694399][ T31] audit: type=1400 audit(2000000565.070:37336): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2426.695181][ T31] audit: type=1400 audit(2000000565.070:37337): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2426.721643][ T31] audit: type=1400 audit(2000000565.100:37338): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2427.038367][ T31] audit: type=1400 audit(2000000565.410:37339): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2427.054254][ T31] audit: type=1400 audit(2000000565.430:37340): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2427.055534][ T31] audit: type=1400 audit(2000000565.430:37341): avc: denied { ioctl } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2431.628182][ T31] kauditd_printk_skb: 82 callbacks suppressed [ 2431.628292][ T31] audit: type=1400 audit(2000000570.000:37424): avc: denied { read write } for pid=13035 comm="syz-executor" name="loop0" dev="devtmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2431.657296][ T31] audit: type=1400 audit(2000000570.030:37425): avc: denied { read write open } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2431.663318][ T31] audit: type=1400 audit(2000000570.040:37426): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2431.664195][ T31] audit: type=1400 audit(2000000570.040:37427): avc: denied { ioctl } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=793 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2431.690341][ T31] audit: type=1400 audit(2000000570.050:37428): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2431.691160][ T31] audit: type=1400 audit(2000000570.060:37429): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2431.691723][ T31] audit: type=1400 audit(2000000570.060:37430): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2431.742863][ T31] audit: type=1400 audit(2000000570.110:37431): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2431.745784][ T31] audit: type=1400 audit(2000000570.120:37432): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2431.752812][ T31] audit: type=1400 audit(2000000570.130:37433): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2434.078481][T14268] sctp: [Deprecated]: syz.0.2653 (pid 14268) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2434.078481][T14268] Use struct sctp_sack_info instead [ 2436.764886][ T31] kauditd_printk_skb: 90 callbacks suppressed [ 2436.764995][ T31] audit: type=1400 audit(2000000575.130:37524): avc: denied { module_request } for pid=14272 comm="syz.0.2656" kmod="fs-autofs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2436.800935][ T31] audit: type=1400 audit(2000000575.180:37525): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2436.817093][ T31] audit: type=1400 audit(2000000575.190:37526): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2436.826092][ T31] audit: type=1400 audit(2000000575.200:37527): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2436.851265][ T31] audit: type=1400 audit(2000000575.230:37528): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2436.856109][ T31] audit: type=1400 audit(2000000575.230:37529): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2437.283604][ T31] audit: type=1400 audit(2000000575.660:37530): avc: denied { map_create } for pid=14272 comm="syz.0.2656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2437.286436][ T31] audit: type=1400 audit(2000000575.660:37531): avc: denied { bpf } for pid=14272 comm="syz.0.2656" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2437.303284][ T31] audit: type=1400 audit(2000000575.680:37532): avc: denied { map_read map_write } for pid=14272 comm="syz.0.2656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2437.309541][ T31] audit: type=1400 audit(2000000575.680:37533): avc: denied { prog_load } for pid=14272 comm="syz.0.2656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2441.770641][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 2441.770690][ T31] audit: type=1400 audit(2000000580.150:37576): avc: denied { perfmon } for pid=14281 comm="syz.0.2659" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2441.775050][ T31] audit: type=1400 audit(2000000580.150:37577): avc: denied { perfmon } for pid=14281 comm="syz.0.2659" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2441.782094][ T31] audit: type=1400 audit(2000000580.160:37578): avc: denied { perfmon } for pid=14281 comm="syz.0.2659" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2441.784043][ T31] audit: type=1400 audit(2000000580.160:37579): avc: denied { perfmon } for pid=14281 comm="syz.0.2659" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2441.791608][ T31] audit: type=1400 audit(2000000580.170:37580): avc: denied { perfmon } for pid=14281 comm="syz.0.2659" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2441.793662][ T31] audit: type=1400 audit(2000000580.170:37581): avc: denied { bpf } for pid=14281 comm="syz.0.2659" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2441.800739][ T31] audit: type=1400 audit(2000000580.180:37582): avc: denied { bpf } for pid=14281 comm="syz.0.2659" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2441.803308][ T31] audit: type=1400 audit(2000000580.180:37583): avc: denied { prog_run } for pid=14281 comm="syz.0.2659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2441.816582][ T31] audit: type=1400 audit(2000000580.190:37584): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2441.848912][ T31] audit: type=1400 audit(2000000580.210:37585): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2447.012124][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 2447.012246][ T31] audit: type=1400 audit(2000000585.390:37634): avc: denied { read write } for pid=13035 comm="syz-executor" name="loop0" dev="devtmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2447.024659][ T31] audit: type=1400 audit(2000000585.390:37635): avc: denied { read write open } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2447.025730][ T31] audit: type=1400 audit(2000000585.400:37636): avc: denied { ioctl } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=793 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2447.046585][ T31] audit: type=1400 audit(2000000585.420:37637): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2447.069928][ T31] audit: type=1400 audit(2000000585.440:37638): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2447.070995][ T31] audit: type=1400 audit(2000000585.440:37639): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2447.083030][ T31] audit: type=1400 audit(2000000585.460:37640): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2447.110191][ T31] audit: type=1400 audit(2000000585.480:37641): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2447.843123][ T31] audit: type=1400 audit(2000000586.220:37642): avc: denied { prog_load } for pid=14295 comm="syz.0.2664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2447.844021][ T31] audit: type=1400 audit(2000000586.220:37643): avc: denied { bpf } for pid=14295 comm="syz.0.2664" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2452.194877][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 2452.194947][ T31] audit: type=1400 audit(2000000590.570:37661): avc: denied { read } for pid=14295 comm="syz.0.2664" dev="nsfs" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2452.197460][ T31] audit: type=1400 audit(2000000590.570:37662): avc: denied { read open } for pid=14295 comm="syz.0.2664" path="net:[4026532756]" dev="nsfs" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2452.217165][ T31] audit: type=1400 audit(2000000590.590:37663): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2452.243159][ T31] audit: type=1400 audit(2000000590.620:37664): avc: denied { create } for pid=14295 comm="syz.0.2664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2452.245441][ T31] audit: type=1400 audit(2000000590.620:37665): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2452.248091][ T31] audit: type=1400 audit(2000000590.620:37666): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2452.272113][ T31] audit: type=1400 audit(2000000590.650:37667): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2452.275864][ T31] audit: type=1400 audit(2000000590.650:37668): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2452.853600][ T31] audit: type=1400 audit(2000000591.230:37669): avc: denied { read } for pid=14295 comm="syz.0.2664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2452.888038][ T31] audit: type=1400 audit(2000000591.260:37670): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2457.400632][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 2457.400776][ T31] audit: type=1400 