last executing test programs: 3.04376624s ago: executing program 0 (id=6928): r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_MODE_GETPLANE(r1, 0xc02064b6, 0x0) 2.955311716s ago: executing program 1 (id=6929): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CAP_MANUAL_DIRTY_LOG_PROTECT2(r1, 0xae03, 0x0) 2.627886533s ago: executing program 1 (id=6930): setuid(0xee01) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000001e40)={&(0x7f0000001d40)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001e00)={&(0x7f0000001d80)={0x14}, 0x14}}, 0x0) 2.480606864s ago: executing program 0 (id=6931): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = dup(r0) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, 0x0) 2.395873551s ago: executing program 1 (id=6932): r0 = socket(0x10, 0x2, 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r1) 2.192449837s ago: executing program 1 (id=6933): openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x5451, 0x0) 2.009312111s ago: executing program 0 (id=6934): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000000)) 1.708843175s ago: executing program 1 (id=6935): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000180)={'vlan0\x00'}) 1.416157308s ago: executing program 0 (id=6936): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x1900) 1.157590699s ago: executing program 1 (id=6937): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f000000000000000000000000000039d1c723d667ee8b42bce1f54f75"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000000214010028bd7000fddbdf250900020073797a3100000000080001000000000008004400", @ANYRES32, @ANYBLOB="050054000100b2ac08000100000000000900020073"], 0x48}, 0x1, 0x0, 0x0, 0x4000801}, 0x0) 818.344895ms ago: executing program 0 (id=6938): r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002880)='.\x00', &(0x7f00000028c0), 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}}) mount$fuse(0x0, &(0x7f0000002880)='.\x00', &(0x7f00000028c0), 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 0s ago: executing program 0 (id=6939): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:33409' (ED25519) to the list of known hosts. [ 199.641399][ T29] audit: type=1400 audit(199.190:58): avc: denied { name_bind } for pid=3267 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 200.019084][ T29] audit: type=1400 audit(199.570:59): avc: denied { execute } for pid=3269 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 200.030769][ T29] audit: type=1400 audit(199.570:60): avc: denied { execute_no_trans } for pid=3269 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 204.599853][ T29] audit: type=1400 audit(204.150:61): avc: denied { mounton } for pid=3269 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 204.617935][ T29] audit: type=1400 audit(204.160:62): avc: denied { mount } for pid=3269 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 204.668708][ T3269] cgroup: Unknown subsys name 'net' [ 204.705297][ T29] audit: type=1400 audit(204.260:63): avc: denied { unmount } for pid=3269 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 205.108176][ T3269] cgroup: Unknown subsys name 'cpuset' [ 205.142151][ T3269] cgroup: Unknown subsys name 'rlimit' [ 205.659295][ T29] audit: type=1400 audit(205.210:64): avc: denied { setattr } for pid=3269 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 205.675133][ T29] audit: type=1400 audit(205.210:65): avc: denied { mounton } for pid=3269 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 205.677104][ T29] audit: type=1400 audit(205.220:66): avc: denied { mount } for pid=3269 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 206.344918][ T3272] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 206.353914][ T29] audit: type=1400 audit(205.900:67): avc: denied { relabelto } for pid=3272 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 206.361352][ T29] audit: type=1400 audit(205.910:68): avc: denied { write } for pid=3272 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 206.489901][ T29] audit: type=1400 audit(206.040:69): avc: denied { read } for pid=3269 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 206.491808][ T29] audit: type=1400 audit(206.040:70): avc: denied { open } for pid=3269 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 206.516811][ T3269] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 216.831768][ T29] audit: type=1400 audit(216.380:71): avc: denied { execmem } for pid=3273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 216.928842][ T29] audit: type=1400 audit(216.480:72): avc: denied { read } for pid=3275 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 216.931823][ T29] audit: type=1400 audit(216.480:73): avc: denied { open } for pid=3275 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 216.950672][ T29] audit: type=1400 audit(216.500:74): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 217.030537][ T29] audit: type=1400 audit(216.580:75): avc: denied { module_request } for pid=3275 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 217.431176][ T29] audit: type=1400 audit(216.980:76): avc: denied { sys_module } for pid=3275 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 224.822308][ T3277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.849167][ T3277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 225.210807][ T3275] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 225.234535][ T3275] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 227.543260][ T3277] hsr_slave_0: entered promiscuous mode [ 227.609720][ T3277] hsr_slave_1: entered promiscuous mode [ 228.130773][ T3275] hsr_slave_0: entered promiscuous mode [ 228.188009][ T3275] hsr_slave_1: entered promiscuous mode [ 228.244084][ T3275] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 228.245523][ T3275] Cannot create hsr debugfs directory [ 229.614502][ T29] audit: type=1400 audit(229.160:77): avc: denied { create } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 229.634667][ T29] audit: type=1400 audit(229.180:78): avc: denied { write } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 229.645426][ T29] audit: type=1400 audit(229.190:79): avc: denied { read } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 229.712250][ T3277] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 229.820893][ T3277] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 229.891411][ T3277] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 229.949110][ T3277] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 230.450405][ T3275] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 230.527034][ T3275] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 230.660472][ T3275] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 230.710296][ T3275] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 233.687182][ T3277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 234.328506][ T3275] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.587041][ T3275] veth0_vlan: entered promiscuous mode [ 244.705532][ T3275] veth1_vlan: entered promiscuous mode [ 245.238963][ T3275] veth0_macvtap: entered promiscuous mode [ 245.296115][ T3275] veth1_macvtap: entered promiscuous mode [ 245.690358][ T3277] veth0_vlan: entered promiscuous mode [ 245.848042][ T3275] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.850297][ T3275] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.851242][ T3275] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.852060][ T3275] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 245.898356][ T3277] veth1_vlan: entered promiscuous mode [ 246.765287][ T29] audit: type=1400 audit(246.310:80): avc: denied { mount } for pid=3275 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 246.818127][ T29] audit: type=1400 audit(246.370:81): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/syzkaller.Culaga/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 246.841729][ T29] audit: type=1400 audit(246.390:82): avc: denied { mount } for pid=3275 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 246.917737][ T29] audit: type=1400 audit(246.470:83): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/syzkaller.Culaga/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 246.941150][ T29] audit: type=1400 audit(246.490:84): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/syzkaller.Culaga/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 247.054906][ T29] audit: type=1400 audit(246.600:85): avc: denied { unmount } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 247.105222][ T29] audit: type=1400 audit(246.640:86): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 247.141454][ T29] audit: type=1400 audit(246.670:87): avc: denied { mount } for pid=3275 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 247.196927][ T29] audit: type=1400 audit(246.740:88): avc: denied { mounton } for pid=3275 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 247.236165][ T29] audit: type=1400 audit(246.780:89): avc: denied { mount } for pid=3275 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 247.241544][ T3277] veth0_macvtap: entered promiscuous mode [ 247.318232][ T3277] veth1_macvtap: entered promiscuous mode [ 247.751919][ T3275] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 248.066057][ T3277] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.067148][ T3277] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.067952][ T3277] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.068777][ T3277] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 253.215256][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 253.215446][ T29] audit: type=1400 audit(252.710:96): avc: denied { ioctl } for pid=3435 comm="syz.0.12" path="/dev/iommu" dev="devtmpfs" ino=614 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 253.457983][ T29] audit: type=1400 audit(253.010:97): avc: denied { create } for pid=3436 