last executing test programs: 44m44.15509624s ago: executing program 0 (id=1028): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x5452, &(0x7f0000000140)) 44m43.481148669s ago: executing program 0 (id=1029): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000003100)={0x0, 0x0, &(0x7f00000030c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="14000000000403"], 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000003180), r0) 44m42.584289675s ago: executing program 0 (id=1031): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_REGISTER_FRAME(r1, &(0x7f0000002240)={0x0, 0x0, &(0x7f0000002200)={&(0x7f0000002040)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 44m41.539596774s ago: executing program 0 (id=1032): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.pending_reads\x00', 0x1c80c0, 0x100) socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0x5451, 0x0) 44m41.178986644s ago: executing program 0 (id=1033): r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x10) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 44m38.833739741s ago: executing program 0 (id=1035): r0 = openat$audio1(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, 0x0) 43m52.96946889s ago: executing program 32 (id=1035): r0 = openat$audio1(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, 0x0) 6.308275741s ago: executing program 2 (id=6442): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x5451, 0x0) 5.486368756s ago: executing program 2 (id=6444): timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0x5001, 0x0) 2.955536412s ago: executing program 1 (id=6448): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close_range(r0, 0xffffffffffffffff, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000140)) 2.148067056s ago: executing program 1 (id=6449): r0 = socket$unix(0x1, 0x1, 0x0) r1 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) statx(r1, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x80, &(0x7f0000000000)) 1.69367144s ago: executing program 2 (id=6450): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) sendmsg$nl_netfilter(r0, 0x0, 0x0) 1.69329462s ago: executing program 1 (id=6451): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/firmware/fdt', 0x40, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$netlink(r0, &(0x7f0000002c80)={0x0, 0x0, 0x0}, 0x0) 1.163947896s ago: executing program 2 (id=6452): r0 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup2(r1, r0) sendmsg$AUDIT_USER_AVC(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)={0x10}, 0x10}}, 0x0) 1.163704925s ago: executing program 1 (id=6453): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001b00), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, 0x0) 664.504101ms ago: executing program 1 (id=6454): r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$mixer(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) dup2(r1, r0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000000c0)) 575.932073ms ago: executing program 2 (id=6455): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000380), 0x8, 0x0) close(r0) creat(&(0x7f0000000080)='./file0\x00', 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 165.834786ms ago: executing program 1 (id=6456): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$TIOCNOTTY(r2, 0x5450) 0s ago: executing program 2 (id=6457): r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) close(r0) socket$unix(0x1, 0x1, 0x0) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:21821' (ED25519) to the list of known hosts. [ 198.812616][ T29] audit: type=1400 audit(198.190:58): avc: denied { name_bind } for pid=3272 comm="sshd" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 199.438720][ T29] audit: type=1400 audit(198.820:59): avc: denied { execute } for pid=3274 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 199.448288][ T29] audit: type=1400 audit(198.830:60): avc: denied { execute_no_trans } for pid=3274 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 205.408202][ T29] audit: type=1400 audit(204.790:61): avc: denied { mounton } for pid=3274 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 205.430705][ T29] audit: type=1400 audit(204.810:62): avc: denied { mount } for pid=3274 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 205.495947][ T3274] cgroup: Unknown subsys name 'net' [ 205.539922][ T29] audit: type=1400 audit(204.920:63): avc: denied { unmount } for pid=3274 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 206.037456][ T3274] cgroup: Unknown subsys name 'cpuset' [ 206.125378][ T3274] cgroup: Unknown subsys name 'rlimit' [ 206.635229][ T29] audit: type=1400 audit(206.010:64): avc: denied { setattr } for pid=3274 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 206.650390][ T29] audit: type=1400 audit(206.020:65): avc: denied { mounton } for pid=3274 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 206.663237][ T29] audit: type=1400 audit(206.030:66): avc: denied { mount } for pid=3274 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 207.450525][ T3276] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 207.465692][ T29] audit: type=1400 audit(206.840:67): avc: denied { relabelto } for pid=3276 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 207.475941][ T29] audit: type=1400 audit(206.860:68): avc: denied { write } for pid=3276 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 207.591945][ T29] audit: type=1400 audit(206.970:69): avc: denied { read } for pid=3274 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 207.593982][ T29] audit: type=1400 audit(206.980:70): avc: denied { open } for pid=3274 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 207.609463][ T3274] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 217.917298][ T29] audit: type=1400 audit(217.300:71): avc: denied { execmem } for pid=3277 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 218.037695][ T29] audit: type=1400 audit(217.420:72): avc: denied { read } for pid=3280 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 218.039704][ T29] audit: type=1400 audit(217.420:73): avc: denied { open } for pid=3280 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 218.058563][ T29] audit: type=1400 audit(217.430:74): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 218.117197][ T29] audit: type=1400 audit(217.500:75): avc: denied { module_request } for pid=3280 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 218.357680][ T29] audit: type=1400 audit(217.740:76): avc: denied { sys_module } for pid=3279 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 224.259580][ T3280] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.483602][ T3280] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 224.535347][ T3279] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 224.814548][ T3279] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 228.659968][ T3280] hsr_slave_0: entered promiscuous mode [ 228.719452][ T3280] hsr_slave_1: entered promiscuous mode [ 229.407222][ T3279] hsr_slave_0: entered promiscuous mode [ 229.458758][ T3279] hsr_slave_1: entered promiscuous mode [ 229.513776][ T3279] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 229.516557][ T3279] Cannot create hsr debugfs directory [ 231.689087][ T29] audit: type=1400 audit(231.070:77): avc: denied { create } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 231.698681][ T29] audit: type=1400 audit(231.080:78): avc: denied { write } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 231.707851][ T29] audit: type=1400 audit(231.090:79): avc: denied { read } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 231.757767][ T3280] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 231.857060][ T3280] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 231.988533][ T3280] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 232.165510][ T3280] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 232.993981][ T3279] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 233.076344][ T3279] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 233.159165][ T3279] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 233.239819][ T3279] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 236.286780][ T3280] 8021q: adding VLAN 0 to HW filter on device bond0 [ 236.938627][ T3279] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.053533][ T3279] veth0_vlan: entered promiscuous mode [ 246.421983][ T3280] veth0_vlan: entered promiscuous mode [ 246.537244][ T3279] veth1_vlan: entered promiscuous mode [ 246.706344][ T3280] veth1_vlan: entered promiscuous mode [ 247.435848][ T3279] veth0_macvtap: entered promiscuous mode [ 247.490288][ T3280] veth0_macvtap: entered promiscuous mode [ 247.564980][ T3279] veth1_macvtap: entered promiscuous mode [ 247.588496][ T3280] veth1_macvtap: entered promiscuous mode [ 248.534195][ T3280] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.536689][ T3280] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.537495][ T3280] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.538248][ T3280] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.650135][ T3279] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.663159][ T3279] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.664263][ T3279] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.665051][ T3279] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.726230][ T29] audit: type=1400 audit(249.100:80): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 249.785798][ T29] audit: type=1400 audit(249.140:81): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.yWvqt6/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 249.927845][ T29] audit: type=1400 audit(249.300:82): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 249.992240][ T29] audit: type=1400 audit(249.370:83): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.yWvqt6/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 250.030093][ T29] audit: type=1400 audit(249.410:84): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/syzkaller.yWvqt6/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3471 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 250.524278][ T29] audit: type=1400 audit(249.890:85): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 250.572395][ T29] audit: type=1400 audit(249.950:86): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 250.591815][ T29] audit: type=1400 audit(249.970:87): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="gadgetfs" ino=3475 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 250.629182][ T29] audit: type=1400 audit(250.010:88): avc: denied { mount } for pid=3280 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 250.644867][ T29] audit: type=1400 audit(250.030:89): avc: denied { mounton } for pid=3280 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 251.025564][ T3280] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 253.106913][ T3420] ======================================================= [ 253.106913][ T3420] WARNING: The mand mount option has been deprecated and [ 253.106913][ T3420] and is ignored by this kernel. Remove the mand [ 253.106913][ T3420] option from the mount to silence this warning. [ 253.106913][ T3420] ======================================================= [ 254.908668][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 254.908796][ T29] audit: type=1400 audit(254.290:99): avc: denied { create } for pid=3426 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 254.990260][ T29] audit: type=1400 audit(254.370:100): avc: denied { write } for pid=3426 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 256.872533][ T29] audit: type=1400 audit(256.040:101): avc: denied { create } for pid=3439 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 256.873733][ T29] audit: type=1400 audit(256.060:102): avc: denied { connect } for pid=3439 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 256.874752][ T29] audit: type=1400 audit(256.070:103): avc: denied { name_connect } for pid=3439 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 257.218505][ T29] audit: type=1400 audit(256.600:104): avc: denied { setopt } for pid=3439 comm="syz.1.12" lport=49490 faddr=10.1.1.1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 266.581830][ T29] audit: type=1400 audit(265.960:105): avc: denied { create } for pid=3480 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 266.599403][ T29] audit: type=1400 audit(265.980:106): avc: denied { write } for pid=3480 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 267.005283][ T29] audit: type=1400 audit(266.390:107): avc: denied { create } for pid=3482 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 267.064097][ T29] audit: type=1400 audit(266.450:108): avc: denied { write } for pid=3482 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 275.758021][ T29] audit: type=1400 audit(275.140:109): avc: denied { read write } for pid=3522 comm="syz.1.53" name="vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 275.760439][ T29] audit: type=1400 audit(275.140:110): avc: denied { open } for pid=3522 comm="syz.1.53" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 275.798399][ T29] audit: type=1400 audit(275.180:111): avc: denied { ioctl } for pid=3522 comm="syz.1.53" path="/dev/vhost-vsock" dev="devtmpfs" ino=714 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 276.977172][ T29] audit: type=1400 audit(276.300:112): avc: denied { create } for pid=3531 comm="syz.0.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 276.978954][ T29] audit: type=1400 audit(276.310:113): avc: denied { write } for pid=3531 comm="syz.0.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 276.980489][ T29] audit: type=1400 audit(276.320:114): avc: denied { ioctl } for pid=3531 comm="syz.0.57" path="socket:[4583]" dev="sockfs" ino=4583 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 278.451302][ T29] audit: type=1400 audit(277.820:115): avc: denied { create } for pid=3539 comm="syz.0.61" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 278.781655][ T29] audit: type=1400 audit(278.160:116): avc: denied { unlink } for pid=3279 comm="syz-executor" name="file0" dev="tmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 280.650238][ T3554] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3554 comm=syz.1.68 [ 281.185684][ T29] audit: type=1400 audit(280.570:117): avc: denied { getopt } for pid=3555 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 282.053726][ T29] audit: type=1400 audit(281.410:118): avc: denied { lock } for pid=3559 comm="syz.1.71" path="socket:[3696]" dev="sockfs" ino=3696 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 282.872912][ T29] audit: type=1400 audit(282.250:119): avc: denied { create } for pid=3562 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 284.996795][ T29] audit: type=1400 audit(284.380:120): avc: denied { read } for pid=3578 comm="syz.0.81" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 285.000465][ T29] audit: type=1400 audit(284.380:121): avc: denied { open } for pid=3578 comm="syz.0.81" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 285.030637][ T29] audit: type=1400 audit(284.400:122): avc: denied { ioctl } for pid=3578 comm="syz.0.81" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 287.862733][ T29] audit: type=1400 audit(287.240:123): avc: denied { create } for pid=3588 comm="syz.0.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 287.963449][ T29] audit: type=1400 audit(287.340:124): avc: denied { setopt } for pid=3588 comm="syz.0.85" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 290.015346][ T29] audit: type=1400 audit(289.360:125): avc: denied { create } for pid=3596 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 290.017271][ T29] audit: type=1400 audit(289.370:126): avc: denied { bind } for pid=3596 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 290.019292][ T29] audit: type=1400 audit(289.380:127): avc: denied { write } for pid=3596 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 291.616163][ T29] audit: type=1400 audit(291.000:128): avc: denied { getopt } for pid=3604 comm="syz.1.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 292.578840][ T29] audit: type=1400 audit(291.960:129): avc: denied { ioctl } for pid=3609 comm="syz.1.95" path="socket:[4731]" dev="sockfs" ino=4731 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 294.607013][ T29] audit: type=1400 audit(293.890:130): avc: denied { create } for pid=3619 comm="syz.1.100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 294.608853][ T29] audit: type=1400 audit(293.910:131): avc: denied { read write } for pid=3619 comm="syz.1.100" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 294.610365][ T29] audit: type=1400 audit(293.910:132): avc: denied { open } for pid=3619 comm="syz.1.100" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 296.927973][ T29] audit: type=1400 audit(296.310:133): avc: denied { create } for pid=3637 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 297.009578][ T29] audit: type=1400 audit(296.390:134): avc: denied { setopt } for pid=3637 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 301.424264][ T29] audit: type=1400 audit(300.810:135): avc: denied { read write } for pid=3659 comm="syz.1.120" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 301.428281][ T29] audit: type=1400 audit(300.810:136): avc: denied { open } for pid=3659 comm="syz.1.120" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 302.170406][ T3365] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 302.203766][ T3365] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 302.326517][ T3365] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 303.356604][ T29] audit: type=1400 audit(302.710:137): avc: denied { create } for pid=3668 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 303.436680][ T29] audit: type=1400 audit(302.820:138): avc: denied { write } for pid=3668 comm="syz.1.124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 304.538427][ T29] audit: type=1400 audit(303.880:139): avc: denied { execute } for pid=3675 comm="syz.1.127" name="file1" dev="tmpfs" ino=339 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 305.333199][ T29] audit: type=1400 audit(304.200:140): avc: denied { setopt } for pid=3677 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 309.090321][ T29] audit: type=1400 audit(308.470:141): avc: denied { create } for pid=3713 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 309.120569][ T29] audit: type=1400 audit(308.500:142): avc: denied { connect } for pid=3713 comm="syz.0.