audit(2000000595.780:37675): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2457.403025][ T31] audit: type=1400 audit(2000000595.780:37676): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2457.405946][ T31] audit: type=1400 audit(2000000595.780:37677): avc: denied { ioctl } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2457.435709][ T31] audit: type=1400 audit(2000000595.810:37678): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2457.462561][ T31] audit: type=1400 audit(2000000595.840:37679): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2457.471966][ T31] audit: type=1400 audit(2000000595.850:37680): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2457.474226][ T31] audit: type=1400 audit(2000000595.850:37681): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2457.477407][ T31] audit: type=1400 audit(2000000595.850:37682): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2457.997453][ T31] audit: type=1326 audit(2000000596.370:37683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14301 comm="syz.1.2665" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2457.998271][ T31] audit: type=1326 audit(2000000596.370:37684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14301 comm="syz.1.2665" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2462.453232][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 2462.453345][ T31] audit: type=1400 audit(2000000600.820:37722): avc: denied { read } for pid=14303 comm="syz.1.2666" name="loop-control" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2462.462516][ T31] audit: type=1400 audit(2000000600.820:37723): avc: denied { read open } for pid=14303 comm="syz.1.2666" path="/dev/loop-control" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2462.463361][ T31] audit: type=1400 audit(2000000600.830:37724): avc: denied { ioctl } for pid=14303 comm="syz.1.2666" path="/dev/loop-control" dev="devtmpfs" ino=634 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2462.480794][ T31] audit: type=1400 audit(2000000600.850:37725): avc: denied { ioctl } for pid=14303 comm="syz.1.2666" path="/dev/loop-control" dev="devtmpfs" ino=634 ioctlcmd=0x4c81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2462.507138][ T31] audit: type=1400 audit(2000000600.880:37726): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2462.543770][ T31] audit: type=1400 audit(2000000600.920:37727): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2462.546642][ T31] audit: type=1400 audit(2000000600.920:37728): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2462.578321][ T31] audit: type=1400 audit(2000000600.950:37729): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2462.593526][ T31] audit: type=1400 audit(2000000600.970:37730): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2462.595979][ T31] audit: type=1400 audit(2000000600.970:37731): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2469.787850][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 2469.787963][ T31] audit: type=1326 audit(2000000608.160:37738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14309 comm="syz.0.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2469.819722][ T31] audit: type=1326 audit(2000000608.180:37739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14309 comm="syz.0.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2469.820521][ T31] audit: type=1326 audit(2000000608.180:37740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14309 comm="syz.0.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 2469.825626][ T31] audit: type=1400 audit(2000000608.200:37741): avc: denied { prog_load } for pid=14309 comm="syz.0.2667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2469.832994][ T31] audit: type=1400 audit(2000000608.210:37742): avc: denied { bpf } for pid=14309 comm="syz.0.2667" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2469.833906][ T31] audit: type=1326 audit(2000000608.210:37743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14309 comm="syz.0.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2469.839560][ T31] audit: type=1326 audit(2000000608.210:37744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14309 comm="syz.0.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2469.840373][ T31] audit: type=1326 audit(2000000608.210:37745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14309 comm="syz.0.2667" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x133450 code=0x7ffc0000 [ 2469.850082][ T31] audit: type=1400 audit(2000000608.220:37746): avc: denied { prog_load } for pid=14309 comm="syz.0.2667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2469.860088][ T31] audit: type=1400 audit(2000000608.230:37747): avc: denied { bpf } for pid=14309 comm="syz.0.2667" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2474.825380][ T31] kauditd_printk_skb: 90 callbacks suppressed [ 2474.825507][ T31] audit: type=1400 audit(2000000613.200:37838): avc: denied { setopt } for pid=14319 comm="syz.0.2671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2474.878542][ T31] audit: type=1400 audit(2000000613.250:37839): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2474.897065][ T31] audit: type=1400 audit(2000000613.270:37840): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2474.906147][ T31] audit: type=1400 audit(2000000613.270:37841): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2474.995374][ T31] audit: type=1400 audit(2000000613.370:37842): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2475.000369][ T31] audit: type=1400 audit(2000000613.370:37843): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2475.510838][ T31] audit: type=1400 audit(2000000613.880:37844): avc: denied { read } for pid=14321 comm="syz.0.2672" dev="nsfs" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2475.550257][ T31] audit: type=1400 audit(2000000613.920:37845): avc: denied { read open } for pid=14321 comm="syz.0.2672" path="net:[4026532756]" dev="nsfs" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2475.563906][ T31] audit: type=1400 audit(2000000613.940:37846): avc: denied { create } for pid=14321 comm="syz.0.2672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2475.602370][ T31] audit: type=1400 audit(2000000613.980:37847): avc: denied { read } for pid=14321 comm="syz.0.2672" dev="nsfs" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2479.840500][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 2479.840623][ T31] audit: type=1400 audit(2000000618.210:37902): avc: denied { perfmon } for pid=14331 comm="syz.0.2676" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2479.841663][ T31] audit: type=1400 audit(2000000618.210:37903): avc: denied { perfmon } for pid=14331 comm="syz.0.2676" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2479.854844][ T31] audit: type=1400 audit(2000000618.220:37904): avc: denied { perfmon } for pid=14331 comm="syz.0.2676" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2479.855779][ T31] audit: type=1400 audit(2000000618.230:37905): avc: denied { perfmon } for pid=14331 comm="syz.0.2676" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2479.856592][ T31] audit: type=1400 audit(2000000618.230:37906): avc: denied { perfmon } for pid=14331 comm="syz.0.2676" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2479.886324][ T31] audit: type=1400 audit(2000000618.230:37907): avc: denied { bpf } for pid=14331 comm="syz.0.2676" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2479.887207][ T31] audit: type=1400 audit(2000000618.240:37908): avc: denied { bpf } for pid=14331 comm="syz.0.2676" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2479.887786][ T31] audit: type=1400 audit(2000000618.250:37909): avc: denied { prog_run } for pid=14331 comm="syz.0.2676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2479.942294][ T31] audit: type=1400 audit(2000000618.300:37910): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2479.963744][ T31] audit: type=1400 audit(2000000618.330:37911): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2484.853588][ T31] kauditd_printk_skb: 158 callbacks suppressed [ 2484.853679][ T31] audit: type=1400 audit(2000000623.230:38070): avc: denied { create } for pid=14352 comm="syz.0.2686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2484.875214][ T31] audit: type=1400 audit(2000000623.250:38071): avc: denied { create } for pid=14352 comm="syz.0.2686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2484.888053][ T31] audit: type=1400 audit(2000000623.260:38072): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2484.913809][ T31] audit: type=1400 audit(2000000623.280:38073): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2484.915214][ T31] audit: type=1400 audit(2000000623.280:38074): avc: denied { ioctl } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2484.915998][ T31] audit: type=1400 audit(2000000623.280:38075): avc: denied { create } for pid=14352 comm="syz.0.2686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2484.916554][ T31] audit: type=1400 audit(2000000623.280:38076): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2484.931710][ T31] audit: type=1400 audit(2000000623.300:38077): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2484.932659][ T31] audit: type=1400 audit(2000000623.300:38078): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2484.940565][ T31] audit: type=1400 audit(2000000623.300:38079): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2490.157056][ T31] kauditd_printk_skb: 90 callbacks suppressed [ 2490.157169][ T31] audit: type=1400 audit(2000000628.530:38170): avc: denied { create } for pid=14368 comm="syz.1.2694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2490.167742][ T31] audit: type=1400 audit(2000000628.530:38171): avc: denied { unmount } for pid=13035 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2490.168615][ T31] audit: type=1400 audit(2000000628.540:38172): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2490.190716][ T31] audit: type=1400 audit(2000000628.560:38173): avc: denied { prog_load } for pid=14368 comm="syz.1.2694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2490.191595][ T31] audit: type=1400 audit(2000000628.560:38174): avc: denied { bpf } for pid=14368 comm="syz.1.2694" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2490.192882][ T31] audit: type=1400 audit(2000000628.560:38175): avc: denied { perfmon } for pid=14368 comm="syz.1.2694" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2490.221877][ T31] audit: type=1400 audit(2000000628.570:38176): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2490.222866][ T31] audit: type=1400 audit(2000000628.570:38177): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2490.223942][ T31] audit: type=1400 audit(2000000628.580:38178): avc: denied { perfmon } for pid=14368 comm="syz.1.2694" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2490.224648][ T31] audit: type=1400 audit(2000000628.580:38179): avc: denied { perfmon } for pid=14368 comm="syz.1.2694" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2494.643081][T14390] block device autoloading is deprecated and will be removed. [ 2494.643896][T14390] syz.1.2702: attempt to access beyond end of device [ 2494.643896][T14390] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 2495.382435][ T31] kauditd_printk_skb: 130 callbacks suppressed [ 2495.382532][ T31] audit: type=1400 audit(2000000633.760:38310): avc: denied { module_request } for pid=14386 comm="syz.0.2701" kmod="crypto-authenc(digest_null,ecb(cipher_null))-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2496.033594][ T31] audit: type=1400 audit(2000000634.400:38311): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2496.035599][ T31] audit: type=1400 audit(2000000634.400:38312): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2496.092800][ T31] audit: type=1400 audit(2000000634.450:38313): avc: denied { ioctl } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2496.163120][ T31] audit: type=1400 audit(2000000634.540:38314): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2496.188187][ T31] audit: type=1400 audit(2000000634.560:38315): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2496.189066][ T31] audit: type=1400 audit(2000000634.560:38316): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2496.190567][ T31] audit: type=1400 audit(2000000634.560:38317): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2496.250233][ T31] audit: type=1400 audit(2000000634.630:38318): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2496.317323][ T31] audit: type=1400 audit(2000000634.690:38319): avc: denied { module_request } for pid=14386 comm="syz.0.2701" kmod="cryptomgr" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2500.696563][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 2500.696736][ T31] audit: type=1400 audit(2000000639.070:38386): avc: denied { read write } for pid=13035 comm="syz-executor" name="loop0" dev="devtmpfs" ino=795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2500.710143][ T31] audit: type=1400 audit(2000000639.080:38387): avc: denied { read write open } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2500.711468][ T31] audit: type=1400 audit(2000000639.080:38388): avc: denied { ioctl } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=795 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2500.722026][ T31] audit: type=1400 audit(2000000639.090:38389): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2500.748622][ T31] audit: type=1400 audit(2000000639.110:38390): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2500.763632][ T31] audit: type=1400 audit(2000000639.140:38391): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2500.774424][ T31] audit: type=1400 audit(2000000639.150:38392): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2500.835466][ T31] audit: type=1400 audit(2000000639.200:38393): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2501.170674][ T31] audit: type=1400 audit(2000000639.540:38394): avc: denied { prog_load } for pid=14407 comm="syz.1.2708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2501.205355][ T31] audit: type=1400 audit(2000000639.540:38395): avc: denied { bpf } for pid=14407 comm="syz.1.2708" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2505.754557][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 2505.754686][ T31] audit: type=1400 audit(2000000644.120:38488): avc: denied { map_create } for pid=14423 comm="syz.0.2715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2505.770639][ T31] audit: type=1400 audit(2000000644.150:38489): avc: denied { map_read map_write } for pid=14423 comm="syz.0.2715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2505.788544][ T31] audit: type=1400 audit(2000000644.160:38490): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2505.797659][ T31] audit: type=1400 audit(2000000644.170:38491): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2505.845160][ T31] audit: type=1400 audit(2000000644.190:38492): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2505.846197][ T31] audit: type=1400 audit(2000000644.190:38493): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2505.846963][ T31] audit: type=1400 audit(2000000644.220:38494): avc: denied { prog_load } for pid=14423 comm="syz.0.2715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2505.847624][ T31] audit: type=1400 audit(2000000644.220:38495): avc: denied { bpf } for pid=14423 comm="syz.0.2715" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2505.863111][ T31] audit: type=1400 audit(2000000644.220:38496): avc: denied { perfmon } for pid=14423 comm="syz.0.2715" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2505.882983][ T31] audit: type=1400 audit(2000000644.250:38497): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2511.361681][ T31] kauditd_printk_skb: 64 callbacks suppressed [ 2511.362222][ T31] audit: type=1400 audit(2000000649.730:38562): avc: denied { map_create } for pid=14432 comm="syz.0.2719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2511.407313][ T31] audit: type=1400 audit(2000000649.790:38563): avc: denied { perfmon } for pid=14432 comm="syz.0.2719" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2511.412379][ T31] audit: type=1400 audit(2000000649.790:38564): avc: denied { map_read map_write } for pid=14432 comm="syz.0.2719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2511.491358][ T31] audit: type=1400 audit(2000000649.860:38565): avc: denied { prog_load } for pid=14432 comm="syz.0.2719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2511.500155][ T31] audit: type=1400 audit(2000000649.870:38566): avc: denied { bpf } for pid=14432 comm="syz.0.2719" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2511.501184][ T31] audit: type=1400 audit(2000000649.870:38567): avc: denied { perfmon } for pid=14432 comm="syz.0.2719" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2511.530834][ T31] audit: type=1400 audit(2000000649.900:38568): avc: denied { perfmon } for pid=14432 comm="syz.0.2719" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2511.531675][ T31] audit: type=1400 audit(2000000649.900:38570): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2511.532303][ T31] audit: type=1400 audit(2000000649.900:38571): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2511.532901][ T31] audit: type=1400 