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 253.509058][ T29] audit: type=1400 audit(253.060:98): avc: denied { write } for pid=3436 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 255.698861][ T29] audit: type=1400 audit(255.250:99): avc: denied { create } for pid=3453 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 255.712187][ T29] audit: type=1400 audit(255.260:100): avc: denied { setopt } for pid=3453 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 256.454726][ T29] audit: type=1400 audit(256.000:101): avc: denied { create } for pid=3460 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 256.458806][ T29] audit: type=1400 audit(256.010:102): avc: denied { getopt } for pid=3460 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 257.615192][ T3468] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5122 sclass=netlink_route_socket pid=3468 comm=syz.0.27 [ 260.977877][ T29] audit: type=1400 audit(260.530:103): avc: denied { watch } for pid=3483 comm="syz.0.35" path="/19" dev="tmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 263.371092][ T29] audit: type=1400 audit(262.920:104): avc: denied { read } for pid=3497 comm="syz.0.42" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 263.380356][ T29] audit: type=1400 audit(262.930:105): avc: denied { open } for pid=3497 comm="syz.0.42" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 263.470096][ T29] audit: type=1400 audit(263.020:106): avc: denied { ioctl } for pid=3497 comm="syz.0.42" path="/dev/usbmon0" dev="devtmpfs" ino=695 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 264.395603][ T29] audit: type=1400 audit(263.920:107): avc: denied { read write } for pid=3503 comm="syz.1.45" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 264.396542][ T29] audit: type=1400 audit(263.920:108): avc: denied { open } for pid=3503 comm="syz.1.45" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 264.397411][ T29] audit: type=1400 audit(263.930:109): avc: denied { ioctl } for pid=3503 comm="syz.1.45" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0x4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 264.465660][ T3506] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3506 comm=syz.0.46 [ 266.298368][ T3516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3516 comm=syz.1.51 [ 267.971011][ T29] audit: type=1400 audit(267.510:110): avc: denied { read } for pid=3527 comm="syz.1.58" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 267.974460][ T29] audit: type=1400 audit(267.510:111): avc: denied { open } for pid=3527 comm="syz.1.58" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 268.958261][ T29] audit: type=1400 audit(268.510:112): avc: denied { ioctl } for pid=3535 comm="syz.0.61" path="pid:[4026532621]" dev="nsfs" ino=4026532621 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 271.674295][ T29] audit: type=1400 audit(271.230:113): avc: denied { write } for pid=3553 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 271.683629][ T29] audit: type=1400 audit(271.230:114): avc: denied { connect } for pid=3553 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 271.743661][ T29] audit: type=1400 audit(271.290:115): avc: denied { name_connect } for pid=3553 comm="syz.0.70" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 273.855769][ T3568] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=257 sclass=netlink_audit_socket pid=3568 comm=syz.1.77 [ 276.256837][ T29] audit: type=1400 audit(275.800:116): avc: denied { create } for pid=3586 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 276.304883][ T29] audit: type=1400 audit(275.840:117): avc: denied { setopt } for pid=3586 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 276.670044][ T29] audit: type=1400 audit(276.220:118): avc: denied { audit_write } for pid=3590 comm="syz.0.87" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 280.281436][ T29] audit: type=1400 audit(279.830:119): avc: denied { create } for pid=3618 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 280.307341][ T3619] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 280.395168][ T29] audit: type=1400 audit(279.940:120): avc: denied { getopt } for pid=3618 comm="syz.1.101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 288.115537][ T3683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3683 comm=syz.0.132 [ 290.707237][ T29] audit: type=1400 audit(290.250:121): avc: denied { create } for pid=3700 comm="syz.0.142" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 293.296749][ T29] audit: type=1400 audit(292.840:122): avc: denied { create } for pid=3716 comm="syz.0.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 293.324536][ T29] audit: type=1400 audit(292.860:123): avc: denied { ioctl } for pid=3716 comm="syz.0.150" path="socket:[4469]" dev="sockfs" ino=4469 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 295.263723][ T29] audit: type=1400 audit(294.810:124): avc: denied { read write } for pid=3726 comm="syz.1.155" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 295.265585][ T29] audit: type=1400 audit(294.810:125): avc: denied { open } for pid=3726 comm="syz.1.155" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 301.318100][ T29] audit: type=1400 audit(300.870:126): avc: denied { bpf } for pid=3760 comm="syz.0.172" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 301.959931][ T29] audit: type=1400 audit(301.510:127): avc: denied { create } for pid=3768 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 301.996851][ T29] audit: type=1400 audit(301.530:128): avc: denied { write } for pid=3768 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 302.731946][ T3777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3777 comm=syz.1.180 [ 302.981677][ T29] audit: type=1400 audit(302.530:129): avc: denied { mounton } for pid=3778 comm="syz.0.181" path="/88/file0" dev="tmpfs" ino=462 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 303.176240][ T29] audit: type=1400 audit(302.730:130): avc: denied { unmount } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 305.653835][ T3810] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=260 sclass=netlink_route_socket pid=3810 comm=syz.0.196 [ 307.154612][ T29] audit: type=1400 audit(306.710:131): avc: denied { write } for pid=3823 comm="syz.1.204" name="arp" dev="proc" ino=4026532642 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 308.915551][ T29] audit: type=1400 audit(308.420:132): avc: denied { ioctl } for pid=3834 comm="syz.1.209" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5619 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 316.031121][ T3875] veth1: entered allmulticast mode [ 317.331419][ T29] audit: type=1400 audit(316.880:133): avc: denied { create } for pid=3883 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 317.368730][ T29] audit: type=1400 audit(316.920:134): avc: denied { write } for pid=3883 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 321.291545][ T29] audit: type=1400 audit(320.840:135): avc: denied { map } for pid=3914 comm="syz.1.247" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 321.506635][ T29] audit: type=1400 audit(321.050:136): avc: denied { read } for pid=3916 comm="syz.0.248" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 321.509261][ T29] audit: type=1400 audit(321.060:137): avc: denied { open } for pid=3916 comm="syz.0.248" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 321.543376][ T29] audit: type=1400 audit(321.090:138): avc: denied { setattr } for pid=3916 comm="syz.0.248" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 324.458238][ T29] audit: type=1400 audit(324.010:139): avc: denied { ioctl } for pid=3937 comm="syz.0.259" path="socket:[5756]" dev="sockfs" ino=5756 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 326.868104][ T29] audit: type=1400 audit(326.410:140): avc: denied { setopt } for pid=3968 comm="syz.0.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 328.095808][ T29] audit: type=1400 audit(327.640:141): avc: denied { write } for pid=3975 comm="syz.0.278" path="socket:[4950]" dev="sockfs" ino=4950 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 329.159338][ T29] audit: type=1400 audit(328.670:142): avc: denied { mounton } for pid=3983 comm="syz.0.282" path="/130/file0" dev="tmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 330.364743][ T3996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1124 sclass=netlink_route_socket pid=3996 comm=syz.0.287 [ 333.892307][ T29] audit: type=1400 audit(333.440:143): avc: denied { read write } for pid=4027 comm="syz.1.303" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 333.895646][ T29] audit: type=1400 audit(333.450:144): avc: denied { ioctl open } for pid=4027 comm="syz.1.303" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 334.341438][ T4032] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5132 sclass=netlink_audit_socket pid=4032 comm=syz.0.304 [ 340.139180][ T29] audit: type=1400 audit(339.690:145): avc: denied { setopt } for pid=4077 comm="syz.1.328" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 346.021935][ T29] audit: type=1400 audit(345.570:146): avc: denied { create } for pid=4114 comm="syz.1.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 346.043915][ T29] audit: type=1400 audit(345.590:147): avc: denied { read } for pid=3080 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 346.064802][ T29] audit: type=1400 audit(345.590:148): avc: denied { append } for pid=3080 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 346.066464][ T29] audit: type=1400 audit(345.600:149): avc: denied { open } for pid=3080 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 346.067900][ T29] audit: type=1400 audit(345.600:150): avc: denied { getopt } for pid=4114 comm="syz.1.