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 309.676100][ T29] audit: type=1400 audit(309.060:143): avc: denied { write } for pid=3713 comm="syz.0.147" path="socket:[3962]" dev="sockfs" ino=3962 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 312.322497][ T3724] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3724 comm=syz.0.150 [ 314.112892][ T29] audit: type=1400 audit(313.490:144): avc: denied { nlmsg_write } for pid=3728 comm="syz.1.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 316.266305][ T29] audit: type=1400 audit(315.580:145): avc: denied { write } for pid=3740 comm="syz.1.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 318.608173][ T29] audit: type=1400 audit(317.970:146): avc: denied { create } for pid=3754 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 318.708865][ T29] audit: type=1400 audit(318.080:147): avc: denied { write } for pid=3754 comm="syz.1.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 324.402541][ T29] audit: type=1400 audit(323.430:148): avc: denied { create } for pid=3786 comm="syz.1.180" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 324.404590][ T29] audit: type=1400 audit(323.450:149): avc: denied { read } for pid=3786 comm="syz.1.180" name="file0" dev="tmpfs" ino=471 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 324.406249][ T29] audit: type=1400 audit(323.460:150): avc: denied { open } for pid=3786 comm="syz.1.180" path="/89/file0" dev="tmpfs" ino=471 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 324.408045][ T29] audit: type=1400 audit(323.470:151): avc: denied { ioctl } for pid=3786 comm="syz.1.180" path="/89/file0" dev="tmpfs" ino=471 ioctlcmd=0x1267 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 324.409660][ T29] audit: type=1400 audit(323.630:152): avc: denied { unlink } for pid=3280 comm="syz-executor" name="file0" dev="tmpfs" ino=471 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 325.809413][ T29] audit: type=1400 audit(325.190:153): avc: denied { write } for pid=3794 comm="syz.0.184" path="socket:[5151]" dev="sockfs" ino=5151 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 327.129509][ T29] audit: type=1400 audit(326.510:154): avc: denied { open } for pid=3800 comm="syz.1.187" path="/dev/ptyq7" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 327.204470][ T29] audit: type=1400 audit(326.590:155): avc: denied { ioctl } for pid=3800 comm="syz.1.187" path="/dev/ttyq7" dev="devtmpfs" ino=374 ioctlcmd=0x540d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 327.408162][ T29] audit: type=1400 audit(326.790:156): avc: denied { read } for pid=3804 comm="syz.0.189" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 327.433237][ T29] audit: type=1400 audit(326.820:157): avc: denied { open } for pid=3804 comm="syz.0.189" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 328.203380][ T3809] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3809 comm=syz.1.190 [ 331.254627][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 331.254746][ T29] audit: type=1400 audit(330.640:171): avc: denied { map_create } for pid=3823 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 331.274403][ T29] audit: type=1400 audit(330.660:172): avc: denied { bpf } for pid=3823 comm="syz.0.199" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 331.334944][ T29] audit: type=1400 audit(330.720:173): avc: denied { map_read map_write } for pid=3823 comm="syz.0.199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 331.817724][ T29] audit: type=1400 audit(331.200:174): avc: denied { write } for pid=3826 comm="syz.0.201" name="mcfilter6" dev="proc" ino=4026532772 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 334.083603][ T29] audit: type=1400 audit(333.470:175): avc: denied { getopt } for pid=3837 comm="syz.1.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 339.134826][ T29] audit: type=1400 audit(338.500:176): avc: denied { getopt } for pid=3852 comm="syz.1.211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 339.563398][ T29] audit: type=1400 audit(338.940:177): avc: denied { write } for pid=3854 comm="syz.0.212" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 339.593518][ T3855] raw_sendmsg: syz.0.212 forgot to set AF_INET. Fix it! [ 343.649740][ T29] audit: type=1400 audit(342.970:178): avc: denied { create } for pid=3877 comm="syz.0.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 343.657303][ T29] audit: type=1400 audit(343.010:179): avc: denied { write } for pid=3877 comm="syz.0.223" path="socket:[5253]" dev="sockfs" ino=5253 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 344.319225][ T29] audit: type=1400 audit(343.700:180): avc: denied { connect } for pid=3882 comm="syz.1.227" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 347.182815][ T29] audit: type=1400 audit(346.200:181): avc: denied { create } for pid=3893 comm="syz.1.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 347.185089][ T29] audit: type=1400 audit(346.220:182): avc: denied { getopt } for pid=3893 comm="syz.1.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 348.813872][ T29] audit: type=1400 audit(348.190:183): avc: denied { read write } for pid=3900 comm="syz.0.236" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 348.853311][ T29] audit: type=1400 audit(348.230:184): avc: denied { open } for pid=3900 comm="syz.0.236" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 348.945474][ T29] audit: type=1400 audit(348.330:185): avc: denied { map } for pid=3900 comm="syz.0.236" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 348.960405][ T29] audit: type=1400 audit(348.330:186): avc: denied { execute } for pid=3900 comm="syz.0.236" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 354.292575][ T29] audit: type=1400 audit(353.670:187): avc: denied { ioctl } for pid=3926 comm="syz.0.247" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x125d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.227864][ T3972] Zero length message leads to an empty skb [ 363.712542][ T29] audit: type=1400 audit(363.010:188): avc: denied { ioctl } for pid=3988 comm="syz.1.279" path="socket:[5474]" dev="sockfs" ino=5474 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 373.447238][ T29] audit: type=1400 audit(372.830:189): avc: denied { ioctl } for pid=4047 comm="syz.0.306" path="socket:[5592]" dev="sockfs" ino=5592 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 373.612844][ T29] audit: type=1400 audit(373.000:190): avc: denied { setopt } for pid=4047 comm="syz.0.306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 389.888445][ T29] audit: type=1400 audit(389.150:191): avc: denied { bind } for pid=4138 comm="syz.1.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 389.889456][ T29] audit: type=1400 audit(389.170:192): avc: denied { setopt } for pid=4138 comm="syz.1.350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 398.799742][ T29] audit: type=1400 audit(398.180:193): avc: denied { connect } for pid=4186 comm="syz.0.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 402.547090][ T29] audit: type=1400 audit(401.930:194): avc: denied { read } for pid=4198 comm="syz.0.378" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 402.549751][ T29] audit: type=1400 audit(401.930:195): avc: denied { open } for pid=4198 comm="syz.0.378" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 402.585312][ T29] audit: type=1400 audit(401.970:196): avc: denied { ioctl } for pid=4198 comm="syz.0.378" path="/dev/usbmon0" dev="devtmpfs" ino=695 ioctlcmd=0x9205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 404.384610][ T29] audit: type=1400 audit(403.770:197): avc: denied { create } for pid=4209 comm="syz.0.382" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 405.853555][ T29] audit: type=1400 audit(404.960:198): avc: denied { read } for pid=4215 comm="syz.0.387" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 408.843241][ T29] audit: type=1400 audit(408.190:199): avc: denied { write } for pid=4227 comm="syz.0.392" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 412.066872][ T4245] capability: warning: `syz.0.401' uses deprecated v2 capabilities in a way that may be insecure [ 413.528233][ T29] audit: type=1400 audit(412.910:200): avc: denied { read } for pid=4251 comm="syz.1.404" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 413.532143][ T29] audit: type=1400 audit(412.910:201): avc: denied { open } for pid=4251 comm="syz.1.404" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 415.755749][ T29] audit: type=1400 audit(415.140:202): avc: denied { create } for pid=4265 comm="syz.0.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 415.772710][ T29] audit: type=1400 audit(415.160:203): avc: denied { write } for pid=4265 comm="syz.0.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 416.325759][ T29] audit: type=1400 audit(415.710:204): avc: denied { read } for pid=4268 comm="syz.0.412" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 416.327710][ T29] audit: type=1400 audit(415.710:205): avc: denied { open } for pid=4268 comm="syz.0.412" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 416.353190][ T29] audit: type=1400 audit(415.730:206): avc: denied { ioctl } for pid=4268 comm="syz.0.412" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9377 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 417.082308][ T29] audit: type=1400 audit(416.460:207): avc: denied { create } for pid=4271 comm="syz.0.414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 426.222816][ T4311] capability: warning: `syz.1.432' uses 32-bit capabilities (legacy support in use) [ 429.986763][ T29] audit: type=1400 audit(429.370:208): avc: denied { read } for pid=4335 comm="syz.0.445" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 429.988951][ T29] audit: type=1400 audit(429.370:209): avc: denied { open } for pid=4335 comm="syz.0.445" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 433.624110][ T29] audit: type=1400 audit(432.950:210): avc: denied { create } for pid=4359 comm="syz.1.457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 437.212974][ T29] audit: type=1400 audit(436.600:211): avc: denied { read } for pid=4384 comm="syz.1.