audit(2000000649.900:38572): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2511.773993][T14433] syz.0.2719[14433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2511.774382][T14433] syz.0.2719[14433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2511.775351][T14433] syz.0.2719[14433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2516.661388][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 2516.661521][ T31] audit: type=1400 audit(2000000655.030:38625): avc: denied { read } for pid=14438 comm="syz.0.2722" dev="nsfs" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2516.663469][ T31] audit: type=1400 audit(2000000655.030:38626): avc: denied { read open } for pid=14438 comm="syz.0.2722" path="net:[4026532756]" dev="nsfs" ino=4026532756 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2516.664064][ T31] audit: type=1400 audit(2000000655.040:38627): avc: denied { create } for pid=14438 comm="syz.0.2722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2516.785258][ T31] audit: type=1400 audit(2000000655.160:38628): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2516.805840][ T31] audit: type=1400 audit(2000000655.180:38629): avc: denied { write } for pid=14438 comm="syz.0.2722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2516.850644][ T31] audit: type=1400 audit(2000000655.210:38630): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2516.854313][ T31] audit: type=1400 audit(2000000655.210:38631): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2516.858853][ T31] audit: type=1400 audit(2000000655.210:38632): avc: denied { read } for pid=14438 comm="syz.0.2722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2516.893728][ T31] audit: type=1400 audit(2000000655.210:38633): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2516.894566][ T31] audit: type=1400 audit(2000000655.210:38634): avc: denied { read } for pid=14438 comm="syz.0.2722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2521.689017][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 2521.692046][ T31] audit: type=1400 audit(2000000660.060:38677): avc: denied { read write } for pid=13035 comm="syz-executor" name="loop0" dev="devtmpfs" ino=795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2521.701656][ T31] audit: type=1400 audit(2000000660.080:38678): avc: denied { read write open } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=795 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2521.705649][ T31] audit: type=1400 audit(2000000660.080:38679): avc: denied { ioctl } for pid=13035 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=795 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2521.754389][ T31] audit: type=1400 audit(2000000660.130:38680): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2521.777659][ T31] audit: type=1400 audit(2000000660.150:38681): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2521.805720][ T31] audit: type=1400 audit(2000000660.180:38682): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2521.818095][ T31] audit: type=1400 audit(2000000660.190:38683): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2521.831688][ T31] audit: type=1400 audit(2000000660.200:38684): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2522.657140][T14453] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2725'. [ 2522.748781][ T31] audit: type=1400 audit(2000000661.120:38685): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2522.787745][ T31] audit: type=1400 audit(2000000661.130:38686): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2526.958482][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2526.958593][ T31] audit: type=1326 audit(2000000665.340:38720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14472 comm="syz.0.2729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2526.964202][ T31] audit: type=1326 audit(2000000665.340:38721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14472 comm="syz.0.2729" exe="/syz-executor" sig=0 arch=40000028 syscall=337 compat=0 ip=0x133450 code=0x7ffc0000 [ 2526.968756][ T31] audit: type=1326 audit(2000000665.340:38722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14472 comm="syz.0.2729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2526.971131][ T31] audit: type=1326 audit(2000000665.350:38723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14472 comm="syz.0.2729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2526.974211][ T31] audit: type=1326 audit(2000000665.350:38724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14472 comm="syz.0.2729" exe="/syz-executor" sig=0 arch=40000028 syscall=303 compat=0 ip=0x133450 code=0x7ffc0000 [ 2526.978022][ T31] audit: type=1326 audit(2000000665.350:38725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14472 comm="syz.0.2729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2526.980192][ T31] audit: type=1326 audit(2000000665.360:38726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14472 comm="syz.0.2729" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 2527.011424][ T31] audit: type=1400 audit(2000000665.380:38727): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2527.091509][ T31] audit: type=1400 audit(2000000665.450:38728): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2527.102466][ T31] audit: type=1400 audit(2000000665.480:38729): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2532.202742][ T31] kauditd_printk_skb: 126 callbacks suppressed [ 2532.202858][ T31] audit: type=1400 audit(2000000670.580:38856): avc: denied { create } for pid=14486 comm="syz.1.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2532.270484][ T31] audit: type=1400 audit(2000000670.640:38857): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2532.315747][ T31] audit: type=1400 audit(2000000670.690:38858): avc: denied { create } for pid=14486 comm="syz.1.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2532.328185][ T31] audit: type=1400 audit(2000000670.700:38859): avc: denied { write } for pid=14486 comm="syz.1.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2532.370103][ T31] audit: type=1400 audit(2000000670.740:38860): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2532.423770][ T31] audit: type=1400 audit(2000000670.760:38861): avc: denied { read } for pid=14486 comm="syz.1.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2532.424820][ T31] audit: type=1400 audit(2000000670.760:38862): avc: denied { read } for pid=14486 comm="syz.1.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2532.425615][ T31] audit: type=1400 audit(2000000670.760:38863): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2532.426409][ T31] audit: type=1400 audit(2000000670.760:38864): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2532.434411][ T31] audit: type=1400 audit(2000000670.810:38865): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2534.636439][T14493] SELinux: security policydb version 18 (MLS) not backwards compatible [ 2534.638950][T14493] SELinux: failed to load policy [ 2537.717787][ T31] kauditd_printk_skb: 64 callbacks suppressed [ 2537.717909][ T31] audit: type=1400 audit(2000000676.090:38930): avc: denied { read } for pid=14494 comm="syz.1.2740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2537.738069][ T31] audit: type=1400 audit(2000000676.110:38931): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2537.740976][ T31] audit: type=1400 audit(2000000676.120:38932): avc: denied { map_create } for pid=14488 comm="syz.0.2737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2537.753428][ T31] audit: type=1400 audit(2000000676.130:38933): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2537.770311][ T31] audit: type=1400 audit(2000000676.140:38934): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2537.794587][ T31] audit: type=1400 audit(2000000676.170:38935): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2537.801446][ T31] audit: type=1400 audit(2000000676.170:38936): avc: denied { bpf } for pid=14488 comm="syz.0.2737" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2537.802231][ T31] audit: type=1400 audit(2000000676.170:38937): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2537.886754][ T31] audit: type=1400 audit(2000000676.250:38938): avc: denied { map_read map_write } for pid=14488 comm="syz.0.2737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2538.033431][ T31] audit: type=1400 audit(2000000676.400:38939): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2542.981750][ T31] kauditd_printk_skb: 79 callbacks suppressed [ 2542.981859][ T31] audit: type=1400 audit(2000000681.360:39019): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2543.020396][ T31] audit: type=1400 audit(2000000681.390:39020): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2543.021391][ T31] audit: type=1400 audit(2000000681.390:39021): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2543.022078][ T31] audit: type=1400 audit(2000000681.390:39022): avc: denied { ioctl } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2543.063003][ T31] audit: type=1400 audit(2000000681.440:39023): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2543.063868][ T31] audit: type=1400 audit(2000000681.440:39024): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2543.064578][ T31] audit: type=1400 audit(2000000681.440:39025): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2543.080535][ T31] audit: type=1400 audit(2000000681.440:39026): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2543.648494][ T31] audit: type=1400 audit(2000000682.020:39027): avc: denied { map_create } for pid=14508 comm="syz.1.