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 346.069270][ T29] audit: type=1400 audit(345.600:151): avc: denied { getattr } for pid=3080 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 352.334140][ T29] audit: type=1400 audit(351.880:152): avc: denied { create } for pid=4166 comm="syz.1.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 352.380778][ T29] audit: type=1400 audit(351.930:153): avc: denied { getopt } for pid=4166 comm="syz.1.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 352.821221][ T29] audit: type=1400 audit(352.370:154): avc: denied { read } for pid=4169 comm="syz.1.375" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 352.830489][ T29] audit: type=1400 audit(352.370:155): avc: denied { open } for pid=4169 comm="syz.1.375" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 352.887036][ T29] audit: type=1400 audit(352.430:156): avc: denied { ioctl } for pid=4169 comm="syz.1.375" path="/dev/input/mice" dev="devtmpfs" ino=704 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 353.234094][ T29] audit: type=1400 audit(352.780:157): avc: denied { create } for pid=4173 comm="syz.0.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 353.283211][ T29] audit: type=1400 audit(352.830:158): avc: denied { setopt } for pid=4173 comm="syz.0.376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 353.464341][ T4176] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4176 comm=syz.1.377 [ 353.999372][ T29] audit: type=1400 audit(353.550:159): avc: denied { map_create } for pid=4180 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 354.018263][ T29] audit: type=1400 audit(353.560:160): avc: denied { perfmon } for pid=4180 comm="syz.0.380" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 354.045478][ T29] audit: type=1400 audit(353.590:161): avc: denied { map_read map_write } for pid=4180 comm="syz.0.380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 356.538070][ T4205] xt_CT: You must specify a L4 protocol and not use inversions on it [ 356.919161][ T4208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4208 comm=syz.1.393 [ 359.269724][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 359.269831][ T29] audit: type=1400 audit(358.820:165): avc: denied { write } for pid=4227 comm="syz.0.403" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 360.369282][ T29] audit: type=1400 audit(359.920:166): avc: denied { read } for pid=4240 comm="syz.1.410" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 360.371708][ T29] audit: type=1400 audit(359.920:167): avc: denied { open } for pid=4240 comm="syz.1.410" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 361.343614][ T29] audit: type=1400 audit(360.890:168): avc: denied { setattr } for pid=4256 comm="syz.0.418" name="NETLINK" dev="sockfs" ino=7270 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 362.714630][ T29] audit: type=1400 audit(362.270:169): avc: denied { create } for pid=4273 comm="syz.0.426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 362.741893][ T29] audit: type=1400 audit(362.290:170): avc: denied { ioctl } for pid=4273 comm="syz.0.426" path="socket:[6494]" dev="sockfs" ino=6494 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 362.810799][ T4276] mmap: syz.1.427 (4276) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 365.576688][ T29] audit: type=1400 audit(365.130:171): avc: denied { create } for pid=4304 comm="syz.0.441" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 368.432186][ T29] audit: type=1400 audit(367.980:172): avc: denied { create } for pid=4328 comm="syz.0.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 368.462295][ T29] audit: type=1400 audit(368.010:173): avc: denied { ioctl } for pid=4328 comm="syz.0.452" path="socket:[7387]" dev="sockfs" ino=7387 ioctlcmd=0x54d3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 369.229797][ T29] audit: type=1400 audit(368.780:174): avc: denied { create } for pid=4334 comm="syz.1.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 369.245078][ T29] audit: type=1400 audit(368.800:175): avc: denied { getopt } for pid=4334 comm="syz.1.456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 370.147353][ T29] audit: type=1400 audit(369.670:176): avc: denied { read } for pid=4341 comm="syz.0.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 370.630253][ T4348] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4348 comm=syz.1.462 [ 372.406270][ T4363] Zero length message leads to an empty skb [ 375.425170][ T29] audit: type=1400 audit(374.970:177): avc: denied { create } for pid=4396 comm="syz.0.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 375.454426][ T29] audit: type=1400 audit(374.990:178): avc: denied { setopt } for pid=4396 comm="syz.0.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 375.779886][ T29] audit: type=1400 audit(375.250:179): avc: denied { read write } for pid=4400 comm="syz.0.488" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 375.781478][ T29] audit: type=1400 audit(375.250:180): avc: denied { open } for pid=4400 comm="syz.0.488" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 375.795349][ T29] audit: type=1400 audit(375.260:181): avc: denied { ioctl } for pid=4400 comm="syz.0.488" path="/dev/dri/renderD128" dev="devtmpfs" ino=616 ioctlcmd=0x64a7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 379.919543][ T29] audit: type=1400 audit(379.460:182): avc: denied { write } for pid=4455 comm="syz.1.516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 381.785485][ T29] audit: type=1400 audit(381.330:183): avc: denied { getopt } for pid=4479 comm="syz.0.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 383.590224][ T29] audit: type=1400 audit(383.140:184): avc: denied { ioctl } for pid=4492 comm="syz.0.533" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 387.305073][ T4531] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4531 comm=syz.1.553 [ 389.000177][ T29] audit: type=1400 audit(388.550:185): avc: denied { write } for pid=4547 comm="syz.0.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 389.004941][ T4549] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4549 comm=syz.0.562 [ 390.999680][ T29] audit: type=1400 audit(390.550:186): avc: denied { map } for pid=4570 comm="syz.0.573" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 391.001746][ T29] audit: type=1400 audit(390.550:187): avc: denied { read write } for pid=4570 comm="syz.0.573" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=7784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 394.100756][ T29] audit: type=1400 audit(393.650:188): avc: denied { ioctl } for pid=4600 comm="syz.1.588" path="socket:[7844]" dev="sockfs" ino=7844 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 395.604214][ T4617] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4617 comm=syz.0.596 [ 399.911129][ T4662] capability: warning: `syz.0.619' uses deprecated v2 capabilities in a way that may be insecure [ 399.947000][ T29] audit: type=1400 audit(399.500:189): avc: denied { create } for pid=4660 comm="syz.0.619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 400.046528][ T4663] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4663 comm=syz.1.618 [ 403.360862][ T4703] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=4703 comm=syz.1.637 [ 413.752171][ T4826] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 416.818822][ T4859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4859 comm=syz.0.715 [ 417.928003][ T4868] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4868 comm=syz.0.719 [ 419.852084][ T29] audit: type=1400 audit(419.400:190): avc: denied { write } for pid=4891 comm="syz.0.730" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 423.122380][ T4924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=4924 comm=syz.1.746 [ 425.707414][ T29] audit: type=1400 audit(425.250:191): avc: denied { ioctl } for pid=4944 comm="syz.1.757" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 431.269808][ T5010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5010 comm=syz.0.789 [ 437.225609][ T5059] xt_CT: You must specify a L4 protocol and not use inversions on it [ 441.234774][ T29] audit: type=1400 audit(440.780:192): avc: denied { open } for pid=5101 comm="syz.1.836" path="/dev/ptyq7" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 441.263938][ T29] audit: type=1400 audit(440.810:193): avc: denied { ioctl } for pid=5101 comm="syz.1.836" path="/dev/ptyq7" dev="devtmpfs" ino=118 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 453.089974][ T5220] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5220 comm=syz.0.893 [ 453.926135][ T29] audit: type=1400 audit(453.430:194): avc: denied { lock } for pid=5230 comm="syz.0.899" path="socket:[9121]" dev="sockfs" ino=9121 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 459.237310][ T29] audit: type=1400 audit(458.790:195): avc: denied { create } for pid=5302 comm="syz.0.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 459.276225][ T29] audit: type=1400 audit(458.830:196): avc: denied { setopt } for pid=5302 comm="syz.0.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 460.196706][ T29] audit: type=1400 audit(459.750:197): avc: denied { create } for pid=5313 comm="syz.0.