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 438.098290][ T29] audit: type=1400 audit(437.480:212): avc: denied { write } for pid=4384 comm="syz.1.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 440.268222][ T29] audit: type=1400 audit(439.650:213): avc: denied { read } for pid=4405 comm="syz.0.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 441.685441][ T29] audit: type=1400 audit(441.070:214): avc: denied { prog_load } for pid=4421 comm="syz.0.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 441.707908][ T29] audit: type=1400 audit(441.090:215): avc: denied { perfmon } for pid=4421 comm="syz.0.487" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 441.823714][ T29] audit: type=1400 audit(441.210:216): avc: denied { prog_run } for pid=4421 comm="syz.0.487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 445.097532][ T29] audit: type=1400 audit(444.480:217): avc: denied { name_bind } for pid=4447 comm="syz.1.500" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 445.109366][ T29] audit: type=1400 audit(444.480:218): avc: denied { node_bind } for pid=4447 comm="syz.1.500" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 450.893162][ T29] audit: type=1400 audit(450.270:219): avc: denied { ioctl } for pid=4478 comm="syz.0.515" path="socket:[8232]" dev="sockfs" ino=8232 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 454.110412][ T29] audit: type=1400 audit(453.490:220): avc: denied { write } for pid=4490 comm="syz.0.521" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 455.366208][ T29] audit: type=1400 audit(454.750:221): avc: denied { read } for pid=4494 comm="syz.0.523" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 455.369157][ T29] audit: type=1400 audit(454.750:222): avc: denied { open } for pid=4494 comm="syz.0.523" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 455.386566][ T29] audit: type=1400 audit(454.770:223): avc: denied { ioctl } for pid=4494 comm="syz.0.523" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 457.487551][ T29] audit: type=1400 audit(456.870:224): avc: denied { write } for pid=4504 comm="syz.1.528" path="socket:[7257]" dev="sockfs" ino=7257 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 459.626175][ T4517] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 464.988063][ T29] audit: type=1400 audit(464.350:225): avc: denied { sqpoll } for pid=4548 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 465.040023][ T29] audit: type=1400 audit(464.420:226): avc: denied { map } for pid=4548 comm="syz.0.550" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8359 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 465.057932][ T29] audit: type=1400 audit(464.440:227): avc: denied { read write } for pid=4548 comm="syz.0.550" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8359 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 485.688903][ T29] audit: type=1400 audit(485.070:228): avc: denied { ioctl } for pid=4659 comm="syz.1.604" path="socket:[8596]" dev="sockfs" ino=8596 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 486.865167][ T29] audit: type=1400 audit(486.250:229): avc: denied { read } for pid=4670 comm="syz.0.610" path="socket:[8616]" dev="sockfs" ino=8616 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 491.967435][ T29] audit: type=1400 audit(491.350:230): avc: denied { block_suspend } for pid=4713 comm="syz.1.630" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 502.086582][ T29] audit: type=1400 audit(501.470:231): avc: denied { bind } for pid=4764 comm="syz.1.656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 502.087806][ T29] audit: type=1400 audit(501.470:232): avc: denied { node_bind } for pid=4764 comm="syz.1.656" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 506.195198][ T4791] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4791 comm=syz.0.669 [ 509.445505][ T4804] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4804 comm=syz.0.676 [ 512.414913][ T4820] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4820 comm=syz.1.683 [ 516.287093][ T29] audit: type=1400 audit(515.670:233): avc: denied { read } for pid=4840 comm="syz.0.694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 516.742011][ T4843] nvme_fabrics: missing parameter 'transport=%s' [ 516.743275][ T4843] nvme_fabrics: missing parameter 'nqn=%s' [ 527.816789][ T4899] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4899 comm=syz.0.722 [ 530.220291][ T29] audit: type=1400 audit(529.600:234): avc: denied { mounton } for pid=4909 comm="syz.0.727" path="/361/file0" dev="tmpfs" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 530.255825][ T29] audit: type=1400 audit(529.630:235): avc: denied { mount } for pid=4909 comm="syz.0.727" name="/" dev="configfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 530.369481][ T29] audit: type=1400 audit(529.750:236): avc: denied { remount } for pid=4909 comm="syz.0.727" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 530.678452][ T29] audit: type=1400 audit(530.060:237): avc: denied { unmount } for pid=3279 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 536.896172][ T29] audit: type=1400 audit(536.170:238): avc: denied { ioctl } for pid=4936 comm="syz.0.740" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 544.439776][ T29] audit: type=1400 audit(543.660:239): avc: denied { write } for pid=4983 comm="syz.0.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 548.817717][ T5012] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5012 comm=syz.0.777 [ 565.632455][ T29] audit: type=1400 audit(565.000:240): avc: denied { create } for pid=5093 comm="syz.1.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 568.669209][ T29] audit: type=1400 audit(568.050:241): avc: denied { read } for pid=5098 comm="syz.0.817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 575.750408][ T29] audit: type=1400 audit(575.120:242): avc: denied { setattr } for pid=5142 comm="syz.0.838" name="vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 591.303767][ T30] hid-generic 0000:0003:0000.0002: unknown main item tag 0x0 [ 591.304592][ T30] hid-generic 0000:0003:0000.0002: unknown main item tag 0x0 [ 591.353299][ T30] hid-generic 0000:0003:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz1 [ 591.474499][ T3428] udevd[3428]: setting mode of /dev/hidraw0 to 020600 failed: No such file or directory [ 591.476358][ T3428] udevd[3428]: setting owner of /dev/hidraw0 to uid=0, gid=0 failed: No such file or directory [ 599.107819][ T29] audit: type=1400 audit(598.490:243): avc: denied { shutdown } for pid=5262 comm="syz.1.895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 599.135019][ T29] audit: type=1400 audit(598.520:244): avc: denied { name_connect } for pid=5262 comm="syz.1.895" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 604.332643][ T29] audit: type=1400 audit(603.670:245): avc: denied { create } for pid=5293 comm="syz.0.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 608.070164][ T29] audit: type=1400 audit(607.450:246): avc: denied { setattr } for pid=5322 comm="syz.1.924" name="sequencer2" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 610.784366][ T5332] netlink: 64 bytes leftover after parsing attributes in process `syz.0.929'. [ 636.695281][ T29] audit: type=1400 audit(636.070:247): avc: denied { write } for pid=5462 comm="syz.0.992" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 646.096877][ T5510] netlink: 4083 bytes leftover after parsing attributes in process `syz.1.1012'. [ 676.369842][ T29] audit: type=1400 audit(675.740:248): avc: denied { getopt } for pid=5598 comm="syz.1.1058" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 676.839536][ T29] audit: type=1400 audit(676.220:249): avc: denied { read write } for pid=5600 comm="syz.1.1059" name="mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 676.872661][ T29] audit: type=1400 audit(676.240:250): avc: denied { open } for pid=5600 comm="syz.1.1059" path="/dev/input/mice" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 685.323950][ T29] audit: type=1400 audit(684.710:251): avc: denied { ioctl } for pid=5621 comm="syz.1.1069" path="socket:[11062]" dev="sockfs" ino=11062 ioctlcmd=0x8905 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 686.526629][ T29] audit: type=1400 audit(685.900:252): avc: denied { ioctl } for pid=5625 comm="syz.1.1071" path="socket:[11075]" dev="sockfs" ino=11075 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 689.108516][ T5632] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5632 comm=syz.1.1073 [ 689.753524][ T29] audit: type=1400 audit(689.120:253): avc: denied { setattr } for pid=5633 comm="syz.1.1074" name="" dev="pipefs" ino=998 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 