last executing test programs: 1h35m30.998556103s ago: executing program 1 (id=12136): r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="180000000114fb"], 0x18}, 0x1, 0x0, 0x0, 0x20000000}, 0x40014) recvfrom(r0, 0x0, 0x0, 0x10140, 0x0, 0x0) 1h35m30.524088973s ago: executing program 1 (id=12138): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, 0x0) 1h35m30.276031683s ago: executing program 1 (id=12140): r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCSABS2F(r1, 0x401845ef, 0x0) 1h35m29.978096295s ago: executing program 1 (id=12141): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x2903097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) 1h35m29.637161609s ago: executing program 1 (id=12142): r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000003c0)={@empty, 0x0, r1}) 1h35m28.556123074s ago: executing program 1 (id=12143): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100), 0x28381, 0x0) r1 = dup(r0) ioctl$EVIOCGPHYS(r1, 0x80404507, 0x0) 1h35m28.487638207s ago: executing program 32 (id=12143): r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100), 0x28381, 0x0) r1 = dup(r0) ioctl$EVIOCGPHYS(r1, 0x80404507, 0x0) 1h29m0.923362083s ago: executing program 2 (id=13031): r0 = openat$null(0xffffffffffffff9c, &(0x7f00000017c0), 0x200000, 0x0) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000001f40)) 1h28m59.78872118s ago: executing program 2 (id=13033): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range(r0, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_aout(r0, 0x0, 0x0) 1h28m58.619989549s ago: executing program 2 (id=13035): r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_TDLS_MGMT(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x0) 1h28m57.500663445s ago: executing program 2 (id=13036): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) 1h28m56.674067878s ago: executing program 2 (id=13038): r0 = syz_open_dev$audion(&(0x7f0000004a80), 0xe7d, 0x11e643ae52109c68) close(r0) socket$nl_route(0x10, 0x3, 0x0) getpeername$llc(r0, 0x0, &(0x7f0000000040)) 1h28m55.18894149s ago: executing program 2 (id=13040): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = memfd_create(&(0x7f0000000040)='*}*/+\x00', 0x0) dup3(r0, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000001080)) 1h28m54.836703874s ago: executing program 33 (id=13040): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = memfd_create(&(0x7f0000000040)='*}*/+\x00', 0x0) dup3(r0, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000001080)) 48m39.719172003s ago: executing program 3 (id=19342): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_SET_BSS(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={0x0, 0xffffff69}}, 0x14) 48m39.377635707s ago: executing program 3 (id=19345): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000900), 0x42800, 0x0) ioctl$IOMMU_VFIO_IOAS$SET(r0, 0x3b88, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) syz_kvm_setup_cpu$arm64(r0, 0xffffffffffffffff, &(0x7f0000bff000/0x400000)=nil, &(0x7f0000000d00)=[{0x0, 0x0}], 0x1, 0x0, 0x0, 0x0) 48m39.041971291s ago: executing program 3 (id=19346): r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) getsockname$netlink(r0, 0x0, &(0x7f00000000c0)) 48m38.459361425s ago: executing program 3 (id=19349): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000580)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x1b5008, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) 48m37.895612448s ago: executing program 3 (id=19351): r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) dup3(r0, r1, 0x0) getsockname$netlink(r1, 0x0, &(0x7f0000000040)) 48m37.159231599s ago: executing program 3 (id=19354): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) dup3(r0, r1, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='FREEZING\x00', 0x9) 48m37.067593512s ago: executing program 34 (id=19354): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) dup3(r0, r1, 0x0) write$cgroup_freezer_state(r1, &(0x7f0000000000)='FREEZING\x00', 0x9) 9m39.224425238s ago: executing program 0 (id=25287): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x2, {0x3}}, 0x18) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x40) sendto$unix(r0, &(0x7f0000000140)="10025dcdd4", 0x5, 0x40000, 0x0, 0x0) 9m37.587982876s ago: executing program 0 (id=25288): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$nl_xfrm(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$NL80211_CMD_GET_REG(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x30}}, 0x40408c4) 9m37.140915904s ago: executing program 0 (id=25289): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="2c385aa3d49100dc6626c892b6bc436a", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x60, 0x0) 9m36.719835112s ago: executing program 0 (id=25291): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) move_mount(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0x204) 9m35.860809878s ago: executing program 0 (id=25293): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$RDMA_USER_CM_CMD_BIND_IP(r0, 0x0, 0x0) 9m34.779098993s ago: executing program 0 (id=25295): mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x0, &(0x7f0000ffd000/0x1000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x80) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCMBIC(r1, 0x5450, 0x0) 9m34.630749899s ago: executing program 35 (id=25295): mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x0, &(0x7f0000ffd000/0x1000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000000)=0x80) socket$inet(0x2, 0x0, 0x0) ioctl$TIOCMBIC(r1, 0x5450, 0x0) 2m23.555370361s ago: executing program 5 (id=25891): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = dup3(r0, r2, 0x0) sendmsg$SMC_PNETID_DEL(r3, &(0x7f0000002800)={0x0, 0x0, &(0x7f00000027c0)={0x0}, 0x1, 0x0, 0x0, 0x4000000}, 0x24048000) 2m22.317034242s ago: executing program 5 (id=25893): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r1, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x4886}, 0x4000000) 2m21.180371739s ago: executing program 5 (id=25895): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="02"], 0x10) socket$l2tp(0x2, 0x2, 0x73) 2m20.480226729s ago: executing program 5 (id=25896): socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180), r1) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x10) dup3(r1, r0, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x4044800) 2m19.980237559s ago: executing program 5 (id=25897): r0 = socket(0x1d, 0x2, 0x6) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r2, 0x3}, 0x18) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) 37.80946394s ago: executing program 5 (id=25897): r0 = socket(0x1d, 0x2, 0x6) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r2, 0x3}, 0x18) syz_genetlink_get_family_id$devlink(&(0x7f0000000080), r0) 8.061307835s ago: executing program 4 (id=25972): r0 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000340), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000080}, 0x0) 6.830300686s ago: executing program 4 (id=25973): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) write$FUSE_WRITE(r2, &(0x7f0000000100)={0xfffffeec}, 0xffffffd1) write$FUSE_ENTRY(r2, &(0x7f00000022c0)={0x90}, 0x90) close(r1) 4.781033911s ago: executing program 4 (id=25974): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) sendmsg$nl_xfrm(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[], 0x33fe0}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 1.497370728s ago: executing program 4 (id=25975): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0xd6c44b75283f1423}, 0x4008010) 750.295918ms ago: executing program 4 (id=25976): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) setns(r1, 0x8020000) mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x8000, &(0x7f0000001dc0)={0xf, 0x89, 0x40000, {r1}}, 0x20) mknodat$null(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x103) 0s ago: executing program 4 (id=25977): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000100)={0x80000001, 0xfffffffffffffff8}, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='gid_map\x00') fcntl$lock(r1, 0x0, &(0x7f00000004c0)) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x5451, 0x0) kernel console output (not intermixed with test programs): syz.0.6370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2240.063139][ T30] audit: type=1400 audit(2239.570:492): avc: denied { getopt } for pid=16558 comm="syz.0.6370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2250.995109][ T30] audit: type=1400 audit(2250.500:493): avc: denied { read write } for pid=16688 comm="syz.0.6433" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2250.997791][ T30] audit: type=1400 audit(2250.500:494): avc: denied { open } for pid=16688 comm="syz.0.6433" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2258.971639][ T30] audit: type=1400 audit(2258.470:495): avc: denied { connect } for pid=16758 comm="syz.0.6465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2270.147246][T16875] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=16875 comm=syz.0.6521 [ 2275.091535][T16927] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16927 comm=syz.0.6548 [ 2280.143990][ T30] audit: type=1400 audit(2279.630:496): avc: denied { compute_member } for pid=16972 comm="syz.1.6570" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 2281.597562][ T30] audit: type=1400 audit(2281.100:497): avc: denied { create } for pid=16991 comm="syz.0.6579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2281.672905][ T30] audit: type=1400 audit(2281.180:498): avc: denied { read write } for pid=16991 comm="syz.0.6579" path="socket:[48945]" dev="sockfs" ino=48945 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2284.882529][ T30] audit: type=1400 audit(2284.370:499): avc: denied { ioctl } for pid=17023 comm="syz.1.6594" path="socket:[49783]" dev="sockfs" ino=49783 ioctlcmd=0x6414 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2285.272774][ T30] audit: type=1400 audit(2284.780:500): avc: denied { write } for pid=17027 comm="syz.1.6596" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 2285.757751][ T30] audit: type=1400 audit(2285.260:501): avc: denied { create } for pid=17031 comm="syz.1.6598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2285.799612][ T30] audit: type=1400 audit(2285.300:502): avc: denied { write } for pid=17031 comm="syz.1.6598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2285.836129][T17033] lo speed is unknown, defaulting to 1000 [ 2285.852580][T17033] lo speed is unknown, defaulting to 1000 [ 2285.926489][T17033] lo speed is unknown, defaulting to 1000 [ 2286.076952][T17033] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 2286.156128][T17033] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 2286.699804][T17033] lo speed is unknown, defaulting to 1000 [ 2286.776296][T17033] lo speed is unknown, defaulting to 1000 [ 2291.900947][T17078] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17078 comm=syz.0.6619 [ 2297.015036][T17134] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17134 comm=syz.1.6647 [ 2299.191487][ T30] audit: type=1400 audit(2298.700:503): avc: denied { write } for pid=17170 comm="syz.0.6666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2299.377609][ T30] audit: type=1400 audit(2298.880:504): avc: denied { write } for pid=17173 comm="syz.1.6667" path="socket:[50332]" dev="sockfs" ino=50332 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2299.802131][ T30] audit: type=1400 audit(2299.310:505): avc: denied { checkpoint_restore } for pid=17177 comm="syz.1.6669" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2303.934893][ T30] audit: type=1400 audit(2303.440:506): avc: denied { allowed } for pid=17218 comm="syz.1.6689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2303.952288][ T30] audit: type=1400 audit(2303.450:507): avc: denied { sqpoll } for pid=17218 comm="syz.1.6689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2303.984169][ T30] audit: type=1400 audit(2303.490:508): avc: denied { map } for pid=17218 comm="syz.1.6689" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=50399 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2303.993080][ T30] audit: type=1400 audit(2303.490:509): avc: denied { read write } for pid=17218 comm="syz.1.6689" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=50399 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2305.056761][T17232] SELinux: Context system_u:object_r:klogd_exec_t:s0 is not valid (left unmapped). [ 2305.103713][ T30] audit: type=1400 audit(2304.570:510): avc: denied { relabelto } for pid=17229 comm="syz.1.6694" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 2305.104816][ T30] audit: type=1400 audit(2304.600:511): avc: denied { associate } for pid=17229 comm="syz.1.6694" name="kvm" dev="devtmpfs" ino=84 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:klogd_exec_t:s0" [ 2305.293519][T17234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17234 comm=syz.0.6696 [ 2306.093280][ T30] audit: type=1400 audit(2305.600:512): avc: denied { ioctl } for pid=17239 comm="syz.0.6700" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 2309.009936][ T30] audit: type=1400 audit(2308.510:513): avc: denied { read } for pid=17274 comm="syz.1.6716" path="socket:[50482]" dev="sockfs" ino=50482 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2317.924153][ T30] audit: type=1400 audit(2317.430:514): avc: denied { read } for pid=17344 comm="syz.1.6749" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 2317.933143][ T30] audit: type=1400 audit(2317.430:515): avc: denied { open } for pid=17344 comm="syz.1.6749" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 2317.952930][ T30] audit: type=1400 audit(2317.450:516): avc: denied { ioctl } for pid=17344 comm="syz.1.6749" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 2326.253275][ T30] audit: type=1400 audit(2325.760:517): avc: denied { write } for pid=17408 comm="syz.0.6779" path="socket:[51381]" dev="sockfs" ino=51381 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2326.849729][ T30] audit: type=1400 audit(2326.350:518): avc: denied { audit_write } for pid=17413 comm="syz.1.6781" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2339.617596][ T30] audit: type=1400 audit(2339.120:519): avc: denied { read } for pid=17497 comm="syz.0.6821" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2339.626242][ T30] audit: type=1400 audit(2339.130:520): avc: denied { open } for pid=17497 comm="syz.0.6821" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2339.647951][ T30] audit: type=1400 audit(2339.150:521): avc: denied { ioctl } for pid=17497 comm="syz.0.6821" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4606 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2344.150481][ T30] audit: type=1400 audit(2343.650:522): avc: denied { create } for pid=17543 comm="syz.0.6843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2344.154656][ T30] audit: type=1400 audit(2343.660:523): avc: denied { ioctl } for pid=17543 comm="syz.0.6843" path="socket:[50996]" dev="sockfs" ino=50996 ioctlcmd=0xf505 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2351.770756][T17621] Driver unsupported XDP return value 0 on prog (id 16) dev N/A, expect packet loss! [ 2352.689646][ T30] audit: type=1400 audit(2352.190:524): avc: denied { setopt } for pid=17628 comm="syz.0.6885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2353.792998][ T30] audit: type=1400 audit(2353.300:525): avc: denied { execute } for pid=17643 comm="syz.1.6892" name="file0" dev="tmpfs" ino=17460 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2358.299750][ T30] audit: type=1400 audit(2357.800:526): avc: denied { connect } for pid=17686 comm="syz.1.6912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2359.970561][ T30] audit: type=1400 audit(2359.480:527): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 2362.384308][ T30] audit: type=1400 audit(2361.890:528): avc: denied { ioctl } for pid=17749 comm="syz.0.6942" path="socket:[52348]" dev="sockfs" ino=52348 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2362.394571][T17750] veth1_to_bond: entered allmulticast mode [ 2362.405426][T17749] veth1_to_bond: left allmulticast mode [ 2371.783844][ T30] audit: type=1400 audit(2371.290:529): avc: denied { audit_read } for pid=17846 comm="syz.0.6989" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2373.885360][ T30] audit: type=1400 audit(2373.390:530): avc: denied { read } for pid=17868 comm="syz.1.7000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2374.440865][ T30] audit: type=1400 audit(2373.940:531): avc: denied { write } for pid=17868 comm="syz.1.7000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2384.100856][ T30] audit: type=1400 audit(2383.600:532): avc: denied { append } for pid=17965 comm="syz.0.7046" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 2392.374560][ T30] audit: type=1400 audit(2391.880:533): avc: denied { ioctl } for pid=18045 comm="syz.0.7086" path="socket:[53433]" dev="sockfs" ino=53433 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 2410.820022][ T30] audit: type=1400 audit(2410.290:534): avc: denied { mount } for pid=18224 comm="syz.1.7172" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2410.874708][ T30] audit: type=1400 audit(2410.380:535): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2411.427528][T18238] SELinux: syz.1.7179 (18238) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 2426.493902][ T30] audit: type=1400 audit(2426.000:536): avc: denied { setattr } for pid=18377 comm="syz.0.7247" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2432.502465][ T30] audit: type=1400 audit(2432.010:537): avc: denied { getopt } for pid=18428 comm="syz.0.7272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2439.892457][ T30] audit: type=1400 audit(2439.390:538): avc: denied { write } for pid=18481 comm="syz.0.7299" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 2445.110957][ T30] audit: type=1400 audit(2444.610:539): avc: denied { append } for pid=18528 comm="syz.1.7320" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2450.556738][ T30] audit: type=1400 audit(2450.060:540): avc: denied { read } for pid=18561 comm="syz.1.7336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2455.077551][ T30] audit: type=1400 audit(2454.580:541): avc: denied { open } for pid=18612 comm="syz.1.7360" path="/dev/ptyq6" dev="devtmpfs" ino=117 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 2455.115756][ T30] audit: type=1400 audit(2454.620:542): avc: denied { ioctl } for pid=18612 comm="syz.1.7360" path="/dev/ttyq6" dev="devtmpfs" ino=373 ioctlcmd=0x5404 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 2472.155752][ T30] audit: type=1400 audit(2471.660:543): avc: denied { write } for pid=18763 comm="syz.1.7434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2472.172524][ T30] audit: type=1400 audit(2471.670:544): avc: denied { read } for pid=18763 