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2543.650022][ T31] audit: type=1400 audit(2000000682.020:39028): avc: denied { map_read map_write } for pid=14508 comm="syz.1.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2548.342431][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 2548.342522][ T31] audit: type=1400 audit(2000000686.720:39063): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2548.346861][ T31] audit: type=1400 audit(2000000686.720:39064): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2548.375376][ T31] audit: type=1400 audit(2000000686.750:39065): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2548.439773][ T31] audit: type=1400 audit(2000000686.790:39066): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2548.440640][ T31] audit: type=1400 audit(2000000686.790:39067): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2548.441356][ T31] audit: type=1400 audit(2000000686.790:39068): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2548.441917][ T31] audit: type=1400 audit(2000000686.810:39069): avc: denied { ioctl } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2548.445433][ T31] audit: type=1400 audit(2000000686.820:39070): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2549.176625][ T31] audit: type=1400 audit(2000000687.540:39071): avc: denied { map_create } for pid=14512 comm="syz.1.2747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2549.206085][ T31] audit: type=1400 audit(2000000687.560:39072): avc: denied { bpf } for pid=14512 comm="syz.1.2747" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2551.171198][T14517] netlink: 132 bytes leftover after parsing attributes in process `syz.1.2749'. [ 2553.365362][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 2553.365448][ T31] audit: type=1400 audit(2000000691.750:39125): avc: denied { perfmon } for pid=14520 comm="syz.1.2751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2553.485413][ T31] audit: type=1400 audit(2000000691.750:39126): avc: denied { perfmon } for pid=14520 comm="syz.1.2751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2553.486345][ T31] audit: type=1400 audit(2000000691.800:39128): avc: denied { bpf } for pid=14520 comm="syz.1.2751" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2553.486892][ T31] audit: type=1400 audit(2000000691.760:39127): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2553.488597][ T31] audit: type=1400 audit(2000000691.870:39129): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2553.505581][ T31] audit: type=1400 audit(2000000691.870:39130): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2553.527714][ T31] audit: type=1400 audit(2000000691.870:39131): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2553.528926][ T31] audit: type=1400 audit(2000000691.870:39132): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2553.615803][ T31] audit: type=1400 audit(2000000691.900:39133): avc: denied { bpf } for pid=14520 comm="syz.1.2751" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2553.616599][ T31] audit: type=1400 audit(2000000691.900:39134): avc: denied { prog_run } for pid=14520 comm="syz.1.2751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2560.909999][T14526] alloc_vmap_area: 52 callbacks suppressed [ 2560.910126][T14526] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 2560.911818][T14526] syz.1.2753: vmalloc error: size 536870904, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 2560.913388][T14526] CPU: 1 UID: 0 PID: 14526 Comm: syz.1.2753 Not tainted 6.12.0-syzkaller #0 [ 2560.915212][T14526] Hardware name: ARM-Versatile Express [ 2560.916408][T14526] Call trace: [ 2560.917260][T14526] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 2560.919342][T14526] r7:ff800000 r6:8205a4a4 r5:60000013 r4:820413b8 [ 2560.920952][T14526] [<819b809c>] (show_stack) from [<819d60f8>] (dump_stack_lvl+0x70/0x7c) [ 2560.923276][T14526] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 2560.925759][T14526] r5:856da400 r4:00000000 [ 2560.927075][T14526] [<819d6104>] (dump_stack) from [<804c63fc>] (warn_alloc+0xd8/0x178) [ 2560.929480][T14526] [<804c6324>] (warn_alloc) from [<804b8620>] (__vmalloc_node_range_noprof+0xcc/0x55c) [ 2560.934597][T14526] r3:1ffffff8 r2:8205a4a4 [ 2560.934915][T14526] r6:00000dc0 r5:00000001 r4:1ffffff8 [ 2560.935222][T14526] [<804b8554>] (__vmalloc_node_range_noprof) from [<8047390c>] (__kvmalloc_node_noprof+0xc0/0x110) [ 2560.935746][T14526] r10:dfb35d48 r9:847ff800 r8:81654614 r7:ffffffff r6:00000dc0 r5:1ffffff8 [ 2560.943658][T14526] r4:00000000 [ 2560.943984][T14526] [<8047384c>] (__kvmalloc_node_noprof) from [<81654614>] (xt_alloc_entry_offsets+0x24/0x30) [ 2560.944550][T14526] r8:b5403587 r7:00000000 r6:200004e0 r5:847ff840 r4:07fffffe [ 2560.944973][T14526] [<816545f0>] (xt_alloc_entry_offsets) from [<817d8560>] (translate_table+0x70/0x78c) [ 2560.945446][T14526] [<817d84f0>] (translate_table) from [<817d9718>] (do_replace+0xe8/0x5b8) [ 2560.945895][T14526] r10:00000126 r9:847ff840 r8:b5403587 r7:000003a8 r6:200004e0 r5:847ff800 [ 2560.946273][T14526] r4:84a38000 [ 2560.946484][T14526] [<817d9630>] (do_replace) from [<817d9d1c>] (do_ip6t_set_ctl+0x134/0x2a0) [ 2560.946928][T14526] r10:00000126 r9:856da400 r8:00000000 r7:84b3bd80 r6:dfb35df0 r5:83ddca40 [ 2560.947335][T14526] r4:00000040 [ 2560.947544][T14526] [<817d9be8>] (do_ip6t_set_ctl) from [<815e0de4>] (nf_setsockopt+0x60/0x7c) [ 2560.948015][T14526] r10:00000126 r9:856da400 r8:00000000 r7:84b3bd80 r6:83ddca40 r5:817d9be8 [ 2560.948422][T14526] r4:827e9bfc [ 2560.948629][T14526] [<815e0d88>] (nf_setsockopt) from [<8179164c>] (ipv6_setsockopt+0x9c/0xbc) [ 2560.950062][T14526] r6:00000408 r5:00000040 r4:83ddca40 [ 2560.950440][T14526] [<817915b4>] (ipv6_setsockopt) from [<8168aef8>] (tcp_setsockopt+0x3c/0x58) [ 2560.950915][T14526] r6:833fea00 r5:00000000 r4:817915b0 [ 2560.951184][T14526] [<8168aec0>] (tcp_setsockopt) from [<814991e0>] (sock_common_setsockopt+0x38/0x40) [ 2560.951651][T14526] r4:8168aebc [ 2560.951875][T14526] [<814991ac>] (sock_common_setsockopt) from [<81494afc>] (do_sock_setsockopt+0xb0/0x17c) [ 2560.952336][T14526] r4:814991a8 [ 2560.952541][T14526] [<81494a4c>] (do_sock_setsockopt) from [<81497e98>] (__sys_setsockopt+0x7c/0xb4) [ 2560.953047][T14526] r6:84b3bd81 r5:00000040 r4:00000029 [ 2560.953321][T14526] [<81497e1c>] (__sys_setsockopt) from [<81497eec>] (sys_setsockopt+0x1c/0x24) [ 2560.953792][T14526] r8:8020029c r7:00000126 r6:002862f8 r5:00000000 r4:00000408 [ 2560.954141][T14526] [<81497ed0>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2560.954588][T14526] Exception stack(0xdfb35fa8 to 0xdfb35ff0) [ 2560.954936][T14526] 5fa0: 00000408 00000000 00000003 00000029 00000040 20000480 [ 2560.955353][T14526] 5fc0: 00000408 00000000 002862f8 00000126 00000000 00006364 003d0f00 76b2b0bc [ 2560.955751][T14526] 5fe0: 76b2aec0 76b2aeb0 00018af0 00133450 [ 2561.035574][ T31] audit: type=1400 audit(2000000699.400:39187): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2561.037226][T14526] Mem-Info: [ 2561.037576][T14526] active_anon:4172 inactive_anon:0 isolated_anon:0 [ 2561.037576][T14526] active_file:64 inactive_file:40234 isolated_file:0 [ 2561.037576][T14526] unevictable:768 dirty:1 writeback:0 [ 2561.037576][T14526] slab_reclaimable:1005 slab_unreclaimable:5721 [ 2561.037576][T14526] mapped:4627 shmem:3708 pagetables:223 [ 2561.037576][T14526] sec_pagetables:0 bounce:0 [ 2561.037576][T14526] kernel_misc_reclaimable:0 [ 2561.037576][T14526] free:435429 free_pcp:1091 free_cma:4032 [ 2561.052842][T14526] Node 0 active_anon:16688kB inactive_anon:0kB active_file:256kB inactive_file:160936kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:18508kB dirty:4kB writeback:0kB shmem:14832kB writeback_tmp:0kB