693.160516][ T29] audit: type=1400 audit(692.540:254): avc: denied { setopt } for pid=5641 comm="syz.1.1078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 705.329152][ T55] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 705.716991][ T55] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 706.068062][ T55] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 706.398243][ T55] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 709.273250][ T29] audit: type=1400 audit(708.620:255): avc: denied { read } for pid=3130 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 713.855069][ T55] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 713.933360][ T55] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 713.999030][ T55] bond0 (unregistering): Released all slaves [ 715.404447][ T55] hsr_slave_0: left promiscuous mode [ 715.594766][ T55] hsr_slave_1: left promiscuous mode [ 716.094272][ T55] veth1_macvtap: left promiscuous mode [ 716.098246][ T55] veth0_macvtap: left promiscuous mode [ 716.102323][ T55] veth1_vlan: left promiscuous mode [ 716.156246][ T55] veth0_vlan: left promiscuous mode [ 724.197534][ T29] audit: type=1400 audit(723.580:256): avc: denied { listen } for pid=5663 comm="syz.1.1081" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 736.038046][ T5645] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 736.138345][ T5645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 737.948863][ T5723] ucma_write: process 1114 (syz.1.1095) changed security contexts after opening file descriptor, this is not allowed. [ 740.978418][ T5645] hsr_slave_0: entered promiscuous mode [ 741.090138][ T5645] hsr_slave_1: entered promiscuous mode [ 741.164644][ T5645] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 741.165977][ T5645] Cannot create hsr debugfs directory [ 742.015446][ T29] audit: type=1400 audit(741.400:257): avc: denied { write } for pid=5738 comm="syz.1.1098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 743.824304][ T5645] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 743.888568][ T5645] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 743.955269][ T5645] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 744.016306][ T5645] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 749.753420][ T5645] 8021q: adding VLAN 0 to HW filter on device bond0 [ 760.654963][ T29] audit: type=1400 audit(760.040:258): avc: denied { write } for pid=5813 comm="syz.1.1113" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 765.785310][ T5645] veth0_vlan: entered promiscuous mode [ 766.015964][ T5645] veth1_vlan: entered promiscuous mode [ 766.656905][ T5645] veth0_macvtap: entered promiscuous mode [ 766.934005][ T5645] veth1_macvtap: entered promiscuous mode [ 767.420625][ T5645] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 767.425071][ T5645] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 767.425521][ T5645] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 767.425920][ T5645] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 768.286404][ T29] audit: type=1400 audit(767.470:259): avc: denied { mounton } for pid=5645 comm="syz-executor" path="/syzkaller.cJMsqR/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 768.679766][ T29] audit: type=1400 audit(768.060:260): avc: denied { mounton } for pid=5645 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 779.824994][ T5901] SELinux: syz.1.1135 (5901) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 790.506864][ T29] audit: type=1400 audit(789.880:261): avc: denied { checkpoint_restore } for pid=5957 comm="syz.2.1161" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 791.627292][ T29] audit: type=1400 audit(791.000:262): avc: denied { getopt } for pid=5959 comm="syz.2.1162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 808.828785][ T29] audit: type=1400 audit(808.210:263): avc: denied { setopt } for pid=6011 comm="syz.2.1185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 810.879089][ T29] audit: type=1400 audit(810.260:264): avc: denied { create } for pid=6023 comm="syz.1.1190" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 810.905584][ T29] audit: type=1400 audit(810.290:265): avc: denied { read } for pid=6023 comm="syz.1.1190" name="file0" dev="tmpfs" ino=3037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 810.920103][ T29] audit: type=1400 audit(810.290:266): avc: denied { open } for pid=6023 comm="syz.1.1190" path="/589/file0" dev="tmpfs" ino=3037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 810.937271][ T29] audit: type=1400 audit(810.320:267): avc: denied { ioctl } for pid=6023 comm="syz.1.1190" path="/589/file0" dev="tmpfs" ino=3037 ioctlcmd=0x127e scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 811.159618][ T29] audit: type=1400 audit(810.540:268): avc: denied { unlink } for pid=3280 comm="syz-executor" name="file0" dev="tmpfs" ino=3037 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 813.366237][ T6042] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1017 sclass=netlink_route_socket pid=6042 comm=syz.1.1201 [ 822.803717][ T29] audit: type=1400 audit(822.170:269): avc: denied { write } for pid=6101 comm="syz.2.1230" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 831.956956][ T3413] hid-generic 0000:0D16:0000.0003: unknown main item tag 0x0 [ 831.957821][ T3413] hid-generic 0000:0D16:0000.0003: unknown main item tag 0x0 [ 832.026349][ T3413] hid-generic 0000:0D16:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz1 [ 833.297249][ T29] audit: type=1400 audit(832.680:270): avc: denied { read } for pid=6179 comm="syz.1.1267" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 833.298936][ T29] audit: type=1400 audit(832.680:271): avc: denied { open } for pid=6179 comm="syz.1.1267" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 833.320240][ T29] audit: type=1400 audit(832.700:272): avc: denied { ioctl } for pid=6179 comm="syz.1.1267" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4602 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 834.258977][ T6187] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6187 comm=syz.2.1271 [ 834.678051][ T29] audit: type=1400 audit(834.060:273): avc: denied { read } for pid=6189 comm="syz.2.1272" dev="nsfs" ino=4026532812 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 834.706153][ T29] audit: type=1400 audit(834.090:274): avc: denied { open } for pid=6189 comm="syz.2.1272" path="net:[4026532812]" dev="nsfs" ino=4026532812 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 856.229046][ T29] audit: type=1400 audit(855.610:275): avc: denied { create } for pid=6297 comm="syz.2.1323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 856.306543][ T29] audit: type=1400 audit(855.660:276): avc: denied { write } for pid=6297 comm="syz.2.1323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 856.507387][ T29] audit: type=1400 audit(855.880:277): avc: denied { read } for pid=6297 comm="syz.2.1323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 859.058763][ T29] audit: type=1400 audit(858.440:278): avc: denied { write } for pid=6317 comm="syz.1.1333" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 865.915696][ T29] audit: type=1400 audit(865.280:279): avc: denied { ioctl } for pid=6372 comm="syz.1.1359" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 897.839585][ T29] audit: type=1400 audit(897.220:280): avc: denied { ioctl } for pid=6570 comm="syz.1.1453" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 909.914217][ T6651] pim6reg: entered allmulticast mode [ 920.947932][ T29] audit: type=1400 audit(920.330:281): avc: denied { setopt } for pid=6718 comm="syz.1.1525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 928.977216][ T29] audit: type=1400 audit(928.360:282): avc: denied { create } for pid=6752 comm="syz.2.1542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 929.030281][ T29] audit: type=1400 audit(928.410:283): avc: denied { write } for pid=6752 comm="syz.2.1542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 937.942479][ T29] audit: type=1400 audit(937.320:284): avc: denied { ioctl } for pid=6809 comm="syz.1.1568" path="socket:[15122]" dev="sockfs" ino=15122 ioctlcmd=0x5541 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 942.188142][ T29] audit: type=1400 audit(941.570:285): avc: denied { setopt } for pid=6850 comm="syz.2.1588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 953.437407][ T29] audit: type=1400 audit(952.820:286): avc: denied { create } for pid=6939 comm="syz.2.1632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 954.998292][ T29] audit: type=1400 audit(954.370:287): avc: denied { setopt } for pid=6948 comm="syz.2.1636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 961.877636][ T29] audit: type=1400 audit(961.260:288): avc: denied { create } for pid=6992 comm="syz.1.1657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 961.922505][ T29] audit: type=1400 audit(961.300:289): avc: denied { write } for pid=6992 comm="syz.1.1657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 964.911978][ T29] audit: type=1400 audit(964.290:290): avc: denied { read } for pid=7010 comm="syz.2.1666" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 964.924972][ T29] audit: type=1400 audit(964.310:291): avc: denied { open } for pid=7010 comm="syz.2.1666" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 975.903269][ T29] audit: type=1400 audit(975.280:292): avc: denied { ioctl } for pid=7082 comm="syz.2.1702" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=16490 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 976.470446][ T29] audit: type=1400 audit(975.840:293): avc: denied { append } for pid=7084 comm="syz.2.1703" name="ubi_ctrl" dev="devtmpfs" ino=686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 983.073293][ T7121] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 994.342688][ T29] audit: type=1400 audit(993.720:294): avc: denied { accept } for pid=7198 comm="syz.2.