comm="syz.1.7434" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2480.169234][ T30] audit: type=1400 audit(2479.670:545): avc: denied { append } for pid=18847 comm="syz.0.7475" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 2491.287412][ T30] audit: type=1400 audit(2490.790:546): avc: denied { setopt } for pid=18953 comm="syz.1.7525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2492.000346][T18962] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18962 comm=syz.0.7529 [ 2493.315295][ T30] audit: type=1400 audit(2492.820:547): avc: denied { lock } for pid=18972 comm="syz.0.7534" path="/dev/vhost-net" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2494.261700][ T30] audit: type=1400 audit(2493.770:548): avc: denied { create } for pid=18980 comm="syz.0.7538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2494.270751][ T30] audit: type=1400 audit(2493.780:549): avc: denied { block_suspend } for pid=18980 comm="syz.0.7538" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2512.956786][T19155] block nbd1: shutting down sockets [ 2515.551771][T19186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1014 sclass=netlink_route_socket pid=19186 comm=syz.0.7638 [ 2519.429033][ T30] audit: type=1400 audit(2518.930:550): avc: denied { read } for pid=19206 comm="syz.1.7647" path="socket:[56950]" dev="sockfs" ino=56950 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2524.072891][ T30] audit: type=1400 audit(2523.570:551): avc: denied { ioctl } for pid=19258 comm="syz.1.7674" path="socket:[57397]" dev="sockfs" ino=57397 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2528.729281][ T30] audit: type=1400 audit(2528.230:552): avc: denied { lock } for pid=19312 comm="syz.1.7700" path="socket:[57488]" dev="sockfs" ino=57488 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2529.206973][T19317] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7702'. [ 2529.931331][ T30] audit: type=1400 audit(2529.430:553): avc: denied { ioctl } for pid=19324 comm="syz.1.7707" path="socket:[57509]" dev="sockfs" ino=57509 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2533.554774][T19378] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19378 comm=syz.0.7732 [ 2540.376155][ T30] audit: type=1400 audit(2539.880:554): avc: denied { write } for pid=19417 comm="syz.1.7746" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2540.602697][ T30] audit: type=1400 audit(2540.110:555): avc: denied { append } for pid=19419 comm="syz.0.7749" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 2542.597812][ T30] audit: type=1400 audit(2542.100:556): avc: denied { bind } for pid=19444 comm="syz.0.7761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2543.350722][ T30] audit: type=1400 audit(2542.850:557): avc: denied { mount } for pid=19453 comm="syz.0.7766" name="/" dev="pstore" ino=2194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 2543.362048][ T30] audit: type=1400 audit(2542.860:558): avc: denied { remount } for pid=19453 comm="syz.0.7766" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 2543.483407][ T30] audit: type=1400 audit(2542.990:559): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 2545.191675][ T30] audit: type=1400 audit(2544.700:560): avc: denied { setopt } for pid=19468 comm="syz.1.7773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2545.505232][ T30] audit: type=1400 audit(2545.010:561): avc: denied { ioctl } for pid=19470 comm="syz.1.7774" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x125f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2546.863698][ T30] audit: type=1400 audit(2546.370:562): avc: denied { listen } for pid=19482 comm="syz.0.7778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2546.867532][ T30] audit: type=1400 audit(2546.370:563): avc: denied { accept } for pid=19482 comm="syz.0.7778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2547.164774][ T30] audit: type=1400 audit(2546.670:564): avc: denied { unlink } for pid=3320 comm="syz-executor" name="file0" dev="tmpfs" ino=19465 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2553.905964][ T30] audit: type=1400 audit(2553.410:565): avc: denied { create } for pid=19535 comm="syz.0.7806" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 2569.261993][ T30] audit: type=1400 audit(2568.770:566): avc: denied { getopt } for pid=19668 comm="syz.1.7866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2574.195057][ T30] audit: type=1400 audit(2573.700:567): avc: denied { mount } for pid=19720 comm="syz.1.7892" name="/" dev="ramfs" ino=58194 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2574.242418][ T30] audit: type=1400 audit(2573.740:568): avc: denied { remount } for pid=19720 comm="syz.1.7892" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2574.361912][ T30] audit: type=1400 audit(2573.870:569): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2577.616247][ T30] audit: type=1400 audit(2577.110:570): avc: denied { getattr } for pid=19753 comm="syz.0.7908" name="/" dev="pidfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 2578.363695][ T30] audit: type=1400 audit(2577.870:571): avc: denied { setattr } for pid=19763 comm="syz.0.7913" name="vcsa" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 2586.147217][ T30] audit: type=1400 audit(2585.650:572): avc: denied { mount } for pid=19848 comm="syz.0.7955" name="/" dev="configfs" ino=1103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 2603.494998][ T30] audit: type=1400 audit(2603.000:573): avc: denied { node_bind } for pid=20022 comm="syz.0.8040" saddr=172.30.255.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2634.275268][T20214] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20214 comm=syz.1.8130 [ 2638.205150][ T30] audit: type=1400 audit(2637.710:574): avc: denied { lock } for pid=20230 comm="syz.0.8138" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 2645.563474][T20279] binfmt_misc: register: failed to install interpreter file ./file2 [ 2654.426469][T20368] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20368 comm=syz.0.8205 [ 2670.139657][ T30] audit: type=1400 audit(2669.640:575): avc: denied { setopt } for pid=20506 comm="syz.1.8272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2685.474083][ T30] audit: type=1400 audit(2684.980:576): avc: denied { watch } for pid=20634 comm="syz.0.8333" path="/proc/8632" dev="proc" ino=62472 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 2691.871829][ T30] audit: type=1400 audit(2691.370:577): avc: denied { map } for pid=20685 comm="syz.0.8359" path="socket:[61795]" dev="sockfs" ino=61795 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2718.865256][ T30] audit: type=1400 audit(2718.370:578): avc: denied { append } for pid=20937 comm="syz.1.8481" name="pfkey" dev="proc" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2720.183147][ T30] audit: type=1400 audit(2719.690:579): avc: denied { create } for pid=20953 comm="syz.0.8489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2725.363575][ T30] audit: type=1400 audit(2724.870:580): avc: denied { nlmsg_read } for pid=21004 comm="syz.0.8513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2731.774383][T21068] mmap: syz.1.8544 (21068) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 2739.452730][ T30] audit: type=1400 audit(2738.960:581): avc: denied { watch } for pid=21121 comm="syz.1.8570" path="/4213/file0" dev="tmpfs" ino=21452 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2766.146254][ T30] audit: type=1400 audit(2765.650:582): avc: denied { getopt } for pid=21324 comm="syz.0.8669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2767.245425][ T30] audit: type=1400 audit(2766.750:583): avc: denied { append } for pid=21334 comm="syz.1.8675" name="loop6" dev="devtmpfs" ino=643 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 2774.226486][T21395] netlink: 16 bytes leftover after parsing attributes in process `syz.1.8703'. [ 2783.839518][T18917] hid_parser_main: 33 callbacks suppressed [ 2783.840745][T18917] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2783.841018][T18917] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2783.841364][T18917] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2783.841748][T18917] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2783.842160][T18917] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2783.842554][T18917] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2783.842941][T18917] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2783.843367][T18917] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2783.843752][T18917] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2783.844026][T18917] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 2783.971738][T18917] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [sy] on syz0 [ 2786.892986][T21492] fido_id[21492]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2802.061779][T21653] input: syz1 as /devices/virtual/input/input8 [ 2812.284906][ T30] audit: type=1400 audit(2811.790:584): avc: denied { nlmsg_write } for pid=21749 comm="syz.0.8874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 2816.119950][T18917] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 2816.319636][T18917] usb 1-1: config 1 has an invalid interface number: 7 but max is 0 [ 2816.322139][T18917] usb 1-1: config 1 has no interface number 0 [ 2816.330886][T18917] usb 1-1: config 1 interface 7 altsetting 0 has an endpoint descriptor with address 0xDB, changing to 0x8B [ 