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 460.245462][ T29] audit: type=1400 audit(459.790:198): avc: denied { connect } for pid=5313 comm="syz.0.940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 463.924485][ T29] audit: type=1400 audit(463.470:199): avc: denied { setattr } for pid=5363 comm="syz.1.965" name="seq" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 464.226029][ T29] audit: type=1400 audit(463.780:200): avc: denied { map } for pid=5366 comm="syz.0.967" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 468.714626][ T29] audit: type=1400 audit(468.260:201): avc: denied { execute } for pid=5394 comm="syz.0.981" path="/476/memory.swap.events" dev="tmpfs" ino=2430 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 472.910051][ T29] audit: type=1400 audit(472.460:202): avc: denied { write } for pid=5440 comm="syz.0.1004" path="socket:[10464]" dev="sockfs" ino=10464 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 481.776955][ T29] audit: type=1400 audit(481.330:203): avc: denied { ioctl } for pid=5524 comm="syz.1.1045" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 484.484030][ T5557] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1016 sclass=netlink_route_socket pid=5557 comm=syz.1.1062 [ 485.637502][ T29] audit: type=1400 audit(485.180:204): avc: denied { setopt } for pid=5566 comm="syz.1.1067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 493.745881][ T29] audit: type=1400 audit(493.290:205): avc: denied { read } for pid=5647 comm="syz.1.1107" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 493.757700][ T29] audit: type=1400 audit(493.310:206): avc: denied { open } for pid=5647 comm="syz.1.1107" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 494.066009][ T29] audit: type=1400 audit(493.620:207): avc: denied { write } for pid=5651 comm="syz.0.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 494.176549][ T5654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5654 comm=syz.1.1108 [ 495.749520][ T5672] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5672 comm=syz.0.1119 [ 497.520003][ T29] audit: type=1400 audit(497.070:208): avc: denied { read } for pid=5690 comm="syz.0.1129" path="socket:[10908]" dev="sockfs" ino=10908 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 499.179134][ T29] audit: type=1400 audit(498.720:209): avc: denied { node_bind } for pid=5707 comm="syz.1.1136" saddr=fe80:ffff::749a:e841:b83f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 502.949732][ T29] audit: type=1400 audit(502.500:210): avc: denied { ioctl } for pid=5745 comm="syz.0.1156" path="socket:[10993]" dev="sockfs" ino=10993 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 505.131172][ T29] audit: type=1400 audit(504.680:211): avc: denied { ioctl } for pid=5761 comm="syz.1.1164" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x4508 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 508.699531][ T5796] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5796 comm=syz.1.1180 [ 515.027310][ T5864] sctp: [Deprecated]: syz.0.1213 (pid 5864) Use of int in max_burst socket option. [ 515.027310][ T5864] Use struct sctp_assoc_value instead [ 537.002063][ T6046] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=41 sclass=netlink_audit_socket pid=6046 comm=syz.0.1304 [ 546.018695][ T6133] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6133 comm=syz.1.1347 [ 554.454454][ T29] audit: type=1400 audit(554.000:212): avc: denied { setattr } for pid=6212 comm="syz.0.1385" name="LLC" dev="sockfs" ino=12776 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 556.545825][ T29] audit: type=1400 audit(556.100:213): avc: denied { create } for pid=6235 comm="syz.1.1396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 556.551809][ T29] audit: type=1400 audit(556.100:214): avc: denied { write } for pid=6235 comm="syz.1.1396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 562.020953][ T6290] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6290 comm=syz.0.1423 [ 564.509952][ T29] audit: type=1400 audit(564.060:215): avc: denied { ioctl } for pid=6314 comm="syz.0.1440" path="socket:[12916]" dev="sockfs" ino=12916 ioctlcmd=0x8941 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 567.169500][ T6342] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2570 sclass=netlink_tcpdiag_socket pid=6342 comm=syz.0.1448 [ 572.668974][ T6394] raw_sendmsg: syz.1.1475 forgot to set AF_INET. Fix it! [ 574.537121][ T29] audit: type=1400 audit(574.090:216): avc: denied { read write } for pid=6410 comm="syz.0.1487" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.541672][ T29] audit: type=1400 audit(574.090:217): avc: denied { open } for pid=6410 comm="syz.0.1487" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.566336][ T29] audit: type=1400 audit(574.110:218): avc: denied { ioctl } for pid=6410 comm="syz.0.1487" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x1267 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 575.017615][ T6415] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6415 comm=syz.1.1484 [ 583.407972][ T29] audit: type=1400 audit(582.960:219): avc: denied { setopt } for pid=6488 comm="syz.0.1523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 583.809392][ T29] audit: type=1400 audit(583.360:220): avc: denied { getopt } for pid=6492 comm="syz.0.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 590.559020][ T29] audit: type=1400 audit(590.110:221): avc: denied { lock } for pid=6547 comm="syz.0.1552" path="socket:[14206]" dev="sockfs" ino=14206 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 591.991691][ T29] audit: type=1400 audit(591.540:222): avc: denied { ioctl } for pid=6561 comm="syz.0.1559" path="socket:[14239]" dev="sockfs" ino=14239 ioctlcmd=0x891a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 593.235354][ T29] audit: type=1400 audit(592.770:223): avc: denied { getopt } for pid=6568 comm="syz.1.1563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 599.439535][ T6636] sctp: [Deprecated]: syz.1.1596 (pid 6636) Use of int in max_burst socket option. [ 599.439535][ T6636] Use struct sctp_assoc_value instead [ 599.945449][ T6647] syz.1.1602 uses obsolete (PF_INET,SOCK_PACKET) [ 599.963514][ T29] audit: type=1400 audit(599.510:224): avc: denied { write } for pid=6646 comm="syz.1.1602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 600.589798][ T29] audit: type=1400 audit(600.140:225): avc: denied { read } for pid=6654 comm="syz.1.1606" name="/" dev="configfs" ino=164 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 600.591301][ T29] audit: type=1400 audit(600.140:226): avc: denied { open } for pid=6654 comm="syz.1.1606" path="/sys/kernel/config" dev="configfs" ino=164 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 600.637225][ T29] audit: type=1400 audit(600.170:227): avc: denied { search } for pid=6654 comm="syz.1.1606" name="/" dev="configfs" ino=164 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 606.700812][ T29] audit: type=1400 audit(606.250:228): avc: denied { ioctl } for pid=6716 comm="syz.0.1637" path="socket:[15524]" dev="sockfs" ino=15524 ioctlcmd=0x940e scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 625.317422][ T29] audit: type=1400 audit(624.870:229): avc: denied { write } for pid=6882 comm="syz.0.1717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 631.752235][ T29] audit: type=1400 audit(631.300:230): avc: denied { write } for pid=6929 comm="syz.1.1740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 631.755106][ T6930] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6930 comm=syz.1.1740 [ 647.326067][ T7070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7070 comm=syz.1.1809 [ 654.418315][ T7136] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5129 sclass=netlink_audit_socket pid=7136 comm=syz.0.1842 [ 657.965163][ T7165] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2570 sclass=netlink_tcpdiag_socket pid=7165 comm=syz.1.1856 [ 661.747290][ T29] audit: type=1400 audit(661.300:231): avc: denied { setopt } for pid=7195 comm="syz.0.1872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 662.216192][ T29] audit: type=1400 audit(661.750:232): avc: denied { read write } for pid=7199 comm="syz.1.1874" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 662.217877][ T29] audit: type=1400 audit(661.760:233): avc: denied { open } for pid=7199 comm="syz.1.1874" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 668.629122][ T7264] sctp: [Deprecated]: syz.0.1905 (pid 7264) Use of int in maxseg socket option. [ 668.629122][ T7264] Use struct sctp_assoc_value instead [ 669.149688][ T29] audit: type=1400 audit(668.700:234): avc: denied { setopt } for pid=7268 comm="syz.0.1908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 672.150551][ T29] audit: type=1400 audit(671.700:235): avc: denied { setopt } for pid=7297 comm="syz.0.1927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 674.705678][ T29] audit: type=1400 audit(674.250:236): avc: denied { bind } for pid=7320 comm="syz.1.1934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 674.711393][ T29] audit: type=1400 audit(674.260:237): avc: denied { node_bind } for pid=7320 comm="syz.1.1934" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 675.598916][ T7331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7331 comm=syz.0.1940 [ 678.184078][ T29] audit: type=1400 audit(677.710:238): avc: denied { getopt } for pid=7351 comm="syz.0.1954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 681.509637][ T7383] sctp: [Deprecated]: syz.0.1969 (pid 7383) Use of int in max_burst socket option. [ 681.509637][ T7383] Use struct sctp_assoc_value instead [ 692.828023][ T29] audit: type=1400 audit(692.380:239): avc: denied { ioctl } for pid=7481 comm="syz.0.2014" path="socket:[16763]" dev="sockfs" ino=16763 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 695.086891][ T7508] SELinux: syz.0.2026 (7508) set checkreqprot to 1. This is no longer supported. [ 695.135206][ T29] audit: type=1400 audit(694.630:240): avc: denied { setcheckreqprot } for pid=7506 comm="syz.0.2026" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 695.319671][ T7510] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7510 comm=syz.1.2028 [ 695.906285][ T29] audit: type=1400 audit(695.460:241): avc: denied { read } for pid=7513 comm="syz.0.2029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 716.476071][ T29] audit: type=1400 audit(716.030:242): avc: denied { read } for pid=7688 comm="syz.1.2118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 724.833876][ C0] vkms_vblank_simulate: vblank timer overrun [ 742.627982][ T7918] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7918 comm=syz.1.2231 [ 743.644232][ T7926] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7926 comm=syz.0.2235 [ 754.699805][ T29] audit: type=1400 audit(754.250:243): avc: denied { setattr } for pid=8019 comm="syz.1.2281" name="NETLINK" dev="sockfs" ino=18800 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 757.705825][ T29] audit: type=1400 audit(757.250:244): avc: denied { write } for pid=8045 comm="syz.1.2295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 761.588988][ T8080] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8080 comm=syz.1.2312 [ 764.859409][ T8112] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8112 comm=syz.1.2328 [ 765.099297][ T29] audit: type=1400 audit(764.650:245): avc: denied { append } for pid=8114 comm="syz.0.2329" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 768.089612][ T8148] sctp: [Deprecated]: syz.1.2344 (pid 8148) Use of int in maxseg socket option. [ 768.089612][ T8148] Use struct sctp_assoc_value instead [ 776.705738][ T8211] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8211 comm=syz.0.2377 [ 778.784789][ T8228] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8228 comm=syz.1.2386 [ 783.675503][ T29] audit: type=1400 audit(783.170:246): avc: denied { nlmsg_read } for pid=8280 comm="syz.1.2413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 785.448274][ T8298] syz.0.2420(8298): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 788.167043][ T29] audit: type=1400 audit(787.720:247): avc: denied { lock } for pid=8321 comm="syz.0.2433" path="socket:[19302]" dev="sockfs" ino=19302 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 791.516678][ T8354] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=8354 comm=syz.0.2448 [ 792.759237][ T8367] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8367 comm=syz.0.2453 [ 795.861097][ T29] audit: type=1400 audit(795.410:248): avc: denied { write } for pid=8392 comm="syz.1.2468" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 796.245177][ T8397] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8397 comm=syz.1.2470 [ 799.894227][ T29] audit: type=1400 audit(799.440:249): avc: denied { write } for pid=8434 comm="syz.1.2488" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 809.748767][ T29] audit: type=1400 audit(809.300:250): avc: denied { ioctl } for pid=8510 comm="syz.1.2527" path="socket:[20626]" dev="sockfs" ino=20626 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 811.586415][ T29] audit: type=1400 audit(811.140:251): avc: denied { setattr } for pid=8529 comm="syz.1.2535" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 813.639069][ T29] audit: type=1400 audit(813.190:252): avc: denied { getattr } for pid=8556 comm="syz.1.2549" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 814.017804][ T29] audit: type=1400 audit(813.570:253): avc: denied { write } for pid=8561 comm="syz.0.2552" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 815.644452][ T29] audit: type=1400 audit(815.190:254): avc: denied { audit_read } for pid=8576 comm="syz.1.2558" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 816.035388][ T29] audit: type=1400 audit(815.580:255): avc: denied { getopt } for pid=8580 comm="syz.1.2560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 818.311176][ T8601] 8021q: VLANs not supported on ipvlan1 [ 825.720801][ T29] audit: type=1400 audit(825.270:256): avc: denied { bind } for pid=8673 comm="syz.0.2611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 835.368264][ T29] audit: type=1400 audit(834.920:257): avc: denied { read } for pid=8749 comm="syz.0.2646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 840.015525][ T29] audit: type=1400 audit(839.470:258): avc: denied { checkpoint_restore } for pid=8788 comm="syz.0.2665" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 842.220230][ T29] audit: type=1400 audit(841.720:259): avc: denied { setopt } for pid=8809 comm="syz.0.2675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 851.177307][ T8895] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8895 comm=syz.0.2717 [ 855.345414][ T8932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5133 sclass=netlink_route_socket pid=8932 comm=syz.1.2736 [ 858.085952][ T8960] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8960 comm=syz.1.2750 [ 863.136197][ T29] audit: type=1400 audit(862.690:260): avc: denied { setattr } for pid=9013 comm="syz.1.2776" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 865.371310][ T9034] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9034 comm=syz.1.2786 [ 869.773800][ T29] audit: type=1400 audit(869.310:261): avc: denied { setattr } for pid=9083 comm="syz.0.2812" name="tty20" dev="devtmpfs" ino=39 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 881.829634][ T29] audit: type=1400 audit(881.380:262): avc: denied { setopt } for pid=9197 comm="syz.1.2869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 889.736263][ T9269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9269 comm=syz.0.2904 [ 904.738943][ T9390] 8021q: VLANs not supported on ipvlan1 [ 909.907669][ T29] audit: type=1400 audit(909.460:263): avc: denied { write } for pid=9433 comm="syz.1.2983" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 909.945756][ T29] audit: type=1400 audit(909.470:264): avc: denied { open } for pid=9433 comm="syz.1.2983" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 918.995251][ T29] audit: type=1400 audit(918.510:265): avc: denied { read } for pid=9513 comm="syz.0.3023" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 918.997054][ T29] audit: type=1400 audit(918.510:266): avc: denied { open } for pid=9513 comm="syz.0.3023" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 919.304241][ T29] audit: type=1400 audit(918.850:267): avc: denied { map } for pid=9515 comm="syz.1.3024" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 924.340812][ T29] audit: type=1400 audit(923.890:268): avc: denied { connect } for pid=9564 comm="syz.1.3049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 924.807496][ T29] audit: type=1400 audit(924.310:269): avc: denied { sqpoll } for pid=9567 comm="syz.1.3051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 929.532145][ T29] audit: type=1400 audit(929.080:270): avc: denied { setopt } for pid=9607 comm="syz.1.3069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 935.907082][ T29] audit: type=1400 audit(935.450:271): avc: denied { ioctl } for pid=9673 comm="syz.0.3102" path="socket:[24636]" dev="sockfs" ino=24636 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 943.386306][ T29] audit: type=1400 audit(942.940:272): avc: denied { ioctl } for pid=9730 comm="syz.1.3131" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 946.282106][ T29] audit: type=1400 audit(945.830:273): avc: denied { map } for pid=9765 comm="syz.1.3148" path="/proc/3191/net/pfkey" dev="proc" ino=4026532698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 950.285060][ T29] audit: type=1400 audit(949.830:274): avc: denied { connect } for pid=9802 comm="syz.1.3166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 955.321710][ T29] audit: type=1400 audit(954.870:275): avc: denied { remount } for pid=9846 comm="syz.0.3192" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 955.327174][ T9849] ======================================================= [ 955.327174][ T9849] WARNING: The mand mount option has been deprecated and [ 955.327174][ T9849] and is ignored by this kernel. Remove the mand [ 955.327174][ T9849] option from the mount to silence this warning. [ 955.327174][ T9849] ======================================================= [ 966.184761][ T9941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9941 comm=syz.0.3234 [ 968.176251][ T29] audit: type=1400 audit(967.730:276): avc: denied { append } for pid=9965 comm="syz.1.3248" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 971.125578][ T9993] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9993 comm=syz.0.3260 [ 971.665610][ T9997] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1014 sclass=netlink_tcpdiag_socket pid=9997 comm=syz.0.3262 [ 973.276535][T10014] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10014 comm=syz.0.3271 [ 976.390862][T10043] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10043 comm=syz.0.3284 [ 976.984189][ T29] audit: type=1400 audit(976.530:277): avc: denied { getopt } for pid=10046 comm="syz.0.3291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 978.684527][ T29] audit: type=1400 audit(978.230:278): avc: granted { setsecparam } for pid=10066 comm="syz.1.3297" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 985.886376][ T29] audit: type=1400 audit(985.430:279): avc: denied { name_connect } for pid=10137 comm="syz.1.3332" dest=24 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 995.038160][T10216] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10216 comm=syz.1.3370 [ 1032.807709][T10528] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10528 comm=syz.1.3530 [ 1033.458537][T10532] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10532 comm=syz.1.3532 [ 1056.934049][ T29] audit: type=1400 audit(1056.430:280): avc: granted { setsecparam } for pid=10741 comm="syz.0.3634" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1059.875840][ T29] audit: type=1400 audit(1059.430:281): avc: denied { nlmsg_write } for pid=10776 comm="syz.0.3650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1064.039478][T10793] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1014 sclass=netlink_tcpdiag_socket pid=10793 comm=syz.1.3658 [ 1064.987953][T10803] syz.0.3663 (10803): drop_caches: 0 [ 1066.047350][T10819] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10819 comm=syz.1.3672 [ 1070.286174][T10863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10863 comm=syz.0.3694 [ 1072.517766][T10883] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10883 comm=syz.1.3702 [ 1086.645129][ T29] audit: type=1400 audit(1086.190:282): avc: denied { ioctl } for pid=10983 comm="syz.1.3752" path="socket:[29029]" dev="sockfs" ino=29029 ioctlcmd=0x943d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1088.050672][ T29] audit: type=1400 audit(1087.600:283): avc: denied { append } for pid=10994 comm="syz.1.3758" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1089.456898][ T29] audit: type=1400 audit(1089.000:284): avc: denied { getopt } for pid=11010 comm="syz.1.3767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1102.098208][T11134] sctp: [Deprecated]: syz.0.3828 (pid 11134) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1102.098208][T11134] Use struct sctp_sack_info instead [ 1114.434300][T11254] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 1119.339931][T11302] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11302 comm=syz.1.3912 [ 1124.036616][ T29] audit: type=1400 audit(1123.580:285): avc: denied { read } for pid=11348 comm="syz.1.3935" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1124.041364][ T29] audit: type=1400 audit(1123.590:286): avc: denied { open } for pid=11348 comm="syz.1.3935" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1124.087650][ T29] audit: type=1400 audit(1123.640:287): avc: denied { setattr } for pid=11348 comm="syz.1.3935" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1127.045890][T11382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11382 comm=syz.1.3952 [ 1129.901597][T11407] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11407 comm=syz.1.3964 [ 1131.717294][T11424] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11424 comm=syz.1.3972 [ 1132.889522][T11432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11432 comm=syz.1.3975 [ 1138.700947][ T29] audit: type=1400 audit(1138.250:288): avc: denied { lock } for pid=11475 comm="syz.1.3996" path="/dev/nbd1" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1140.331620][ T29] audit: type=1400 audit(1139.880:289): avc: denied { ioctl } for pid=11488 comm="syz.1.4003" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3311 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1154.935462][T11609] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11609 comm=syz.0.4062 [ 1155.721643][ C1] vkms_vblank_simulate: vblank timer overrun [ 1156.277808][T11622] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1156.308539][T11622] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1167.740036][T11726] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11726 comm=syz.0.4119 [ 1176.720504][ T29] audit: type=1400 audit(1176.250:290): avc: denied { wake_alarm } for pid=11808 comm="syz.1.4163" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1188.081555][T11905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11905 comm=syz.0.4210 [ 1192.140336][T11935] 8021q: VLANs not supported on ipvlan0 [ 1202.194560][ T29] audit: type=1400 audit(1201.740:291): avc: denied { ioctl } for pid=12017 comm="syz.1.4266" path="socket:[32261]" dev="sockfs" ino=32261 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1206.886908][ T29] audit: type=1400 audit(1206.440:292): avc: denied { read } for pid=12041 comm="syz.1.4279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1209.191380][T12058] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12058 comm=syz.0.4286 [ 1214.676717][T12106] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12106 comm=syz.0.4310 [ 1219.475370][T12152] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=4 sclass=netlink_xfrm_socket pid=12152 comm=syz.1.4333 [ 1223.427943][T12194] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12194 comm=syz.1.4354 [ 1251.243961][ T29] audit: type=1400 audit(1250.790:293): avc: denied { setopt } for pid=12448 comm="syz.0.4480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1252.501872][ T1883] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 1253.147155][ T1883] usb 1-1: too many configurations: 13, using maximum allowed: 8 [ 1253.191184][ T1883] usb 1-1: config 0 has no interfaces? [ 1253.227244][ T1883] usb 1-1: config 0 has no interfaces? [ 1253.257783][ T1883] usb 1-1: config 0 has no interfaces? [ 1253.282263][ T1883] usb 1-1: config 0 has no interfaces? [ 1253.336790][ T1883] usb 1-1: config 0 has no interfaces? [ 1253.357780][ T1883] usb 1-1: config 0 has no interfaces? [ 1253.379091][ T1883] usb 1-1: config 0 has no interfaces? [ 1253.406006][ T1883] usb 1-1: config 0 has no interfaces? [ 1253.467918][ T1883] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1253.468744][ T1883] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1253.469418][ T1883] usb 1-1: Product: syz [ 1253.469773][ T1883] usb 1-1: Manufacturer: syz [ 1253.470185][ T1883] usb 1-1: SerialNumber: syz [ 1253.529646][ T1883] usb 1-1: config 0 descriptor?? [ 1253.989233][ T1883] usb 1-1: USB disconnect, device number 2 [ 1254.715505][ T29] audit: type=1400 audit(1254.260:294): avc: denied { setattr } for pid=12472 comm="syz.1.4490" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1255.238159][T12478] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=12478 comm=syz.1.4492 [ 1259.347598][ T29] audit: type=1400 audit(1258.900:295): avc: denied { prog_load } for pid=12515 comm="syz.1.4512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1259.377450][ T29] audit: type=1400 audit(1258.930:296): avc: denied { prog_run } for pid=12515 comm="syz.1.4512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1270.119025][T12603] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12603 comm=syz.1.4554 [ 1272.154679][ T29] audit: type=1400 audit(1271.700:297): avc: denied { accept } for pid=12622 comm="syz.0.4564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1301.400524][ T29] audit: type=1400 audit(1300.950:298): avc: denied { nlmsg_write } for pid=12884 comm="syz.1.4694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1317.529896][ T29] audit: type=1400 audit(1317.080:299): avc: denied { setattr } for pid=13026 comm="syz.1.4761" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1330.470793][ T29] audit: type=1400 audit(1330.010:300): avc: denied { write } for pid=13114 comm="syz.1.4804" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1335.254474][T13158] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13158 comm=syz.1.4825 [ 1342.451814][ T29] audit: type=1400 audit(1342.000:301): avc: denied { accept } for pid=13223 comm="syz.0.4856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 1347.575181][ T29] audit: type=1400 audit(1347.130:302): avc: denied { name_connect } for pid=13270 comm="syz.0.4879" dest=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1360.369477][ T29] audit: type=1400 audit(1359.910:303): avc: denied { setattr } for pid=13371 comm="syz.0.4927" name="" dev="pipefs" ino=36507 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1366.221367][ T29] audit: type=1400 audit(1365.760:304): avc: granted { setsecparam } for pid=13430 comm="syz.0.4956" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1367.284947][ T29] audit: type=1400 audit(1366.690:305): avc: denied { getopt } for pid=13440 comm="syz.0.4961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1373.061133][T13495] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13495 comm=syz.0.4988 [ 1382.098400][ T29] audit: type=1400 audit(1381.650:306): avc: denied { read } for pid=13564 comm="syz.1.5024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1383.080939][T13574] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13574 comm=syz.1.5027 [ 1385.137802][T13594] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13594 comm=syz.0.5037 [ 1389.281745][ T29] audit: type=1400 audit(1388.830:307): avc: denied { nlmsg_read } for pid=13619 comm="syz.1.5051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1395.789201][T13668] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13668 comm=syz.1.5073 [ 1409.991303][ T29] audit: type=1400 audit(1409.530:308): avc: denied { setopt } for pid=13779 comm="syz.0.5130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1412.808244][T13810] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13810 comm=syz.1.5144 [ 1438.203799][ T29] audit: type=1400 audit(1437.750:309): avc: denied { bind } for pid=14039 comm="syz.0.5259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1446.500422][ T29] audit: type=1400 audit(1446.050:310): avc: denied { write } for pid=14125 comm="syz.1.5301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1447.005690][ T29] audit: type=1400 audit(1446.550:311): avc: granted { setsecparam } for pid=14129 comm="syz.1.5303" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 1448.171966][T14139] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14139 comm=syz.1.5308 [ 1448.934693][T14143] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=14143 comm=syz.1.5309 [ 1455.420273][T14198] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14198 comm=syz.0.5336 [ 1470.712207][ T29] audit: type=1400 audit(1470.260:312): avc: denied { ioctl } for pid=14360 comm="syz.1.5418" path="socket:[39734]" dev="sockfs" ino=39734 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 1471.135208][ T29] audit: type=1400 audit(1470.670:313): avc: denied { write } for pid=14362 comm="syz.0.5419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1476.316631][ T29] audit: type=1400 audit(1475.870:314): avc: denied { create } for pid=14404 comm="syz.1.5439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1476.351151][ T29] audit: type=1400 audit(1475.900:315): avc: denied { write } for pid=14404 comm="syz.1.5439" path="socket:[40265]" dev="sockfs" ino=40265 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 1482.994265][ T29] audit: type=1400 audit(1482.530:316): avc: denied { ioctl } for pid=14461 comm="syz.0.5468" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1488.210021][T14510] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=14510 comm=syz.0.5491 [ 1488.679983][ T29] audit: type=1400 audit(1488.230:317): avc: denied { write } for pid=14514 comm="syz.1.5493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1489.735949][ T29] audit: type=1400 audit(1489.270:318): avc: denied { read } for pid=14522 comm="syz.1.5497" path="socket:[40476]" dev="sockfs" ino=40476 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1490.307545][T14530] capability: warning: `syz.1.5500' uses 32-bit capabilities (legacy support in use) [ 1501.018662][ T29] audit: type=1400 audit(1500.570:319): avc: denied { setopt } for pid=14617 comm="syz.0.5544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1502.798771][ T29] audit: type=1400 audit(1502.350:320): avc: denied { write } for pid=14637 comm="syz.1.5554" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1503.294974][ T29] audit: type=1400 audit(1502.810:321): avc: denied { read } for pid=14641 comm="syz.1.5556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1510.919181][ T29] audit: type=1400 audit(1510.470:322): avc: denied { read } for pid=14700 comm="syz.1.5584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1512.342230][T14708] netlink: 64 bytes leftover after parsing attributes in process `syz.1.5587'. [ 1512.979867][ T29] audit: type=1400 audit(1512.530:323): avc: denied { read } for pid=14710 comm="syz.1.5589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1514.365142][ T29] audit: type=1400 audit(1513.900:324): avc: denied { unmount } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1515.680120][ T29] audit: type=1400 audit(1515.230:325): avc: denied { write } for pid=14733 comm="syz.1.5599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1519.767155][ T29] audit: type=1400 audit(1519.320:326): avc: denied { listen } for pid=14775 comm="syz.1.5620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1523.830777][ T29] audit: type=1400 audit(1523.380:327): avc: denied { create } for pid=14810 comm="syz.1.5635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1523.871546][ T29] audit: type=1400 audit(1523.420:328): avc: denied { write } for pid=14810 comm="syz.1.5635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1523.879065][ T29] audit: type=1400 audit(1523.430:329): avc: denied { read } for pid=14810 comm="syz.1.5635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 1547.467003][ T29] audit: type=1400 audit(1546.990:330): avc: denied { watch watch_reads } for pid=15028 comm="syz.1.5738" path="/dev/ubi_ctrl" dev="devtmpfs" ino=686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1547.521171][ T29] audit: type=1400 audit(1547.070:331): avc: denied { remove_name } for pid=3080 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1547.524050][ T29] audit: type=1400 audit(1547.070:332): avc: denied { rename } for pid=3080 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1547.545936][ T29] audit: type=1400 audit(1547.090:333): avc: denied { create } for pid=3080 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1555.088259][ T29] audit: type=1400 audit(1554.640:334): avc: denied { connect } for pid=15071 comm="syz.1.5758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1558.518075][ T29] audit: type=1400 audit(1558.070:335): avc: denied { create } for pid=15097 comm="syz.1.5771" name="file5" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1558.554269][ T29] audit: type=1400 audit(1558.100:336): avc: denied { read } for pid=15097 comm="syz.1.5771" name="file5" dev="tmpfs" ino=14728 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1558.560714][ T29] audit: type=1400 audit(1558.110:337): avc: denied { open } for pid=15097 comm="syz.1.5771" path="/2907/file5" dev="tmpfs" ino=14728 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1558.570662][ T29] audit: type=1400 audit(1558.120:338): avc: denied { ioctl } for pid=15097 comm="syz.1.5771" path="/2907/file5" dev="tmpfs" ino=14728 ioctlcmd=0x4c07 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1558.797157][ T29] audit: type=1400 audit(1558.320:339): avc: denied { unlink } for pid=3277 comm="syz-executor" name="file5" dev="tmpfs" ino=14728 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 1566.990195][ T29] audit: type=1400 audit(1566.540:340): avc: denied { bind } for pid=15168 comm="syz.1.5806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1566.998853][ T29] audit: type=1400 audit(1566.550:341): avc: denied { name_bind } for pid=15168 comm="syz.1.5806" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1567.000858][ T29] audit: type=1400 audit(1566.550:342): avc: denied { node_bind } for pid=15168 comm="syz.1.5806" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1580.951484][ T29] audit: type=1400 audit(1580.500:343): avc: denied { connect } for pid=15297 comm="syz.0.5869" laddr=255.255.255.255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1594.136719][ T29] audit: type=1400 audit(1593.690:344): avc: denied { ioctl } for pid=15434 comm="syz.1.5935" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1604.335353][ T29] audit: type=1400 audit(1603.860:345): avc: denied { mount } for pid=15524 comm="syz.0.5978" name="/" dev="gadgetfs" ino=43806 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1643.885852][ T29] audit: type=1400 audit(1643.440:346): avc: denied { ioctl } for pid=15835 comm="syz.1.6126" path="socket:[45354]" dev="sockfs" ino=45354 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1656.433540][T15964] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15964 comm=syz.0.6188 [ 1660.757396][ T29] audit: type=1400 audit(1660.310:347): avc: denied { bind } for pid=16009 comm="syz.1.6209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1661.251209][ T29] audit: type=1400 audit(1660.800:348): avc: denied { map } for pid=16013 comm="syz.1.6211" path="socket:[46177]" dev="sockfs" ino=46177 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1661.718883][ T29] audit: type=1400 audit(1661.270:349): avc: denied { write } for pid=16015 comm="syz.1.6212" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1664.312359][T16040] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16040 comm=syz.1.6224 [ 1673.904689][T16141] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16141 comm=syz.1.6274 [ 1687.130318][T16204] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1019 sclass=netlink_xfrm_socket pid=16204 comm=syz.1.6302 [ 1688.768588][ T29] audit: type=1400 audit(1688.320:350): avc: denied { setattr } for pid=16213 comm="syz.1.6307" name="zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 1689.119450][ T29] audit: type=1400 audit(1688.670:351): avc: denied { module_load } for pid=16215 comm="syz.1.6308" path=2F6D656D66643ACEBAE4EDC9FB921B6D1069DE6C91FBE08CE0406C1437FA23ABBCE80104202864656C6574656429 dev="tmpfs" ino=1068 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 1689.212406][T16216] Invalid architecture in ELF header: 62 [ 1701.722799][ C0] hrtimer: interrupt took 20604720 ns [ 1704.632137][ T29] audit: type=1400 audit(1704.180:352): avc: denied { read } for pid=16336 comm="syz.1.6366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1709.118357][ T29] audit: type=1400 audit(1708.640:353): avc: denied { read } for pid=16378 comm="syz.1.6387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1709.292547][ T29] audit: type=1400 audit(1708.840:354): avc: denied { shutdown } for pid=16381 comm="syz.0.6388" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1713.855394][T16320] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 1714.105079][T16320] usb 1-1: Using ep0 maxpacket: 32 [ 1714.155448][T16320] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 1714.156672][T16320] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 1714.157810][T16320] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1714.158588][T16320] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 1714.159417][T16320] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 1714.160567][T16320] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 1714.161372][T16320] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1714.246722][T16320] usb 1-1: config 0 descriptor?? [ 1714.621076][T16320] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 3 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 1724.704493][ T1883] usb 1-1: USB disconnect, device number 3 [ 1724.808583][ T1883] usblp0: removed [ 1727.866727][ T29] audit: type=1400 audit(1727.420:355): avc: denied { read } for pid=16495 comm="syz.1.6442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1733.897496][ T29] audit: type=1400 audit(1733.450:356): avc: denied { bind } for pid=16562 comm="syz.0.6475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1733.929511][ T29] audit: type=1400 audit(1733.480:357): avc: denied { accept } for pid=16562 comm="syz.0.6475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1739.956672][ T29] audit: type=1400 audit(1739.490:358): avc: denied { getopt } for pid=16614 comm="syz.1.6501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1753.013729][ T29] audit: type=1400 audit(1752.560:359): avc: denied { append } for pid=16736 comm="syz.0.6561" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1780.604702][ T29] audit: type=1400 audit(1780.160:360): avc: denied { write } for pid=16965 comm="syz.1.6671" path="socket:[48882]" dev="sockfs" ino=48882 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 1792.280905][T17105] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17105 comm=syz.0.6740 [ 1797.106359][T17156] block nbd1: shutting down sockets [ 1799.058627][ T29] audit: type=1400 audit(1798.610:361): avc: denied { write } for pid=17178 comm="syz.0.6778" path="socket:[49780]" dev="sockfs" ino=49780 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1808.212094][T17263] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2573 sclass=netlink_route_socket pid=17263 comm=syz.0.6818 [ 1808.397191][T17265] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=17265 