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 998.970574][ T7222] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7222 comm=syz.2.1770 [ 1005.788388][ T29] audit: type=1400 audit(1005.170:295): avc: denied { connect } for pid=7267 comm="syz.1.1793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1008.368234][ T7288] netlink: 56 bytes leftover after parsing attributes in process `syz.1.1802'. [ 1008.384596][ T7288] netlink: 56 bytes leftover after parsing attributes in process `syz.1.1802'. [ 1025.514580][ T29] audit: type=1400 audit(1024.900:296): avc: denied { write } for pid=7391 comm="syz.1.1855" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1025.556646][ T29] audit: type=1400 audit(1024.940:297): avc: denied { ioctl } for pid=7391 comm="syz.1.1855" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1025.578862][ T7394] binder: 7391:7394 ioctl 4018620d 0 returned -22 [ 1025.615269][ T7394] binder: 7391:7394 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1025.616301][ T7394] binder: 7394 RLIMIT_NICE not set [ 1025.617050][ T7394] binder: 7391:7394 ioctl c0306201 20000380 returned -11 [ 1025.887159][ T29] audit: type=1400 audit(1025.270:298): avc: denied { setattr } for pid=7395 comm="syz.2.1857" name="SMC" dev="sockfs" ino=17083 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1030.101641][ T29] audit: type=1400 audit(1029.240:299): avc: denied { create } for pid=7425 comm="syz.2.1872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1030.102658][ T29] audit: type=1400 audit(1029.260:300): avc: denied { write } for pid=7425 comm="syz.2.1872" path="socket:[17130]" dev="sockfs" ino=17130 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1033.424414][ T29] audit: type=1400 audit(1032.810:301): avc: denied { listen } for pid=7441 comm="syz.1.1880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1034.028173][ T29] audit: type=1400 audit(1033.410:302): avc: denied { ioctl } for pid=7441 comm="syz.1.1880" path="socket:[17479]" dev="sockfs" ino=17479 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1045.584081][ T29] audit: type=1400 audit(1044.970:303): avc: denied { create } for pid=7522 comm="syz.1.1917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1045.604534][ T29] audit: type=1400 audit(1044.990:304): avc: denied { write } for pid=7522 comm="syz.1.1917" path="socket:[17280]" dev="sockfs" ino=17280 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1047.159568][ T29] audit: type=1400 audit(1046.540:305): avc: denied { write } for pid=7531 comm="syz.1.1922" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 1048.189206][ T7538] sctp: [Deprecated]: syz.1.1925 (pid 7538) Use of int in maxseg socket option. [ 1048.189206][ T7538] Use struct sctp_assoc_value instead [ 1056.562512][ T29] audit: type=1400 audit(1055.910:306): avc: denied { ioctl } for pid=7581 comm="syz.2.1947" path="socket:[17699]" dev="sockfs" ino=17699 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1074.497395][ T7688] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7688 comm=syz.2.1999 [ 1075.654132][ T29] audit: type=1400 audit(1075.040:307): avc: denied { read } for pid=7696 comm="syz.2.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1076.208176][ T29] audit: type=1400 audit(1075.570:308): avc: denied { nlmsg_read } for pid=7696 comm="syz.2.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 1077.245756][ T7708] ptrace attach of "/syz-executor exec"[7709] was attempted by "/syz-executor exec"[7708] [ 1085.693840][ T29] audit: type=1400 audit(1085.070:309): avc: denied { append } for pid=7764 comm="syz.1.2035" name="001" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1087.409811][ T7769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7769 comm=syz.1.2036 [ 1090.999567][ T29] audit: type=1400 audit(1090.380:310): avc: denied { nlmsg_read } for pid=7794 comm="syz.1.2050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1105.667879][ T29] audit: type=1400 audit(1105.050:311): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1121.514563][ T29] audit: type=1400 audit(1120.900:312): avc: denied { setattr } for pid=7968 comm="syz.2.2136" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1138.408370][ T29] audit: type=1400 audit(1137.790:313): avc: denied { shutdown } for pid=8081 comm="syz.1.2192" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1139.061423][ T8087] syz.2.2194 uses obsolete (PF_INET,SOCK_PACKET) [ 1167.040521][ T29] audit: type=1400 audit(1166.420:314): avc: denied { setopt } for pid=8255 comm="syz.1.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1187.013745][ T29] audit: type=1400 audit(1186.380:315): avc: denied { bind } for pid=8359 comm="syz.2.2325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1187.034665][ T29] audit: type=1400 audit(1186.400:316): avc: denied { node_bind } for pid=8359 comm="syz.2.2325" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1202.203914][ T8466] snd_dummy snd_dummy.0: control 0:0:0:syz1:0 is already present [ 1222.633446][ T29] audit: type=1400 audit(1221.990:317): avc: denied { write } for pid=8564 comm="syz.1.2423" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1227.325457][ T29] audit: type=1400 audit(1226.710:318): avc: denied { getopt } for pid=8596 comm="syz.2.2439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1231.713809][ T29] audit: type=1400 audit(1231.100:319): avc: denied { read } for pid=8618 comm="syz.1.2450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1234.432931][ T29] audit: type=1400 audit(1233.800:320): avc: denied { read } for pid=8638 comm="syz.1.2460" path="socket:[21226]" dev="sockfs" ino=21226 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1235.205115][ T29] audit: type=1400 audit(1234.580:321): avc: denied { mount } for pid=8646 comm="syz.1.2464" name="/" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 1235.225736][ T29] audit: type=1400 audit(1234.610:322): avc: denied { mounton } for pid=8646 comm="syz.1.2464" path="/1116/file0" dev="selinuxfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=dir permissive=1 [ 1235.355216][ T29] audit: type=1400 audit(1234.730:323): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 1237.642966][ T29] audit: type=1400 audit(1237.020:324): avc: denied { bind } for pid=8666 comm="syz.1.2474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1246.669942][ T29] audit: type=1400 audit(1246.010:325): avc: denied { mount } for pid=8724 comm="syz.2.2503" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1265.453290][ T8835] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=260 sclass=netlink_route_socket pid=8835 comm=syz.2.2553 [ 1280.596959][ T8937] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8937 comm=syz.2.2603 [ 1305.810340][ T29] audit: type=1400 audit(1305.190:326): avc: denied { ioctl } for pid=9095 comm="syz.1.2682" path="socket:[23036]" dev="sockfs" ino=23036 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1306.826614][ T9108] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9108 comm=syz.1.2687 [ 1314.884582][ T9163] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2048 sclass=netlink_xfrm_socket pid=9163 comm=syz.2.2714 [ 1316.228019][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.229265][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.230121][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.242403][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.243634][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.244440][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.245374][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.246222][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.247072][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.248053][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.248895][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.249740][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.250583][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.272565][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.273689][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.274581][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.275535][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.276390][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.277227][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.278128][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.278955][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.279818][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.280760][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.303303][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.304338][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.305221][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.306093][ T7938] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1316.368526][ T7938] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz1 [ 1335.048267][ T29] audit: type=1400 audit(1334.430:327): avc: denied { setopt } for pid=9261 comm="syz.2.2762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1352.613266][ T29] audit: type=1400 audit(1352.000:328): avc: denied { setopt } for pid=9339 comm="syz.1.2799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1357.279416][ T9379] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=9379 comm=syz.1.2817 [ 1375.666572][ T29] audit: type=1400 audit(1375.050:329): avc: denied { write } for pid=9484 comm="syz.2.2866" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1392.351774][ T29] audit: type=1400 audit(1391.730:330): avc: denied { compute_member } for pid=9583 comm="syz.2.2915" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1392.954137][ T29] audit: type=1400 audit(1392.330:331): avc: denied { set_context_mgr } for pid=9586 comm="syz.2.2917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 1392.966534][ T9587] binder: BINDER_SET_CONTEXT_MGR already set [ 1392.967844][ T9587] binder: 9586:9587 ioctl 40046207 0 returned -16 [ 1409.036691][ T9672] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1409.098917][ T9672] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1415.860062][ T29] audit: type=1400 audit(1415.240:332): avc: denied { connect } for pid=9707 comm="syz.2.2975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1418.498059][ T29] audit: type=1400 audit(1417.870:333): avc: denied { mount } for pid=9728 comm="syz.2.2985" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1418.592639][ T29] audit: type=1400 audit(1417.950:334): avc: denied { mounton } for pid=9728 comm="syz.2.2985" path="/1098/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 1418.793206][ T29] audit: type=1400 audit(1418.160:335): avc: denied { unmount } for pid=5645 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1420.003931][ T29] audit: type=1400 audit(1419.380:336): avc: denied { mount } for pid=9736 comm="syz.2.2989" name="/" dev="ramfs" ino=24340 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1455.776080][ T29] audit: type=1400 audit(1455.150:337): avc: denied { mount } for pid=9934 comm="syz.2.3086" name="/" dev="hugetlbfs" ino=25333 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1455.985038][ T29] audit: type=1400 audit(1455.320:338): avc: denied { unmount } for pid=5645 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1472.656368][ T29] audit: type=1400 audit(1472.040:339): avc: denied { bind } for pid=10038 comm="syz.1.3136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1481.903887][T10101] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10101 comm=syz.2.3168 [ 1507.916316][ T29] audit: type=1400 audit(1507.290:340): avc: denied { audit_write } for pid=10261 comm="syz.2.3247" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1511.873149][T10293] syz.2.3261 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 1555.984182][T10564] binder: BINDER_SET_CONTEXT_MGR already set [ 1555.984844][T10564] binder: 10562:10564 ioctl 4018620d 20000040 returned -16 [ 1565.158159][T10607] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10607 comm=syz.1.3406 [ 1591.154327][T10713] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10713 comm=syz.1.3457 [ 1600.203930][T10749] netlink: 444 bytes leftover after parsing attributes in process `syz.1.3475'. [ 1616.833835][T10825] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5135 sclass=netlink_audit_socket pid=10825 comm=syz.1.3511 [ 1634.783056][ T29] audit: type=1400 audit(1634.160:341): avc: denied { name_bind } for pid=10873 comm="syz.1.3535" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1641.236918][ T29] audit: type=1400 audit(1640.620:342): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1647.526273][ T29] audit: type=1400 audit(1646.910:343): avc: denied { read } for pid=10923 comm="syz.1.3560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1649.772375][T10941] binder: 10940:10941 BC_CLEAR_FREEZE_NOTIFICATION invalid ref 1 [ 1649.775520][T10941] binder: 10940:10941 ioctl c0306201 200001c0 returned -22 [ 1649.813567][ T29] audit: type=1400 audit(1649.180:344): avc: denied { remove_name } for pid=3085 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1649.834784][ T29] audit: type=1400 audit(1649.220:345): avc: denied { rename } for pid=3085 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1649.849962][ T29] audit: type=1400 audit(1649.230:346): avc: denied { create } for pid=3085 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1650.627969][T10945] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=10945 comm=syz.1.3570 [ 1653.253621][T10963] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10963 comm=syz.1.3579 [ 1653.854110][ T29] audit: type=1400 audit(1653.240:347): avc: denied { bind } for pid=10966 comm="syz.2.3581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1653.870560][ T29] audit: type=1400 audit(1653.240:348): avc: denied { listen } for pid=10966 comm="syz.2.3581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1653.912255][ T29] audit: type=1400 audit(1653.280:349): avc: denied { accept } for pid=10966 comm="syz.2.3581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1663.067584][T11008] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11008 comm=syz.2.3601 [ 1680.114030][T11088] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pid=11088 comm=syz.2.3641 [ 1712.477542][T11162] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11162 comm=syz.2.3679 [ 1739.797746][ T29] audit: type=1400 audit(1739.180:350): avc: denied { read } for pid=11302 comm="syz.2.3746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1745.044768][T11328] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11328 comm=syz.1.3758 [ 1758.180311][T11398] sctp: [Deprecated]: syz.2.3792 (pid 11398) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1758.180311][T11398] Use struct sctp_sack_info instead [ 1791.614132][T11544] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11544 comm=syz.2.3859 [ 1804.868093][T11590] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11590 comm=syz.2.3883 [ 1865.308739][ T29] audit: type=1400 audit(1864.690:351): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1872.415356][T11814] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11814 comm=syz.2.3992 [ 1885.665211][T11876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11876 comm=syz.1.4022 [ 1890.153751][T11888] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pid=11888 comm=syz.1.4028 [ 1894.614512][T11911] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=11911 comm=syz.2.4038 [ 1907.257365][ T29] audit: type=1400 audit(1906.640:352): avc: denied { audit_read } for pid=11958 comm="syz.1.4062" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1962.745199][ T29] audit: type=1400 audit(1962.120:353): avc: denied { mount } for pid=12167 comm="syz.1.4164" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1962.993432][ T29] audit: type=1400 audit(1962.370:354): avc: denied { unmount } for pid=3280 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 2027.807387][ T29] audit: type=1400 audit(134219755.188:355): avc: denied { ioctl } for pid=12341 comm="syz.2.4244" path="socket:[33877]" dev="sockfs" ino=33877 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2049.993865][ T29] audit: type=1400 audit(134219777.358:356): avc: denied { getopt } for pid=12419 comm="syz.1.4283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 2051.502344][T12428] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12428 comm=syz.1.4287 [ 2054.993717][ T29] audit: type=1400 audit(134219782.378:357): avc: denied { bind } for pid=12441 comm="syz.2.4294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2060.447078][ T29] audit: type=1400 audit(134219787.828:358): avc: denied { accept } for pid=12459 comm="syz.1.4303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 2088.065125][T12542] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12542 comm=syz.2.4342 [ 2125.423572][T12587] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12587 comm=syz.2.4362 [ 2185.045295][T12783] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12783 comm=syz.1.4455 [ 2185.919809][ T29] audit: type=1400 audit(134219913.298:359): avc: denied { name_bind } for pid=12785 comm="syz.1.4458" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2224.995557][T12895] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2225.068275][T12895] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2266.716770][T12995] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12995 comm=syz.1.4561 [ 2350.663681][ T29] audit: type=1400 audit(134220078.038:360): avc: denied { bind } for pid=13319 comm="syz.2.4717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2350.664831][ T29] audit: type=1400 audit(134220078.038:361): avc: denied { name_bind } for pid=13319 comm="syz.2.4717" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 2350.665704][ T29] audit: type=1400 audit(134220078.038:362): avc: denied { node_bind } for pid=13319 comm="syz.2.4717" saddr=0:0:300:: src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 2351.327557][T13324] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13324 