2816.335196][T18917] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 64 [ 2816.337716][T18917] usb 1-1: config 1 interface 7 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2816.411530][T18917] usb 1-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 2816.412104][T18917] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2816.416738][T18917] usb 1-1: Product: syz [ 2816.421799][T18917] usb 1-1: Manufacturer: syz [ 2816.422278][T18917] usb 1-1: SerialNumber: syz [ 2816.683253][T21781] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2816.993254][T21781] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2817.317527][T18917] sierra_net 1-1:1.7 wwan0: register 'sierra_net' at usb-dummy_hcd.0-1, Sierra Wireless USB-to-WWAN Modem, 00:00:00:00:01:07 [ 2817.429693][T18917] sierra_net 1-1:1.7 wwan0: Submit SYNC failed -71 [ 2817.434147][T18917] sierra_net 1-1:1.7 wwan0: Send SYNC failed, status -71 [ 2817.470806][T18917] sierra_net 1-1:1.7 wwan0: Submit SYNC failed -71 [ 2817.494268][T18917] sierra_net 1-1:1.7 wwan0: Send SYNC failed, status -71 [ 2817.754661][T18917] usb 1-1: USB disconnect, device number 6 [ 2817.804513][T18917] sierra_net 1-1:1.7 wwan0: unregister 'sierra_net' usb-dummy_hcd.0-1, Sierra Wireless USB-to-WWAN Modem [ 2818.084192][T18917] sierra_net 1-1:1.7 wwan0 (unregistered): usb_control_msg failed, status -19 [ 2818.565088][ T30] audit: type=1400 audit(2818.070:585): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 2820.646101][ T30] audit: type=1400 audit(2820.150:586): avc: denied { getopt } for pid=21811 comm="syz.1.8902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2823.207615][ T30] audit: type=1400 audit(2822.710:587): avc: denied { setattr } for pid=21836 comm="syz.0.8916" name="ptmx" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ptmx_t tclass=chr_file permissive=1 [ 2833.981522][ T30] audit: type=1400 audit(2833.490:588): avc: denied { name_bind } for pid=21936 comm="syz.1.8964" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2836.389458][ T30] audit: type=1400 audit(2835.890:589): avc: denied { write } for pid=21942 comm="syz.0.8967" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2836.411848][ T30] audit: type=1400 audit(2835.920:590): avc: denied { setattr } for pid=21942 comm="syz.0.8967" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 2841.464983][ T30] audit: type=1400 audit(2840.970:591): avc: denied { ioctl } for pid=22000 comm="syz.0.8995" path="socket:[65982]" dev="sockfs" ino=65982 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2851.696215][T22087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22087 comm=syz.1.9033 [ 2855.460579][T22119] netlink: 'syz.1.9047': attribute type 4 has an invalid length. [ 2855.470343][T22119] netlink: 3657 bytes leftover after parsing attributes in process `syz.1.9047'. [ 2857.440836][ T30] audit: type=1400 audit(2856.940:592): avc: denied { setattr } for pid=22131 comm="syz.1.9054" name="timer" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 2858.493952][ T30] audit: type=1400 audit(2858.000:593): avc: denied { remount } for pid=22137 comm="syz.1.9057" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2880.994575][ T30] audit: type=1400 audit(2880.500:594): avc: denied { read } for pid=22300 comm="syz.0.9136" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 2886.227236][ T30] audit: type=1400 audit(2885.730:595): avc: denied { setopt } for pid=22337 comm="syz.1.9154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2887.741018][ T30] audit: type=1400 audit(2887.240:596): avc: denied { append } for pid=22350 comm="syz.0.9160" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 2909.893925][T22540] netlink: 16 bytes leftover after parsing attributes in process `syz.1.9253'. [ 2920.593807][ T30] audit: type=1400 audit(2920.100:597): avc: denied { write } for pid=22642 comm="syz.1.9305" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 2928.941676][T22716] netlink: 64 bytes leftover after parsing attributes in process `syz.0.9340'. [ 2943.095102][ T30] audit: type=1400 audit(2942.580:598): avc: denied { create } for pid=22836 comm="syz.0.9397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 2943.140996][ T30] audit: type=1400 audit(2942.640:599): avc: denied { write } for pid=22836 comm="syz.0.9397" path="socket:[68341]" dev="sockfs" ino=68341 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 2943.673668][ T3465] hid_parser_main: 22 callbacks suppressed [ 2943.677612][ T3465] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 2943.705581][ T3465] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 2945.617706][T22848] fido_id[22848]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 2955.197280][ T30] audit: type=1400 audit(2954.690:600): avc: denied { getattr } for pid=22939 comm="syz.1.9447" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=69527 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2972.856237][ T30] audit: type=1400 audit(2972.360:601): avc: denied { watch watch_reads } for pid=23113 comm="syz.0.9534" path="/dev/ttyprintk" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 2993.029474][ T30] audit: type=1400 audit(2992.530:602): avc: denied { create } for pid=23269 comm="syz.1.9608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2994.059996][ T30] audit: type=1400 audit(2993.560:603): avc: denied { watch watch_reads } for pid=23279 comm="syz.0.9613" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=71121 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2995.755099][ T30] audit: type=1400 audit(2995.260:604): avc: denied { getopt } for pid=23297 comm="syz.1.9622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3003.433437][T23366] netlink: 8 bytes leftover after parsing attributes in process `syz.0.9656'. [ 3003.452802][T23366] netlink: 3 bytes leftover after parsing attributes in process `syz.0.9656'. [ 3004.427095][ T30] audit: type=1400 audit(3003.930:605): avc: denied { lock } for pid=23370 comm="syz.1.9658" path="socket:[70393]" dev="sockfs" ino=70393 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3013.001912][ T30] audit: type=1400 audit(3012.500:606): avc: denied { getopt } for pid=23420 comm="syz.1.9680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3014.396198][T23429] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23429 comm=syz.0.9684 [ 3040.340007][T23657] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9794'. [ 3043.447903][ T30] audit: type=1400 audit(3042.950:607): avc: denied { write } for pid=23682 comm="syz.0.9807" path="socket:[71934]" dev="sockfs" ino=71934 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3066.393597][ T30] audit: type=1400 audit(3065.900:608): avc: denied { ioctl } for pid=23855 comm="syz.0.9889" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x9207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 3074.881444][T23902] deleting an unspecified loop device is not supported. [ 3082.072811][T23969] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3082.076068][T23969] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3088.905589][T24017] netlink: 184 bytes leftover after parsing attributes in process `syz.0.9965'. [ 3109.497158][ T30] audit: type=1400 audit(3109.000:609): avc: denied { write } for pid=24165 comm="syz.1.10040" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3111.233069][ T30] audit: type=1400 audit(3110.740:610): avc: denied { setopt } for pid=24179 comm="syz.1.10047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3126.522540][ T30] audit: type=1400 audit(3126.020:611): avc: denied { write } for pid=24300 comm="syz.0.10105" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 3138.522406][ T30] audit: type=1400 audit(3138.030:612): avc: denied { ioctl } for pid=24415 comm="syz.1.10161" path="socket:[74258]" dev="sockfs" ino=74258 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3155.444591][ T30] audit: type=1400 audit(3154.950:613): avc: denied { mount } for pid=24580 comm="syz.0.10241" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3155.461881][ T30] audit: type=1400 audit(3154.970:614): avc: denied { remount } for pid=24580 comm="syz.0.10241" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3155.629609][ T30] audit: type=1400 audit(3155.130:615): avc: denied { unmount } for pid=3319 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3155.660964][ T30] audit: type=1400 audit(3155.160:616): avc: denied { ioctl } for pid=24582 comm="syz.1.10242" path="socket:[75360]" dev="sockfs" ino=75360 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3174.897413][ T30] audit: type=1400 audit(3174.400:617): avc: denied { map } for pid=24754 comm="syz.1.10326" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 3175.092764][T24755] lo speed is unknown, defaulting to 1000 [ 3184.581732][ T30] audit: type=1400 audit(3184.080:618): avc: denied { bind } for pid=24807 comm="syz.1.10351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3195.419574][ T30] audit: type=1400 audit(3194.920:619): avc: denied { read } for pid=24899 comm="syz.1.10396" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3198.031065][ T30] audit: type=1400 audit(3197.530:620): avc: denied { read } for pid=24918 comm="syz.0.10403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3198.566588][ T30] audit: type=1400 audit(3198.070:621): avc: denied { write } for pid=24918 comm="syz.0.10403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3198.576299][ T30] audit: type=1400 audit(3198.080:622): avc: denied { nlmsg_write } for