kernel_stack:2064kB pagetables:892kB sec_pagetables:0kB all_unreclaimable? no [ 2561.057620][ T31] audit: type=1400 audit(2000000699.440:39188): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2561.064905][ T31] audit: type=1400 audit(2000000699.450:39189): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2561.066269][T14526] Normal free:1387356kB boost:0kB min:4776kB low:6200kB high:7624kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:3988kB unevictable:0kB writepending:4kB present:1556480kB managed:1430008kB mlocked:0kB bounce:0kB free_pcp:4364kB local_pcp:2500kB free_cma:0kB [ 2561.091268][T14526] lowmem_reserve[]: 0 4224 0 [ 2561.091790][T14526] Normal: 105*4kB (UE) 27*8kB (U) 4*16kB (UE) 3*32kB (UME) 9*64kB (UM) 2*128kB (UM) 3*256kB (UE) 3*512kB (UME) 5*1024kB (UM) 3*2048kB (ME) 335*4096kB (UM) = 1387356kB [ 2561.094350][T14526] 44007 total pagecache pages [ 2561.095925][T14526] 0 pages in swap cache [ 2561.108765][T14526] Free swap = 124988kB [ 2561.115097][T14526] Total swap = 124996kB [ 2561.115902][T14526] 524288 pages RAM [ 2561.116549][T14526] 135168 pages HighMem/MovableOnly [ 2561.117996][T14526] 31618 pages reserved [ 2561.118956][T14526] 4096 pages cma reserved [ 2561.175524][ T31] audit: type=1400 audit(2000000699.470:39190): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2561.187327][ T31] audit: type=1400 audit(2000000699.550:39191): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2561.488251][ T31] audit: type=1400 audit(2000000699.830:39192): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2561.489861][ T31] audit: type=1400 audit(2000000699.860:39193): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2561.490775][ T31] audit: type=1400 audit(2000000699.860:39194): avc: denied { ioctl } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2561.663511][ T31] audit: type=1400 audit(2000000700.040:39195): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2565.506057][T11846] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2565.665588][T11846] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2565.928246][ T31] kauditd_printk_skb: 85 callbacks suppressed [ 2565.928376][ T31] audit: type=1400 audit(2000000704.300:39281): avc: denied { read } for pid=14545 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2565.932477][ T31] audit: type=1400 audit(2000000704.310:39282): avc: denied { read open } for pid=14545 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2565.945473][T11846] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2565.958997][ T31] audit: type=1400 audit(2000000704.330:39283): avc: denied { mounton } for pid=14545 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2566.186512][T11846] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2566.334619][ T31] audit: type=1400 audit(2000000704.670:39284): avc: denied { module_request } for pid=14545 comm="syz-executor" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2567.017708][ T31] audit: type=1400 audit(2000000705.390:39285): avc: denied { module_request } for pid=14535 comm="syz.1.2758" kmod="net-pf-2-proto-254" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2567.230850][ T31] audit: type=1400 audit(2000000705.590:39286): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2567.270844][ T31] audit: type=1400 audit(2000000705.610:39287): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2567.271887][ T31] audit: type=1400 audit(2000000705.610:39288): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2567.272614][ T31] audit: type=1400 audit(2000000705.610:39289): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2567.406747][ T31] audit: type=1400 audit(2000000705.770:39290): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2567.731760][T11846] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2567.885618][T11846] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2567.918176][T11846] bond0 (unregistering): Released all slaves [ 2568.236055][T11846] hsr_slave_0: left promiscuous mode [ 2568.331330][T11846] hsr_slave_1: left promiscuous mode [ 2568.375012][T11846] veth1_macvtap: left promiscuous mode [ 2568.375763][T11846] veth0_macvtap: left promiscuous mode [ 2568.376313][T11846] veth1_vlan: left promiscuous mode [ 2568.376797][T11846] veth0_vlan: left promiscuous mode [ 2571.612810][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 2571.612921][ T31] audit: type=1400 audit(2000000709.990:39305): avc: denied { prog_load } for pid=14565 comm="syz.1.2762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2571.621609][ T31] audit: type=1400 audit(2000000710.000:39306): avc: denied { bpf } for pid=14565 comm="syz.1.2762" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2571.644358][ T31] audit: type=1400 audit(2000000710.020:39307): avc: denied { perfmon } for pid=14565 comm="syz.1.2762" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2571.676201][ T31] audit: type=1400 audit(2000000710.050:39308): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2571.710572][ T31] audit: type=1400 audit(2000000710.070:39309): avc: denied { perfmon } for pid=14565 comm="syz.1.2762" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2571.712255][ T31] audit: type=1400 audit(2000000710.080:39310): avc: denied { perfmon } for pid=14565 comm="syz.1.2762" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2571.713449][ T31] audit: type=1400 audit(2000000710.080:39311): avc: denied { perfmon } for pid=14565 comm="syz.1.2762" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2571.714592][ T31] audit: type=1400 audit(2000000710.080:39312): avc: denied { perfmon } for pid=14565 comm="syz.1.2762" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2571.759837][ T31] audit: type=1400 audit(2000000710.090:39313): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2571.761813][ T31] audit: type=1400 audit(2000000710.110:39314): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2576.634942][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 2576.635036][ T31] audit: type=1400 audit(2000000715.010:39342): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2576.651050][ T31] audit: type=1400 audit(2000000715.010:39343): avc: denied { ioctl } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2576.674852][ T31] audit: type=1400 audit(2000000715.040:39344): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2576.684386][ T31] audit: type=1400 audit(2000000715.060:39345): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2576.713037][ T31] audit: type=1400 audit(2000000715.090:39346): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2576.720176][ T31] audit: type=1400 audit(2000000715.090:39347): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2576.721125][ T31] audit: type=1400 audit(2000000715.090:39348): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2576.912218][ T31] audit: type=1400 audit(2000000715.290:39349): avc: denied { write } for pid=14574 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2576.917007][ T31] audit: type=1400 audit(2000000715.290:39350): avc: denied { write open } for pid=14574 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2576.922978][ T31] audit: type=1400 audit(2000000715.300:39351): avc: denied { getattr } for pid=14574 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2581.757647][ T31] kauditd_printk_skb: 209 callbacks suppressed [ 2581.757770][ T31] audit: type=1400 audit(2000000720.130:39561): avc: denied { read write } for pid=12476 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2581.793045][ T31] audit: type=1400 audit(2000000720.170:39562): avc: denied { read write open } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2581.795769][ T31] audit: type=1400 audit(2000000720.170:39563): avc: denied { ioctl } for pid=12476 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2581.815172][ T31] audit: type=1400 audit(2000000720.190:39564): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2581.863321][ T31] audit: type=1400 audit(2000000720.200:39565): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2581.864553][ T31] audit: type=1400 audit(2000000720.230:39566): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2581.865355][ T31] audit: type=1400 audit(2000000720.230:39567): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2581.899255][ T31] audit: type=1400 audit(2000000720.270:39568): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2582.264056][ T31] audit: type=1400 audit(2000000720.640:39569): avc: denied { search } for pid=14585 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2582.276682][ T31] audit: type=1400 audit(2000000720.650:39570): avc: denied { read } for pid=14585 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2586.918067][ T31] kauditd_printk_skb: 79 callbacks suppressed [ 2586.918168][ T31] audit: type=1400 audit(2000000725.300:39650): avc: denied { read } for pid=14659 comm="syz.1.2772" name="ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2586.924317][ T31] audit: type=1400 audit(2000000725.300:39651): avc: denied { read open } for pid=14659 comm="syz.1.2772" path="/dev/ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2586.983213][ T31] audit: type=1400 audit(2000000725.350:39652): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2586.989963][ T31] audit: type=1400 audit(2000000725.360:39653): avc: denied { map_create } for pid=14659 comm="syz.1.2772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2586.991022][ T31] audit: type=1400 audit(2000000725.360:39654): avc: denied { bpf } for pid=14659 comm="syz.1.2772" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2587.064465][ T31] audit: type=1400 audit(2000000725.410:39655): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2587.066588][ T31] audit: type=1400 audit(2000000725.420:39656): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2587.067278][ T31] audit: type=1400 audit(2000000725.420:39657): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2587.126866][ T31] audit: type=1400 audit(2000000725.470:39659): avc: denied { map_read map_write } for pid=14659 comm="syz.1.2772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2587.178473][ T31] audit: type=1400 audit(2000000725.420:39658): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2592.503981][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 2592.504280][ T31] audit: type=1400 audit(2000000730.880:39735): avc: denied { module_request } for pid=14545 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2592.523381][ T31] audit: type=1400 audit(2000000730.900:39736): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2592.555920][ T31] audit: type=1400 audit(2000000730.930:39737): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2592.603837][ T31] audit: type=1400 audit(2000000730.980:39738): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2592.605247][ T31] audit: type=1400 audit(2000000730.980:39739): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2592.607663][ T31] audit: type=1400 audit(2000000730.980:39740): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2592.690011][ T31] audit: type=1400 audit(2000000731.060:39741): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2592.693530][ T31] audit: type=1400 audit(2000000731.060:39742): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2592.711118][ T31] audit: type=1400 audit(2000000731.080:39743): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2592.740031][ T31] audit: type=1400 audit(2000000731.080:39744): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2598.011744][T14545] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2598.057004][T14545] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2598.084882][ T31] kauditd_printk_skb: 216 callbacks suppressed [ 2598.085021][ T31] audit: type=1400 audit(2000000736.440:39961): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2598.086069][ T31] audit: type=1400 audit(2000000736.450:39962): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2598.086670][ T31] audit: type=1400 audit(2000000736.450:39963): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2598.087271][ T31] audit: type=1400 audit(2000000736.450:39964): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2598.087901][ T31] audit: type=1400 audit(2000000736.450:39965): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2598.490443][ T31] audit: type=1400 audit(2000000736.860:39966): avc: denied { module_request } for pid=14545 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2598.643772][ T31] audit: type=1400 audit(2000000737.020:39967): avc: denied { search } for pid=14736 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2598.645346][ T31] audit: type=1400 audit(2000000737.020:39968): avc: denied { search } for pid=14736 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2598.647441][ T31] audit: type=1400 audit(2000000737.020:39969): avc: denied { search } for pid=14736 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2598.666818][ T31] audit: type=1400 audit(2000000737.040:39970): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2603.213272][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 2603.213395][ T31] audit: type=1400 audit(2000000741.590:39995): avc: denied { write } for pid=14791 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2603.214927][ T31] audit: type=1400 audit(2000000741.590:39996): avc: denied { write open } for pid=14791 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2603.216241][ T31] audit: type=1400 audit(2000000741.590:39997): avc: denied { getattr } for pid=14791 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2603.218226][ T31] audit: type=1400 audit(2000000741.590:39998): avc: denied { ioctl } for pid=14791 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2603.225619][ T31] audit: type=1400 audit(2000000741.600:39999): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2603.228478][ T31] audit: type=1400 audit(2000000741.600:40000): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2603.263102][ T31] audit: type=1400 audit(2000000741.640:40001): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2603.264052][ T31] audit: type=1400 audit(2000000741.640:40002): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2603.270213][ T31] audit: type=1400 audit(2000000741.640:40003): avc: denied { getattr } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2603.564623][ T31] audit: type=1400 audit(2000000741.940:40004): avc: denied { module_request } for pid=14545 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2607.984540][T14545] hsr_slave_0: entered promiscuous mode [ 2607.997072][T14545] hsr_slave_1: entered promiscuous mode [ 2608.001635][T14545] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2608.002098][T14545] Cannot create hsr debugfs directory [ 2609.043438][ T31] kauditd_printk_skb: 188 callbacks suppressed [ 2609.043506][ T31] audit: type=1400 audit(2000000747.420:40193): avc: denied { search } for pid=14854 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2609.044491][ T31] audit: type=1400 audit(2000000747.420:40194): avc: denied { search } for pid=14854 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2609.045701][ T31] audit: type=1400 audit(2000000747.420:40195): avc: denied { search } for pid=14854 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2609.047006][ T31] audit: type=1400 audit(2000000747.420:40196): avc: denied { getattr } for pid=14854 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=69 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2609.065662][ T31] audit: type=1400 audit(2000000747.440:40197): avc: denied { search } for pid=14854 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2609.067789][ T31] audit: type=1400 audit(2000000747.440:40198): avc: denied { search } for pid=14854 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2609.076462][ T31] audit: type=1400 audit(2000000747.450:40199): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2609.084733][ T31] audit: type=1400 audit(2000000747.460:40200): avc: denied { search } for pid=14854 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2609.123103][ T31] audit: type=1400 audit(2000000747.470:40201): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2609.124088][ T31] audit: type=1400 audit(2000000747.470:40202): avc: denied { append } for pid=2903 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2609.898500][T14545] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2609.963691][T14545] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2610.010152][T14545] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2610.068946][T14545] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2614.051201][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 2614.051254][ T31] audit: type=1400 audit(2000000752.430:40242): avc: denied { write } for pid=14925 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2614.062080][ T31] audit: type=1400 audit(2000000752.440:40243): avc: denied { write open } for pid=14925 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2614.065167][ T31] audit: type=1400 audit(2000000752.440:40244): avc: denied { getattr } for pid=14925 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2614.068171][ T31] audit: type=1400 audit(2000000752.440:40245): avc: denied { ioctl } for pid=14925 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2614.115856][ T31] audit: type=1400 audit(2000000752.490:40246): avc: denied { search } for pid=14925 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2614.116609][ T31] audit: type=1400 audit(2000000752.490:40247): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2614.124815][ T31] audit: type=1400 audit(2000000752.500:40248): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2614.131801][ T31] audit: type=1400 audit(2000000752.510:40249): avc: denied { search } for pid=14925 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2614.160325][ T31] audit: type=1400 audit(2000000752.530:40250): avc: denied { search } for pid=14925 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2614.161068][ T31] audit: type=1400 audit(2000000752.530:40251): avc: denied { search } for pid=14925 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2618.335674][T14545] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2619.357430][ T31] kauditd_printk_skb: 191 callbacks suppressed [ 2619.357535][ T31] audit: type=1400 audit(2000000757.740:40443): avc: denied { search } for pid=14931 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2619.360997][ T31] audit: type=1400 audit(2000000757.740:40444): avc: denied { search } for pid=14931 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2619.409944][ T31] audit: type=1400 audit(2000000757.740:40445): avc: denied { search } for pid=14931 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2619.410700][ T31] audit: type=1400 audit(2000000757.740:40446): avc: denied { getattr } for pid=14931 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth4.link" dev="tmpfs" ino=70 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2619.411339][ T31] audit: type=1400 audit(2000000757.780:40447): avc: denied { search } for pid=14931 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2619.411886][ T31] audit: type=1400 audit(2000000757.790:40448): avc: denied { search } for pid=14931 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2619.414495][ T31] audit: type=1400 audit(2000000757.790:40449): avc: denied { search } for pid=14931 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2619.452661][ T31] audit: type=1400 audit(2000000757.790:40450): avc: denied { write search } for pid=14931 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2619.453910][ T31] audit: type=1400 audit(2000000757.800:40451): avc: denied { remove_name search } for pid=14931 comm="rm" name="resolv.conf.eth4.link" dev="tmpfs" ino=70 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2619.482926][ T31] audit: type=1400 audit(2000000757.820:40452): avc: denied { unlink } for pid=14931 comm="rm" name="resolv.conf.eth4.link" dev="tmpfs" ino=70 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2622.691997][ C0] ------------[ cut here ]------------ [ 2622.693922][ C0] WARNING: CPU: 0 PID: 15 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 2622.702086][ C0] refcount_t: underflow; use-after-free. [ 2622.704022][ C0] Modules linked in: [ 2622.705665][ C0] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2622.708049][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.12.0-syzkaller #0 [ 2622.708595][ C0] Hardware name: ARM-Versatile Express [ 2622.710166][ C0] Call trace: [ 2622.710410][ C0] [<819b7fb8>] (dump_backtrace) from [<819b80b4>] (show_stack+0x18/0x1c) [ 2622.711181][ C0] r7:00000000 r6:82623304 r5:00000000 r4:820413b8 [ 2622.711602][ C0] [<819b809c>] (show_stack) from [<819d60dc>] (dump_stack_lvl+0x54/0x7c) [ 2622.712355][ C0] [<819d6088>] (dump_stack_lvl) from [<819d611c>] (dump_stack+0x18/0x1c) [ 2622.712844][ C0] r5:00000000 r4:82874d18 [ 2622.713127][ C0] [<819d6104>] (dump_stack) from [<819b8be0>] (panic+0x120/0x374) [ 2622.713534][ C0] [<819b8ac0>] (panic) from [<802426d0>] (get_taint+0x0/0x1c) [ 2622.715983][ C0] r3:8260c604 r2:00000001 r1:82029878 r0:82031344 [ 2622.717586][ C0] r7:8084bbd8 [ 2622.718387][ C0] [<8024265c>] (check_panic_on_warn) from [<80242834>] (__warn+0x80/0x188) [ 2622.721386][ C0] [<802427b4>] (__warn) from [<80242b24>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 2622.723823][ C0] r8:00000009 r7:8209017c r6:df855bdc r5:82e3b000 r4:00000000 [ 2622.727240][ C0] [<80242940>] (warn_slowpath_fmt) from [<8084bbd8>] (refcount_warn_saturate+0x13c/0x174) [ 2622.728922][ C0] r10:dddd0e88 r9:00000040 r8:85074250 r7:00000000 r6:81841f64 r5:00000002 [ 2622.729682][ C0] r4:853c9cc0 [ 2622.730000][ C0] [<8084ba9c>] (refcount_warn_saturate) from [<814aa974>] (sk_skb_reason_drop+0x1d8/0x248) [ 2622.730483][ C0] [<814aa79c>] (sk_skb_reason_drop) from [<81841f64>] (j1939_session_destroy+0x78/0x200) [ 2622.730948][ C0] r9:00000040 r8:85074250 r7:83c4081c r6:8472f150 r5:8472f100 r4:853c9cc0 [ 2622.731279][ C0] [<81841eec>] (j1939_session_destroy) from [<818430c4>] (j1939_xtp_rx_eoma+0x120/0x234) [ 2622.731701][ C0] r6:853c9780 r5:8472f100 r4:8472f114 [ 2622.731968][ C0] [<81842fa4>] (j1939_xtp_rx_eoma) from [<818454ec>] (j1939_tp_recv+0x4a8/0x530) [ 2622.732452][ C0] r7:83c40000 r6:83c40008 r5:83c40000 r4:853c9780 [ 2622.732772][ C0] [<81845044>] (j1939_tp_recv) from [<8183eed0>] (j1939_can_recv+0x1e4/0x2dc) [ 2622.733184][ C0] r7:83c40000 r6:83c40008 r5:83c40810 r4:853c9780 [ 2622.733461][ C0] [<8183ecec>] (j1939_can_recv) from [<81834b94>] (can_rcv_filter+0x9c/0x218) [ 2622.733922][ C0] r9:00000040 r8:847c06c0 r7:98ec0000 r6:853c99c0 r5:00000001 r4:84664e70 [ 2622.734243][ C0] [<81834af8>] (can_rcv_filter) from [<81835610>] (can_receive+0xb4/0xf0) [ 2622.734633][ C0] r9:00000040 r8:00000000 r7:847c0000 r6:84b57d40 r5:84a38000 r4:853c99c0 [ 2622.734991][ C0] [<8183555c>] (can_receive) from [<818356d0>] (can_rcv+0x84/0xac) [ 2622.735644][ C0] r9:00000040 r8:00000001 r7:00000000 r6:00000000 r5:8183564c r4:853c99c0 [ 2622.736000][ C0] [<8183564c>] (can_rcv) from [<814cc17c>] (__netif_receive_skb_one_core+0x5c/0x80) [ 2622.736448][ C0] r5:8183564c r4:847c0000 [ 2622.736680][ C0] [<814cc120>] (__netif_receive_skb_one_core) from [<814cc1e8>] (__netif_receive_skb+0x18/0x5c) [ 2622.737456][ C0] r5:dddd0f70 r4:853c99c0 [ 2622.737676][ C0] [<814cc1d0>] (__netif_receive_skb) from [<814cc4f0>] (process_backlog+0xa0/0x17c) [ 2622.738104][ C0] r5:dddd0f70 r4:853c99c0 [ 2622.738330][ C0] [<814cc450>] (process_backlog) from [<814cd3f0>] (__napi_poll+0x34/0x240) [ 2622.738978][ C0] r10:dddd0e80 r9:dddd10c0 r8:df855e38 r7:df855e33 r6:00000040 r5:dddd0f70 [ 2622.739937][ C0] r4:00000001 [ 2622.740299][ C0] [<814cd3bc>] (__napi_poll) from [<814cdc64>] (net_rx_action+0x358/0x440) [ 2622.741063][ C0] r9:dddd10c0 r8:df855e38 r7:0000012c r6:00038b47 r5:dddd0f70 r4:00000000 [ 2622.741767][ C0] [<814cd90c>] (net_rx_action) from [<8024ba68>] (handle_softirqs+0x158/0x464) [ 2622.742261][ C0] r10:00000008 r9:82e3b000 r8:00000100 r7:04208040 r6:00000003 r5:00000004 [ 2622.742631][ C0] r4:8260408c [ 2622.742850][ C0] [<8024b910>] (handle_softirqs) from [<8024bdb8>] (run_ksoftirqd+0x44/0x4c) [ 2622.743272][ C0] r10:00000000 r9:00000002 r8:82624b08 r7:00000001 r6:82e3b000 r5:82cb7140 [ 2622.743602][ C0] r4:00000000 [ 2622.743827][ C0] [<8024bd74>] (run_ksoftirqd) from [<80275edc>] (smpboot_thread_fn+0x16c/0x284) [ 2622.744257][ C0] [<80275d70>] (smpboot_thread_fn) from [<80270ae0>] (kthread+0x104/0x134) [ 2622.744799][ C0] r10:00000000 r9:df819de8 r8:82cb7280 r7:82cb7140 r6:80275d70 r5:82e3b000 [ 2622.745174][ C0] r4:82cb7180 r3:00000000 [ 2622.745401][ C0] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2622.745833][ C0] Exception stack(0xdf855fb0 to 0xdf855ff8) [ 2622.746135][ C0] 5fa0: 00000000 00000000 00000000 00000000 [ 2622.746528][ C0] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2622.746998][ C0] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2622.747334][ C0] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:82cb7180 [ 2622.750177][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:50:14 Registers: info registers vcpu 0 CPU#0 R00=dddd0180 R01=0a6afe10 R02=001739a2 R03=819d7f48 R04=00000006 R05=826faf88 R06=00000000 R07=826faf80 R08=82e3b000 R09=00000028 R10=826faf88 R11=df801db4 R12=df801db8 R13=df801da8 R14=8031ce20 R15=819d7f58 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000015 s17=7ea208dc d08=7ea208dc00000015 s18=00000000 s19=00545870 d09=0054587000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=827bee38 R01=821e34dc R02=5b927000 R03=819d7f48 R04=828b9200 R05=00078d48 R06=9b0c29e0 R07=00000262 R08=df9bdd00 R09=00000000 R10=83e53c00 R11=df805e3c R12=df805e40 R13=df805e30 R14=81249f50 R15=819d7f58 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=7e84e131 s17=76f6d6b0 d08=76f6d6b07e84e131 s18=76e65c91 s19=00000000 d09=0000000076e65c91 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000