comm=syz.0.6820 [ 1811.168846][T17297] process 'syz.1.6835' launched './file1' with NULL argv: empty string added [ 1811.203679][ T29] audit: type=1400 audit(1810.730:362): avc: denied { execute_no_trans } for pid=17295 comm="syz.1.6835" path="/3475/file1" dev="tmpfs" ino=17607 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1815.813894][T17329] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17329 comm=syz.1.6850 [ 1831.234564][ T29] audit: type=1400 audit(1830.760:363): avc: denied { remount } for pid=17444 comm="syz.0.6907" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1831.310789][ T29] audit: type=1400 audit(1830.860:364): avc: denied { unmount } for pid=3275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1837.107241][T17506] lo speed is unknown, defaulting to 1000 [ 1837.151937][T17506] lo speed is unknown, defaulting to 1000 [ 1837.209690][T17506] lo speed is unknown, defaulting to 1000 [ 1837.305410][T17506] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 1837.412214][T17506] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 1837.868853][T17506] lo speed is unknown, defaulting to 1000 [ 1837.938449][T17506] lo speed is unknown, defaulting to 1000 [ 1838.034837][T17506] ================================================================== [ 1838.036264][T17506] BUG: KASAN: slab-use-after-free in nla_put+0x158/0x1bc [ 1838.037927][T17506] Read of size 5 at addr ffff000011a80a00 by task syz.1.6937/17506 [ 1838.038916][T17506] [ 1838.040345][T17506] CPU: 1 UID: 0 PID: 17506 Comm: syz.1.6937 Not tainted 6.12.0-rc4-syzkaller-00085-g4e46774408d9 #0 [ 1838.041486][T17506] Hardware name: linux,dummy-virt (DT) [ 1838.042342][T17506] Call trace: [ 1838.042849][T17506] dump_backtrace+0x9c/0x11c [ 1838.043441][T17506] show_stack+0x18/0x24 [ 1838.043874][T17506] dump_stack_lvl+0xa4/0xf4 [ 1838.044297][T17506] print_report+0xf4/0x5a4 [ 1838.044710][T17506] kasan_report+0xc8/0x108 [ 1838.045257][T17506] kasan_check_range+0x100/0x1a8 [ 1838.045740][T17506] memcpy+0x3c/0x9c [ 1838.046985][T17506] nla_put+0x158/0x1bc [ 1838.047389][T17506] fill_nldev_handle+0xf0/0x174 [ 1838.047846][T17506] rdma_nl_notify_event+0x18c/0x784 [ 1838.048282][T17506] ib_register_device+0x5fc/0x9bc [ 1838.048901][T17506] siw_newlink+0xa68/0xd74 [ 1838.049451][T17506] nldev_newlink+0x258/0x444 [ 1838.049952][T17506] rdma_nl_rcv_msg+0x274/0x56c [ 1838.050398][T17506] rdma_nl_rcv_skb.constprop.0.isra.0+0x204/0x340 [ 1838.050888][T17506] rdma_nl_rcv+0x10/0x1c [ 1838.051271][T17506] netlink_unicast+0x3c0/0x670 [ 1838.051741][T17506] netlink_sendmsg+0x654/0xa4c [ 1838.052187][T17506] __sock_sendmsg+0xc8/0x168 [ 1838.052824][T17506] ____sys_sendmsg+0x54c/0x6dc [ 1838.053356][T17506] ___sys_sendmsg+0x11c/0x19c [ 1838.054091][T17506] __sys_sendmsg+0xe0/0x174 [ 1838.054516][T17506] __arm64_sys_sendmsg+0x70/0xa0 [ 1838.054979][T17506] invoke_syscall+0x6c/0x258 [ 1838.055432][T17506] el0_svc_common.constprop.0+0xac/0x230 [ 1838.055854][T17506] do_el0_svc+0x40/0x58 [ 1838.056222][T17506] el0_svc+0x50/0x180 [ 1838.056639][T17506] el0t_64_sync_handler+0x100/0x12c [ 1838.057030][T17506] el0t_64_sync+0x190/0x194 [ 1838.057995][T17506] [ 1838.058348][T17506] Allocated by task 17506: [ 1838.059030][T17506] kasan_save_stack+0x3c/0x64 [ 1838.059500][T17506] kasan_save_track+0x20/0x3c [ 1838.059896][T17506] kasan_save_alloc_info+0x40/0x54 [ 1838.060292][T17506] __kasan_kmalloc+0xb8/0xbc [ 1838.060680][T17506] __kmalloc_node_track_caller_noprof+0x1e8/0x428 [ 1838.061090][T17506] kstrdup+0x48/0x90 [ 1838.061505][T17506] kstrdup_const+0x40/0x4c [ 1838.061904][T17506] kvasprintf_const+0x1b0/0x1e0 [ 1838.062317][T17506] kobject_set_name_vargs+0x5c/0x118 [ 1838.063393][T17506] dev_set_name+0xa4/0xdc [ 1838.063846][T17506] ib_register_device+0x534/0x9bc [ 1838.064509][T17506] siw_newlink+0xa68/0xd74 [ 1838.064894][T17506] nldev_newlink+0x258/0x444 [ 1838.065283][T17506] rdma_nl_rcv_msg+0x274/0x56c [ 1838.065824][T17506] rdma_nl_rcv_skb.constprop.0.isra.0+0x204/0x340 [ 1838.066284][T17506] rdma_nl_rcv+0x10/0x1c [ 1838.066867][T17506] netlink_unicast+0x3c0/0x670 [ 1838.067254][T17506] netlink_sendmsg+0x654/0xa4c [ 1838.067869][T17506] __sock_sendmsg+0xc8/0x168 [ 1838.068290][T17506] ____sys_sendmsg+0x54c/0x6dc [ 1838.068768][T17506] ___sys_sendmsg+0x11c/0x19c [ 1838.069160][T17506] __sys_sendmsg+0xe0/0x174 [ 1838.069592][T17506] __arm64_sys_sendmsg+0x70/0xa0 [ 1838.070001][T17506] invoke_syscall+0x6c/0x258 [ 1838.070386][T17506] el0_svc_common.constprop.0+0xac/0x230 [ 1838.070805][T17506] do_el0_svc+0x40/0x58 [ 1838.071158][T17506] el0_svc+0x50/0x180 [ 1838.071524][T17506] el0t_64_sync_handler+0x100/0x12c [ 1838.071925][T17506] el0t_64_sync+0x190/0x194 [ 1838.072410][T17506] [ 1838.072880][T17506] Freed by task 17509: [ 1838.073290][T17506] kasan_save_stack+0x3c/0x64 [ 1838.073822][T17506] kasan_save_track+0x20/0x3c [ 1838.074242][T17506] kasan_save_free_info+0x4c/0x74 [ 1838.074710][T17506] __kasan_slab_free+0x50/0x6c [ 1838.075166][T17506] kfree+0x130/0x460 [ 1838.075581][T17506] kfree_const+0x34/0x40 [ 1838.075975][T17506] kobject_rename+0x120/0x1ec [ 1838.076370][T17506] device_rename+0xc8/0x1c0 [ 1838.077110][T17506] ib_device_rename+0xdc/0x3cc [ 1838.077603][T17506] nldev_set_doit+0x264/0x328 [ 1838.077999][T17506] rdma_nl_rcv_msg+0x274/0x56c [ 1838.078573][T17506] rdma_nl_rcv_skb.constprop.0.isra.0+0x204/0x340 [ 1838.079390][T17506] rdma_nl_rcv+0x10/0x1c [ 1838.079796][T17506] netlink_unicast+0x3c0/0x670 [ 1838.080460][T17506] netlink_sendmsg+0x654/0xa4c [ 1838.081026][T17506] __sock_sendmsg+0xc8/0x168 [ 1838.081490][T17506] ____sys_sendmsg+0x54c/0x6dc [ 1838.081917][T17506] ___sys_sendmsg+0x11c/0x19c [ 1838.082515][T17506] __sys_sendmsg+0xe0/0x174 [ 1838.082922][T17506] __arm64_sys_sendmsg+0x70/0xa0 [ 1838.083527][T17506] invoke_syscall+0x6c/0x258 [ 1838.083927][T17506] el0_svc_common.constprop.0+0xac/0x230 [ 1838.084371][T17506] do_el0_svc+0x40/0x58 [ 1838.084828][T17506] el0_svc+0x50/0x180 [ 1838.085233][T17506] el0t_64_sync_handler+0x100/0x12c [ 1838.085742][T17506] el0t_64_sync+0x190/0x194 [ 1838.086192][T17506] [ 1838.086676][T17506] The buggy address belongs to the object at ffff000011a80a00 [ 1838.086676][T17506] which belongs to the cache kmalloc-8 of size 8 [ 1838.087666][T17506] The buggy address is located 0 bytes inside of [ 1838.087666][T17506] freed 8-byte region [ffff000011a80a00, ffff000011a80a08) [ 1838.088475][T17506] [ 1838.088981][T17506] The buggy address belongs to the physical page: [ 1838.089922][T17506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x51a80 [ 1838.090971][T17506] anon flags: 0x1ffc00000000000(node=0|zone=0|lastcpupid=0x7ff) [ 1838.092317][T17506] page_type: f5(slab) [ 1838.093533][T17506] raw: 01ffc00000000000 ffff00000d401500 0000000000000000 dead000000000001 [ 1838.094112][T17506] raw: 0000000000000000 0000000080800080 00000001f5000000 0000000000000000 [ 1838.094871][T17506] page dumped because: kasan: bad access detected [ 1838.095580][T17506] [ 1838.095928][T17506] Memory state around the buggy address: [ 1838.096968][T17506] ffff000011a80900: fa fc fc fc fa fc fc fc 00 fc fc fc fa fc fc fc [ 1838.097652][T17506] ffff000011a80980: fa fc fc fc fa fc fc fc fa fc fc fc 04 fc fc fc [ 1838.098211][T17506] >ffff000011a80a00: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc [ 1838.098741][T17506] ^ [ 1838.099257][T17506] ffff000011a80a80: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc [ 1838.099728][T17506] ffff000011a80b00: fa fc fc fc fa fc fc fc fa fc fc fc fa fc fc fc [ 1838.100341][T17506] ================================================================== [ 1838.431426][T17506] Disabling lock debugging due to kernel taint VM DIAGNOSIS: 03:38:52 Registers: info registers vcpu 0 CPU#0 PC=ffff80008433318c X00=ffff800086bc4b50 X01=0000000000000003 X02=ffff000012564d40 X03=1fffe000024ac998 X04=000000005a44979c X05=0000000000000007 X06=1fffe000031e77d8 X07=00000000ffffffff X08=ffff800086befbc8 X09=0ac0d5affe09d4ff X10=ffff000016086048 X11=0000000000000001 X12=1fffe0000d3f2a2a X13=1fffe00002ce2168 X14=1fffe00002ce214f X15=ffff000016710a80 X16=589a0000bdb5ffff X17=a74ad50c35e099b3 X18=00000000ffffffff X19=ffff000018f3bc4e X20=1fffe000024ac997 X21=ffff000012564c80 X22=0000000000000007 X23=ffff000012564cb8 X24=ffff000012564ca8 X25=0000000000000006 X26=ffff000016086048 X27=ffff000018f3bc57 X28=0000000000000000 X29=ffff800080007360 X30=ffff8000851a8258 SP=ffff800080007310 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000312d327a7973:2d7072732f707273 Q02=0000000000000021:0000000000000040 Q03=ff000f0000000000:ff000f0000000000 Q04=f00ff00ff00ff00f:f00ff00ff00ff00f Q05=0f000f0f00000000:0f000f0f00000000 Q06=00003000cccccccc:00003000cccccccc Q07=0000aaaac681e790:000002da00000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000002000:0000000000000000 Q17=000000000000000b:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800081a0e62c X00=0000000000000002 X01=0000000000000000 X02=0000000000000002 X03=dfff800000000000 X04=0000000000000018 X05=1fffe00001da722f X06=0000000000000030 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700014218c8a X11=1ffff00014218c8a X12=ffff700014218c8b X13=00000000f3f3f3f3 X14=000000000000f1f1 X15=617420746f4e2037 X16=2e36206465746e69 X17=3463722d302e3231 X18=00000000d11babc5 X19=ffff00000ed39080 X20=ffff80008cd7b018 X21=ffff800087441800 X22=0000000000000074 X23=dfff800000000000 X24=ffff80008ca35e59 X25=0000000000000001 X26=dfff800000000000 X27=0000000000000079 X28=ffff00000ed39080 X29=ffff8000a10c6400 X30=ffff800081a0e8b8 SP=ffff8000a10c6400 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=006c616974696e49:0000000000000000 Q01=ff00000000000000:ffffffffffffffff Q02=0000000000000000:f0000000ffffffff Q03=0000000000b00070:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffcc1b0c30:0000ffffcc1b0c30 Q17=ffffff80ffffffd0:0000ffffcc1b0c00 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000