comm=syz.2.4719 [ 2406.170498][T13523] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13523 comm=syz.1.4812 [ 2420.209476][T13584] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5124 sclass=netlink_audit_socket pid=13584 comm=syz.1.4843 [ 2423.849237][T13592] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=13592 comm=syz.1.4847 [ 2426.107558][T13600] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=13600 comm=syz.2.4850 [ 2426.797943][T13604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2581 sclass=netlink_route_socket pid=13604 comm=syz.2.4853 [ 2463.173713][ T29] audit: type=1400 audit(134220190.558:363): avc: denied { connect } for pid=13663 comm="syz.2.4881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2465.937967][ T29] audit: type=1400 audit(134220193.318:364): avc: denied { execute } for pid=13671 comm="syz.2.4886" path="/dev/audio1" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 2489.358416][ T29] audit: type=1400 audit(134220216.738:365): avc: denied { setattr } for pid=13756 comm="syz.1.4927" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 2510.975741][T13829] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13829 comm=syz.1.4960 [ 2547.845319][T13976] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13976 comm=syz.1.5032 [ 2553.985892][T13995] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13995 comm=syz.2.5040 [ 2560.785800][T14025] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14025 comm=syz.1.5056 [ 2588.382335][ T29] audit: type=1400 audit(134220315.748:366): avc: denied { watch } for pid=14118 comm="syz.2.5101" path="pipe:[11277]" dev="pipefs" ino=11277 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 2592.756801][T14138] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=527 sclass=netlink_route_socket pid=14138 comm=syz.1.5110 [ 2594.755538][T14150] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14150 comm=syz.2.5116 [ 2605.046861][T14194] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=14194 comm=syz.2.5138 [ 2622.862842][ T29] audit: type=1400 audit(134220350.238:367): avc: denied { remount } for pid=14293 comm="syz.2.5187" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2641.218282][T14335] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14335 comm=syz.2.5205 [ 2682.457964][T14481] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14481 comm=syz.2.5278 [ 2696.779881][T14543] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14543 comm=syz.1.5309 [ 2774.453641][T14878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=537 sclass=netlink_route_socket pid=14878 comm=syz.2.5471 [ 2798.748641][T14984] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14984 comm=syz.2.5522 [ 2801.147211][T14996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14996 comm=syz.2.5528 [ 2827.582462][T15057] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5126 sclass=netlink_audit_socket pid=15057 comm=syz.2.5557 [ 2836.034141][ T29] audit: type=1400 audit(268438291.398:368): avc: denied { setattr } for pid=15084 comm="syz.2.5572" name="zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 2896.925883][T15305] ptrace attach of "/syz-executor exec"[5645] was attempted by "/syz-executor exec"[15305] [ 2916.691980][ T29] audit: type=1400 audit(268438372.068:369): avc: denied { accept } for pid=15377 comm="syz.1.5715" lport=57796 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2941.323311][T15449] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=15449 comm=syz.1.5749 [ 2978.428182][ T29] audit: type=1400 audit(268438433.808:370): avc: denied { ioctl } for pid=15589 comm="syz.2.5817" path="socket:[45124]" dev="sockfs" ino=45124 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2985.905551][T15630] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15630 comm=syz.1.5836 [ 2988.958235][T15645] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2579 sclass=netlink_route_socket pid=15645 comm=syz.1.5845 [ 2995.198718][T15678] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15678 comm=syz.1.5860 [ 2997.518276][T15688] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15688 comm=syz.1.5864 [ 3028.642924][ T29] audit: type=1400 audit(268438484.028:371): avc: denied { connect } for pid=15816 comm="syz.1.5927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3038.474303][T15844] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15844 comm=syz.2.5940 [ 3058.346346][T15931] input: syz0 as /devices/virtual/input/input9 [ 3059.193748][T15934] misc userio: Can't change port type on an already running userio instance [ 3062.602756][ T29] audit: type=1400 audit(268438517.978:372): avc: denied { map } for pid=15946 comm="syz.2.5990" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3065.867034][T15957] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=15957 comm=syz.2.5995 [ 3092.697668][T16086] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16086 comm=syz.2.6058 [ 3156.729405][ T29] audit: type=1400 audit(268438612.108:373): avc: denied { unmount } for pid=5645 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 3174.776460][T16408] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16408 comm=syz.2.6212 [ 3228.662525][ T29] audit: type=1400 audit(268438684.028:374): avc: denied { name_bind } for pid=16515 comm="syz.2.6260" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 3237.334234][T16000] atkbd serio1: keyboard reset failed on [ 3238.852726][T16000] atkbd serio1: keyboard reset failed on [ 3250.254783][T16599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16599 comm=syz.1.6300 [ 3260.966460][ T29] audit: type=1400 audit(268438716.348:375): avc: denied { read } for pid=16625 comm="syz.1.6313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3280.122898][ T29] audit: type=1400 audit(268438735.438:376): avc: denied { mount } for pid=16699 comm="syz.2.6348" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 3296.094015][T16756] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=16756 comm=syz.2.6375 [ 3308.394272][ T29] audit: type=1400 audit(268438757.858:377): avc: denied { connect } for pid=16786 comm="syz.2.6391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3370.052612][ C0] BUG: workqueue lockup - pool cpus=0-1 flags=0x4 nice=0 stuck for 32s! [ 3370.055352][ C0] Showing busy workqueues and worker pools: [ 3370.056242][ C0] workqueue events: flags=0x0 [ 3370.056820][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=5 refcnt=6 [ 3370.057382][ C0] pending: 3*nsim_dev_hwstats_traffic_work, psi_avgs_work, vmstat_shepherd [ 3370.058516][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 3370.058606][ C0] pending: psi_avgs_work [ 3370.059013][ C0] workqueue events_unbound: flags=0x2 [ 3370.060414][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=4 refcnt=5 [ 3370.060532][ C0] pending: 3*nsim_dev_trap_report_work, kfree_rcu_monitor [ 3370.062189][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=1 refcnt=2 [ 3370.062308][ C0] pending: flush_memcg_stats_dwork [ 3370.062441][ C0] workqueue events_power_efficient: flags=0x82 [ 3370.063384][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=3 refcnt=4 [ 3370.063465][ C0] pending: wg_ratelimiter_gc_entries, 2*neigh_periodic_work [ 3370.063622][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=4 refcnt=5 [ 3370.063693][ C0] pending: fb_flashcursor, 2*neigh_managed_work, check_lifetime [ 3370.063852][ C0] workqueue writeback: flags=0x4a [ 3370.065217][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=1 refcnt=2 [ 3370.065298][ C0] pending: wb_workfn [ 3370.065568][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 3370.066336][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 3370.066432][ C0] pending: wg_packet_tx_worker, wg_packet_encrypt_worker [ 3370.066558][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 3370.067448][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 3370.067540][ C0] pending: wg_packet_encrypt_worker [ 3370.067623][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 3370.068401][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 3370.068490][ C0] pending: wg_packet_tx_worker, wg_packet_encrypt_worker [ 3370.068607][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 3370.069458][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 3370.069546][ C0] pending: wg_packet_encrypt_worker VM DIAGNOSIS: 10:10:01 Registers: info registers vcpu 0 CPU#0 PC=ffff8000852f90ec X00=ffff8000852f90e8 X01=0000000000000000 X02=0000000000000000 X03=1fffe00001ed0001 X04=ffff8000800075a0 X05=ffff700010000e80 X06=ffff00000f680000 X07=00000000f2f2f2f2 X08=00000000f3f3f300 X09=00000000f2000000 X10=00000000f204f204 X11=1ffff00010dc5a88 X12=ffff700010dc5a89 X13=6b726f775f636966 X14=0000000000000000 X15=fffffffffffe4448 X16=0000000000000000 X17=0000000000000000 X18=00000000ab83a211 X19=ffff800086fccab0 X20=ffff00000f680000 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff800086fcca80 X25=0000000000000000 X26=0000000000000004 X27=ffff800086fccab0 X28=0000000000000080 X29=ffff8000800072e0 X30=ffff8000804234ec SP=ffff8000800072e0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=00000000 R06=00000000 R07=00000000 R08=00000000 R09=00006364 R10=003d0f00 R11=f74ca0bc R12=20000350 R13=20000350 R14=0001947c R15=0001947c PSR=20000010 --C- A usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000