pid=24918 comm="syz.0.10403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3204.426804][T24974] CUSE: info not properly terminated [ 3206.236128][T24992] tmpfs: Bad value for 'nr_blocks' [ 3206.865036][T13963] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 3206.943912][T13963] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz0] on syz0 [ 3209.051435][T25007] fido_id[25007]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 3221.804416][ T30] audit: type=1400 audit(3221.310:623): avc: denied { ioctl } for pid=25135 comm="syz.1.10508" path="socket:[76564]" dev="sockfs" ino=76564 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3232.170617][ T30] audit: type=1400 audit(3231.660:624): avc: denied { getopt } for pid=25190 comm="syz.0.10535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3239.034271][T25218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25218 comm=syz.0.10548 [ 3281.174681][ T30] audit: type=1400 audit(3280.680:625): avc: denied { write } for pid=25514 comm="syz.0.10692" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 3286.707805][ T30] audit: type=1400 audit(3286.210:626): avc: denied { bind } for pid=25565 comm="syz.1.10717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3286.734403][ T30] audit: type=1400 audit(3286.210:627): avc: denied { node_bind } for pid=25565 comm="syz.1.10717" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 3290.864961][ T30] audit: type=1400 audit(3290.370:628): avc: denied { execute } for pid=25593 comm="syz.1.10730" path="/dev/dsp" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 3315.324123][ T30] audit: type=1400 audit(3314.830:629): avc: denied { remount } for pid=25772 comm="syz.1.10818" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 3317.467601][ T30] audit: type=1400 audit(3316.970:630): avc: denied { nlmsg_read } for pid=25794 comm="syz.0.10829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3317.469383][T25796] netlink: 104 bytes leftover after parsing attributes in process `syz.0.10829'. [ 3329.037563][T25907] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25907 comm=syz.0.10884 [ 3331.833708][ T30] audit: type=1400 audit(3331.340:631): avc: denied { setopt } for pid=25929 comm="syz.1.10896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3341.323263][ T30] audit: type=1400 audit(3340.830:632): avc: denied { bind } for pid=26005 comm="syz.1.10931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3341.357245][ T30] audit: type=1400 audit(3340.860:633): avc: denied { listen } for pid=26005 comm="syz.1.10931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 3352.155257][ T30] audit: type=1400 audit(3351.660:634): avc: denied { getopt } for pid=26084 comm="syz.1.10968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3357.117984][ T30] audit: type=1400 audit(3356.620:635): avc: denied { shutdown } for pid=26126 comm="syz.0.10989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3366.263880][ T30] audit: type=1400 audit(3365.760:636): avc: denied { mount } for pid=26192 comm="syz.1.11021" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 3400.592027][T26475] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11158'. [ 3410.972430][T26557] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26557 comm=syz.1.11196 [ 3413.756240][ T30] audit: type=1400 audit(3413.260:637): avc: denied { write } for pid=26578 comm="syz.1.11209" name="renderD128" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 3414.285957][ T30] audit: type=1400 audit(3413.790:638): avc: denied { create } for pid=26582 comm="syz.0.11210" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3414.344201][ T30] audit: type=1400 audit(3413.850:639): avc: denied { read write } for pid=26582 comm="syz.0.11210" name="file0" dev="tmpfs" ino=29021 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3414.355848][ T30] audit: type=1400 audit(3413.860:640): avc: denied { open } for pid=26582 comm="syz.0.11210" path="/5705/file0" dev="tmpfs" ino=29021 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3414.385199][ T30] audit: type=1400 audit(3413.870:641): avc: denied { ioctl } for pid=26582 comm="syz.0.11210" path="/5705/file0" dev="tmpfs" ino=29021 ioctlcmd=0x1277 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3414.537355][ T30] audit: type=1400 audit(3414.040:642): avc: denied { unlink } for pid=3319 comm="syz-executor" name="file0" dev="tmpfs" ino=29021 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3420.179980][ T30] audit: type=1400 audit(3419.680:643): avc: denied { setattr } for pid=26638 comm="syz.0.11238" name="dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3427.197375][ T30] audit: type=1400 audit(3426.700:644): avc: denied { watch_reads } for pid=26681 comm="syz.1.11258" path=2F353532372F233238313138202864656C6574656429 dev="tmpfs" ino=28118 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3441.676456][ T30] audit: type=1400 audit(3441.180:645): avc: denied { create } for pid=26790 comm="syz.1.11311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3441.705110][ T30] audit: type=1400 audit(3441.210:646): avc: denied { ioctl } for pid=26790 comm="syz.1.11311" path="socket:[83150]" dev="sockfs" ino=83150 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3441.736188][ T30] audit: type=1400 audit(3441.240:647): avc: denied { bind } for pid=26790 comm="syz.1.11311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 3486.147794][ T30] audit: type=1400 audit(3485.650:648): avc: denied { write } for pid=27158 comm="syz.1.11487" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 3507.640413][ T30] audit: type=1400 audit(3507.140:649): avc: denied { connect } for pid=27350 comm="syz.0.11582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3528.212147][T27541] binfmt_misc: register: failed to install interpreter file ./file0/file0 [ 3533.825644][ T30] audit: type=1400 audit(3533.330:650): avc: denied { mounton } for pid=27594 comm="syz.1.11702" path="/5754/file0" dev="tmpfs" ino=29267 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3533.914414][ T30] audit: type=1400 audit(3533.420:651): avc: denied { mount } for pid=27594 comm="syz.1.11702" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3534.236156][ T30] audit: type=1400 audit(3533.740:652): avc: denied { unmount } for pid=3320 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3539.771652][T27650] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27650 comm=syz.0.11729 [ 3616.871219][ T30] audit: type=1400 audit(3616.380:653): avc: denied { ioctl } for pid=28278 comm="syz.0.12034" path="socket:[87683]" dev="sockfs" ino=87683 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3622.574579][ T30] audit: type=1400 audit(3622.070:654): avc: denied { ioctl } for pid=28327 comm="syz.1.12058" path="socket:[88139]" dev="sockfs" ino=88139 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3626.070133][T28364] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=28364 comm=syz.0.12076 [ 3630.934930][T28404] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=513 sclass=netlink_audit_socket pid=28404 comm=syz.1.12095 [ 3639.823822][ T30] audit: type=1400 audit(3639.330:655): avc: denied { read } for pid=28471 comm="syz.0.12127" path="socket:[88390]" dev="sockfs" ino=88390 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3641.752320][T28491] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12136'. [ 3641.764245][ T30] audit: type=1400 audit(3641.260:656): avc: denied { read } for pid=28489 comm="syz.1.12136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3643.165577][ T3320] syz_tun (unregistering): left allmulticast mode [ 3643.987288][ T30] audit: type=1400 audit(3643.490:657): avc: denied { execute } for pid=28501 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3644.030319][ T30] audit: type=1400 audit(3643.520:658): avc: denied { execute_no_trans } for pid=28501 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3644.582935][ T30] audit: type=1400 audit(3644.080:659): avc: denied { mounton } for pid=28502 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3649.202873][T17892] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3649.283073][T17892] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3649.344419][T17892] bond0 (unregistering): Released all slaves [ 3650.444654][T17892] hsr_slave_0: left promiscuous mode [ 3650.474554][T17892] hsr_slave_1: left promiscuous mode [ 3673.267918][T28502] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3673.317765][T28502] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3680.194833][T28502] hsr_slave_0: entered promiscuous mode [ 3680.216709][T28502] hsr_slave_1: entered promiscuous mode [ 3684.634068][T28502] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 3684.822268][T28502] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 3684.885433][T28502] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 3684.994375][T28502] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 3691.813343][T28502] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3715.537400][T28502] veth0_vlan: entered promiscuous mode [ 3715.794742][T28502] veth1_vlan: entered promiscuous mode [ 3716.411992][T28502] veth0_macvtap: entered promiscuous mode [ 3716.646349][T28502] veth1_macvtap: entered promiscuous mode [ 3717.263834][T17892] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3717.264469][T17892] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3717.264903][T17892] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3717.265196][T17892] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3718.004815][ T30] audit: type=1400 audit(3717.510:660): avc: denied { mounton } for pid=28502 comm="syz-executor" path="/syzkaller.JRYuHW/syz-tmp" dev="vda" ino=1878 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 3718.164940][ T30] audit: type=1400 audit(3717.670:661): avc: denied { mounton } for pid=28502 comm="syz-executor" path="/syzkaller.JRYuHW/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 3718.189455][ T30] audit: type=1400 audit(3717.690:662): avc: denied { mounton } for pid=28502 comm="syz-executor" path="/syzkaller.JRYuHW/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=89748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 3718.283115][ T30] audit: type=1400 audit(3717.790:663): avc: denied { unmount } for pid=28502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 3718.344407][ T30] audit: type=1400 audit(3717.850:664): avc: denied { mounton } for pid=28502 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 3718.347892][ T30] audit: type=1400 audit(3717.850:665): avc: denied { mount } for pid=28502 comm="syz-executor" name="/" dev="gadgetfs" ino=4066 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 3718.502448][ T30] audit: type=1400 audit(3718.000:666): avc: denied { mount } for pid=28502 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 3718.514903][ T30] audit: type=1400 audit(3718.020:667): avc: denied { mounton } for pid=28502 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 3785.063969][T29232] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=29232 comm=syz.0.12431 [ 3838.560955][T28851] Process accounting resumed [ 3899.103276][ T30] audit: type=1400 audit(134221626.593:668): avc: denied { associate } for pid=29779 comm="syz.0.12694" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3982.882453][ T30] audit: type=1400 audit(134221710.383:669): avc: granted { setsecparam } for pid=30233 comm="syz.0.12918" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 4038.083613][T19576] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4039.111219][T19576] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4040.002993][T19576] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4040.576385][T19576] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4052.736429][T19576] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4053.013058][T19576] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4053.104918][T19576] bond0 (unregistering): Released all slaves [ 4054.401004][T19576] hsr_slave_0: left promiscuous mode [ 4054.471552][T19576] hsr_slave_1: left promiscuous mode [ 4054.882233][T19576] veth1_macvtap: left promiscuous mode [ 4054.885208][T19576] veth0_macvtap: left promiscuous mode [ 4054.912237][T19576] veth1_vlan: left promiscuous mode [ 4054.916313][T19576] veth0_vlan: left promiscuous mode [ 4081.082941][T30487] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 4081.174974][T30487] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 4089.889988][T30487] hsr_slave_0: entered promiscuous mode [ 4089.896977][T30487] hsr_slave_1: entered promiscuous mode [ 4095.691622][T30487] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 4095.860128][T30487] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 4095.932119][T30487] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 4096.044893][T30487] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 4104.666391][T30487] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4123.124582][ T30] audit: type=1400 audit(268439578.629:670): avc: denied { bind } for pid=30807 comm="syz.0.13146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4134.694160][T30487] veth0_vlan: entered promiscuous mode [ 4134.908921][T30487] veth1_vlan: entered promiscuous mode [ 4135.385111][T30487] veth0_macvtap: entered promiscuous mode [ 4135.436462][T30487] veth1_macvtap: entered promiscuous mode [ 4135.932389][T30494] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4135.933462][T30494] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4135.996869][T30494] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4136.007232][T30494] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4246.764421][T31374] input: syz0 as /devices/virtual/input/input13 [ 4286.910244][T31582] syz.3.13508(31582): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 4350.455215][T31898] wg2: entered promiscuous mode [ 4350.459712][T31898] wg2: entered allmulticast mode [ 4377.184032][T32035] I/O error, dev loop7, sector 2 op 0x0:(READ) flags 0x1000 phys_seg 1 prio class 2 [ 4377.192790][T32035] EXT4-fs (loop7): unable to read superblock [ 4401.181530][T32148] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32148 comm=syz.0.13786 [ 4419.594199][T32240] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 4475.441055][ T30] audit: type=1400 audit(268439930.929:671): avc: denied { connect } for pid=32524 comm="syz.3.13971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4550.527635][ T30] audit: type=1400 audit(268440006.029:672): avc: denied { getopt } for pid=469 comm="syz.0.14172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4576.637330][ T623] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 4631.795150][ T937] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 4662.787586][ T30] audit: type=1400 audit(268440118.289:673): avc: denied { bind } for pid=1106 comm="syz.3.14470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4689.100393][ T30] audit: type=1400 audit(268440144.599:674): avc: denied { ioctl } for pid=1253 comm="syz.0.14541" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 4743.002932][ T1565] input: syz1 as /devices/virtual/input/input14 [ 4743.797691][ T1569] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1569 comm=syz.0.14692 [ 4822.131482][ T30] audit: type=1400 audit(268440277.639:675): avc: denied { bind } for pid=1996 comm="syz.3.14898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5001.464702][T30494] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5002.087457][T30494] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5002.724830][T30494] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5003.390430][T30494] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5009.753890][T30494] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5009.842456][T30494] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5009.916614][T30494] bond0 (unregistering): Released all slaves [ 5010.963208][T30494] hsr_slave_0: left promiscuous mode [ 5010.987986][T30494] hsr_slave_1: left promiscuous mode [ 5011.162752][T30494] veth1_macvtap: left promiscuous mode [ 5011.166542][T30494] veth0_macvtap: left promiscuous mode [ 5011.172301][T30494] veth1_vlan: left promiscuous mode [ 5011.174905][T30494] veth0_vlan: left promiscuous mode [ 5029.656700][ T2974] can0: slcan on ttyS3. [ 5030.063852][ T2972] can0 (unregistered): slcan off ttyS3. [ 5040.236058][ T2922] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5040.375306][ T2922] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5052.377455][ T2922] hsr_slave_0: entered promiscuous mode [ 5052.494447][ T2922] hsr_slave_1: entered promiscuous mode [ 5052.506145][ T2922] debugfs: 'hsr0' already exists in 'hsr' [ 5052.531591][ T2922] Cannot create hsr debugfs directory [ 5063.432670][ T2922] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 5063.561580][ T2922] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 5063.715208][ T2922] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 5063.935907][ T2922] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 5072.046449][ T2922] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5079.840592][ T3131] input: syz1 as /devices/virtual/input/input15 [ 5104.574393][ T2922] veth0_vlan: entered promiscuous mode [ 5104.776279][ T2922] veth1_vlan: entered promiscuous mode [ 5105.563434][ T2922] veth0_macvtap: entered promiscuous mode [ 5105.720877][ T2922] veth1_macvtap: entered promiscuous mode [ 5107.022884][T19576] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 5107.025934][T19576] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 5107.037925][T19576] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 5107.055276][T19576] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 5152.104869][ T3479] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5152.113211][ T3479] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5200.647077][ T3758] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 5203.875769][ T3777] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1014 sclass=netlink_route_socket pid=3777 comm=syz.3.15678 [ 5235.642031][ T30] audit: type=1400 audit(268440691.139:676): avc: denied { read write } for pid=30487 comm="syz-executor" name="loop3" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5235.680414][ T30] audit: type=1400 audit(268440691.169:677): avc: denied { open } for pid=30487 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5235.690838][ T30] audit: type=1400 audit(268440691.189:678): avc: denied { ioctl } for pid=30487 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5236.593220][ T30] audit: type=1400 audit(268440692.089:679): avc: denied { create } for pid=3974 comm="syz.0.15776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5236.632379][ T30] audit: type=1400 audit(268440692.139:680): avc: denied { write } for pid=3974 comm="syz.0.15776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5248.843962][ T30] audit: type=1400 audit(268440704.349:681): avc: denied { prog_load } for pid=4047 comm="syz.0.15812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5248.861194][ T30] audit: type=1400 audit(268440704.359:682): avc: denied { bpf } for pid=4047 comm="syz.0.15812" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5248.894556][ T30] audit: type=1400 audit(268440704.389:683): avc: denied { perfmon } for pid=4047 comm="syz.0.15812" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5267.466388][ T30] audit: type=1400 audit(268440722.969:684): avc: denied { create } for pid=4143 comm="syz.3.15859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5267.480427][ T30] audit: type=1400 audit(268440722.989:685): avc: denied { write } for pid=4143 comm="syz.3.15859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5268.230075][ T30] audit: type=1400 audit(268440723.709:686): avc: denied { read } for pid=4146 comm="syz.3.15861" dev="nsfs" ino=4026532689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5268.231526][ T30] audit: type=1400 audit(268440723.729:687): avc: denied { open } for pid=4146 comm="syz.3.15861" path="net:[4026532689]" dev="nsfs" ino=4026532689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5274.135546][ T30] audit: type=1400 audit(268440729.639:688): avc: denied { create } for pid=4179 comm="syz.3.15877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 5274.175861][ T30] audit: type=1400 audit(268440729.679:689): avc: denied { setopt } for pid=4179 comm="syz.3.15877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 5293.747608][ T30] audit: type=1400 audit(268440749.249:690): avc: denied { module_request } for pid=4282 comm="syz.3.15927" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5294.303361][ T30] audit: type=1400 audit(268440749.789:691): avc: denied { ioctl } for pid=4282 comm="syz.3.15927" path="socket:[116689]" dev="sockfs" ino=116689 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5294.889452][ T30] audit: type=1400 audit(268440750.389:692): avc: denied { read } for pid=4282 comm="syz.3.15927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5295.309857][ T30] audit: type=1400 audit(268440750.809:693): avc: denied { sys_module } for pid=4282 comm="syz.3.15927" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5309.754793][ T30] audit: type=1400 audit(268440765.259:694): avc: denied { read } for pid=4366 comm="syz.3.15966" name="rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 5309.762920][ T30] audit: type=1400 audit(268440765.259:695): avc: denied { open } for pid=4366 comm="syz.3.15966" path="/dev/rtc0" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 5309.815677][ T30] audit: type=1400 audit(268440765.309:696): avc: denied { ioctl } for pid=4366 comm="syz.3.15966" path="/dev/rtc0" dev="devtmpfs" ino=708 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 5310.517682][ T30] audit: type=1400 audit(268440766.019:697): avc: denied { create } for pid=4371 comm="syz.0.15968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5310.540143][ T30] audit: type=1400 audit(268440766.039:698): avc: denied { bind } for pid=4371 comm="syz.0.15968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5310.589480][ T30] audit: type=1400 audit(268440766.079:699): avc: denied { accept } for pid=4371 comm="syz.0.15968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5310.614084][ T30] audit: type=1400 audit(268440766.119:700): avc: denied { read } for pid=4371 comm="syz.0.15968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5316.435521][ T30] audit: type=1400 audit(268440771.939:701): avc: denied { read write } for pid=4401 comm="syz.3.15983" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 5316.446483][ T30] audit: type=1400 audit(268440771.939:702): avc: denied { open } for pid=4401 comm="syz.3.15983" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 5316.474787][ T30] audit: type=1400 audit(268440771.979:703): avc: denied { create } for pid=4401 comm="syz.3.15983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5316.506289][ T30] audit: type=1400 audit(268440772.009:704): avc: denied { getopt } for pid=4401 comm="syz.3.15983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5330.515717][ T30] audit: type=1400 audit(268440786.019:705): avc: denied { execmem } for pid=4471 comm="syz.0.16016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5330.606602][ T30] audit: type=1400 audit(268440786.099:706): avc: denied { mounton } for pid=4471 comm="syz.0.16016" path="/301" dev="tmpfs" ino=1561 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5330.924160][ T30] audit: type=1400 audit(268440786.429:707): avc: denied { unmount } for pid=2922 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 5333.671883][ T30] audit: type=1400 audit(268440789.089:708): avc: denied { write } for pid=4487 comm="syz.3.16024" name="ip_mr_cache" dev="proc" ino=4026532712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 5392.659423][ T30] audit: type=1400 audit(268440848.159:709): avc: denied { create } for pid=4747 comm="syz.0.16150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5392.711870][ T30] audit: type=1400 audit(268440848.219:710): avc: denied { write } for pid=4747 comm="syz.0.16150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5396.417559][ T30] audit: type=1400 audit(268440851.909:711): avc: denied { map_create } for pid=4765 comm="syz.0.16159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5396.433759][ T30] audit: type=1400 audit(268440851.929:712): avc: denied { map_read map_write } for pid=4765 comm="syz.0.16159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5403.825761][ T4804] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4804 comm=syz.3.16178 [ 5406.480645][ T30] audit: type=1400 audit(268440861.979:713): avc: denied { create } for pid=4821 comm="syz.3.16187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5406.496822][ T30] audit: type=1400 audit(268440861.999:714): avc: denied { ioctl } for pid=4821 comm="syz.3.16187" path="socket:[118660]" dev="sockfs" ino=118660 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5407.310871][ T30] audit: type=1400 audit(268440862.799:715): avc: denied { read } for pid=4826 comm="syz.3.16189" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 5407.322688][ T30] audit: type=1400 audit(268440862.829:716): avc: denied { open } for pid=4826 comm="syz.3.16189" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 5407.362649][ T30] audit: type=1400 audit(268440862.869:717): avc: denied { ioctl } for pid=4826 comm="syz.3.16189" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 5423.331751][ T30] audit: type=1400 audit(268441134.819:718): avc: denied { prog_run } for pid=4909 comm="syz.3.16230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5434.671728][ T30] audit: type=1400 audit(268441146.149:719): avc: denied { name_bind } for pid=4969 comm="syz.0.16260" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 5434.673019][ T30] audit: type=1400 audit(268441146.169:720): avc: denied { node_bind } for pid=4969 comm="syz.0.16260" saddr=::1 src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5437.817360][ T30] audit: type=1400 audit(268441149.319:721): avc: denied { create } for pid=4983 comm="syz.3.16267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5437.867590][ T30] audit: type=1400 audit(268441149.369:722): avc: denied { write } for pid=4983 comm="syz.3.16267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5457.206727][ T30] audit: type=1400 audit(268441168.709:723): avc: denied { write } for pid=5077 comm="syz.0.16314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5460.244443][ T30] audit: type=1400 audit(268441171.749:724): avc: denied { create } for pid=5096 comm="syz.0.16323" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5460.264375][ T30] audit: type=1400 audit(268441171.769:725): avc: denied { ioctl } for pid=5096 comm="syz.0.16323" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=121174 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5460.290041][ T30] audit: type=1400 audit(268441171.789:726): avc: denied { allowed } for pid=5096 comm="syz.0.16323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5461.336460][ T30] audit: type=1400 audit(268441172.839:727): avc: denied { audit_write } for pid=5100 comm="syz.3.16325" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5478.816780][ T30] audit: type=1400 audit(268441190.319:728): avc: denied { compute_member } for pid=5195 comm="syz.3.16373" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 5479.273803][ T30] audit: type=1400 audit(268441190.779:729): avc: denied { append } for pid=5198 comm="syz.0.16374" name="hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 5486.622500][ T30] audit: type=1400 audit(268441198.099:730): avc: denied { search } for pid=5236 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5486.641099][ T30] audit: type=1400 audit(268441198.129:731): avc: denied { search } for pid=5236 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=542 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5486.641991][ T30] audit: type=1400 audit(268441198.139:732): avc: denied { search } for pid=5236 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=704 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5486.642546][ T30] audit: type=1400 audit(268441198.139:733): avc: denied { search } for pid=5236 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5487.092564][ T30] audit: type=1400 audit(268441198.599:734): avc: denied { read open } for pid=5240 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5487.105591][ T30] audit: type=1400 audit(268441198.609:735): avc: denied { getattr } for pid=5240 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5487.504742][ T30] audit: type=1400 audit(268441198.999:736): avc: denied { add_name } for pid=5236 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5487.510762][ T30] audit: type=1400 audit(268441199.009:737): avc: denied { create } for pid=5236 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5487.517572][ T30] audit: type=1400 audit(268441199.019:738): avc: denied { write open } for pid=5236 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=14637 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5487.535843][ T30] audit: type=1400 audit(268441199.039:739): avc: denied { append } for pid=5236 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=14637 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5517.076600][ T5379] ipvlan1: entered allmulticast mode [ 5517.077523][ T5379] veth0_vlan: entered allmulticast mode [ 5534.942423][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 5534.942952][ T30] audit: type=1400 audit(268441246.449:744): avc: denied { read write } for pid=5452 comm="syz.3.16496" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 5534.959519][ T30] audit: type=1400 audit(268441246.459:745): avc: denied { open } for pid=5452 comm="syz.3.16496" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 5534.989261][ T30] audit: type=1400 audit(268441246.469:746): avc: denied { ioctl } for pid=5452 comm="syz.3.16496" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0x6433 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 5554.024496][ T30] audit: type=1400 audit(268441265.519:747): avc: denied { write } for pid=5570 comm="syz.3.16555" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5554.059463][ T30] audit: type=1400 audit(268441265.559:748): avc: denied { setopt } for pid=5570 comm="syz.3.16555" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5554.083116][ T30] audit: type=1400 audit(268441265.579:749): avc: denied { read } for pid=5570 comm="syz.3.16555" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5565.907200][ T30] audit: type=1400 audit(268441277.409:750): avc: denied { append } for pid=5633 comm="syz.0.16585" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 5576.161544][ T30] audit: type=1400 audit(268441287.649:751): avc: denied { name_bind } for pid=5684 comm="syz.0.16610" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5625.814512][ T5951] [U] ^L [ 5643.890184][ T30] audit: type=1400 audit(268441355.389:752): avc: denied { block_suspend } for pid=6035 comm="syz.0.16784" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5671.796298][ T30] audit: type=1400 audit(268441383.299:753): avc: denied { ioctl } for pid=6183 comm="syz.0.16856" path="socket:[124214]" dev="sockfs" ino=124214 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5671.805818][ T30] audit: type=1400 audit(268441383.309:754): avc: denied { bind } for pid=6183 comm="syz.0.16856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5732.651769][ T30] audit: type=1400 audit(268441444.139:755): avc: denied { mount } for pid=6532 comm="syz.3.17028" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5763.460720][ T30] audit: type=1400 audit(268441474.949:756): avc: denied { remount } for pid=6713 comm="syz.3.17117" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5763.811731][ T30] audit: type=1400 audit(268441475.299:757): avc: denied { unmount } for pid=30487 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5795.265120][ T30] audit: type=1400 audit(268441506.769:758): avc: denied { setattr } for pid=6898 comm="syz.0.17209" name="vcsu" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1 [ 5825.146359][ T7067] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7067 comm=syz.0.17291 [ 5881.740557][ T30] audit: type=1400 audit(268441594.229:759): avc: denied { setopt } for pid=7415 comm="syz.0.17460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5882.337682][ T30] audit: type=1400 audit(268441594.839:760): avc: denied { bind } for pid=7415 comm="syz.0.17460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5888.406595][ T30] audit: type=1400 audit(268441600.909:761): avc: denied { read } for pid=7438 comm="syz.3.17470" name="nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5888.421407][ T30] audit: type=1400 audit(268441600.919:762): avc: denied { open } for pid=7438 comm="syz.3.17470" path="/dev/nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5893.099551][ T30] audit: type=1400 audit(268441605.599:763): avc: denied { checkpoint_restore } for pid=7457 comm="syz.3.17479" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6029.010834][ T30] audit: type=1400 audit(268441741.509:764): avc: denied { connect } for pid=8233 comm="syz.3.17861" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6046.701466][ T30] audit: type=1400 audit(268441759.209:765): avc: denied { create } for pid=8336 comm="syz.3.17912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6079.456237][ T30] audit: type=1400 audit(268441791.949:766): avc: denied { mount } for pid=8550 comm="syz.0.18018" name="/" dev="ramfs" ino=133373 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 6162.521989][ T30] audit: type=1400 audit(268441875.029:767): avc: denied { create } for pid=9156 comm="syz.0.18314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6166.111372][ T30] audit: type=1400 audit(268441878.599:768): avc: denied { ioctl } for pid=9186 comm="syz.0.18329" path="socket:[134663]" dev="sockfs" ino=134663 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6172.829899][ T30] audit: type=1400 audit(268441885.319:769): avc: denied { map } for pid=9246 comm="syz.3.18359" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=134791 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6172.830845][ T30] audit: type=1400 audit(268441885.329:770): avc: denied { read write } for pid=9246 comm="syz.3.18359" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=134791 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6176.254790][ T30] audit: type=1400 audit(268441888.759:771): avc: denied { write } for pid=9267 comm="syz.0.18369" name="nvme-fabrics" dev="devtmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6176.266514][ T30] audit: type=1400 audit(268441888.769:772): avc: denied { create } for pid=9267 comm="syz.0.18369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 6176.274426][ T30] audit: type=1400 audit(268441888.779:773): avc: denied { ioctl } for pid=9267 comm="syz.0.18369" path="socket:[135641]" dev="sockfs" ino=135641 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 6200.785061][ T30] audit: type=1400 audit(268441913.289:774): avc: denied { mount } for pid=9365 comm="syz.0.18415" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 6208.544777][ T30] audit: type=1400 audit(268441921.049:775): avc: denied { bind } for pid=9402 comm="syz.0.18433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6208.553213][ T30] audit: type=1400 audit(268441921.059:776): avc: denied { node_bind } for pid=9402 comm="syz.0.18433" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 6209.792992][ T9417] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9417 comm=syz.3.18441 [ 6252.533852][ T30] audit: type=1400 audit(268441965.039:777): avc: denied { read } for pid=9727 comm="syz.3.18590" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 6252.551800][ T30] audit: type=1400 audit(268441965.039:778): avc: denied { open } for pid=9727 comm="syz.3.18590" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 6252.910444][ T9732] tap0: tun_chr_ioctl cmd 1074025673 [ 6258.877920][ T30] audit: type=1400 audit(268441971.379:779): avc: denied { ioctl } for pid=9777 comm="syz.0.18614" path="/dev/iommu" dev="devtmpfs" ino=614 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6265.994899][ T30] audit: type=1400 audit(268441978.499:780): avc: denied { mounton } for pid=9843 comm="syz.3.18647" path="/2778/file0" dev="tmpfs" ino=14326 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6298.893270][ T30] audit: type=1400 audit(268442011.399:781): avc: denied { read write } for pid=10119 comm="syz.3.18782" name="rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 6298.904696][ T30] audit: type=1400 audit(268442011.409:782): avc: denied { open } for pid=10119 comm="syz.3.18782" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 6300.689298][ T30] audit: type=1400 audit(268442013.189:783): avc: denied { setopt } for pid=10129 comm="syz.3.18786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6341.002653][ T30] audit: type=1400 audit(268442053.509:784): avc: denied { read } for pid=10414 comm="syz.0.18924" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 6341.006970][ T30] audit: type=1400 audit(268442053.509:785): avc: denied { open } for pid=10414 comm="syz.0.18924" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 6341.022298][ T30] audit: type=1400 audit(268442053.529:786): avc: denied { map } for pid=10414 comm="syz.0.18924" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 6341.032125][ T30] audit: type=1400 audit(268442053.539:787): avc: denied { ioctl } for pid=10414 comm="syz.0.18924" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x9204 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 6354.556923][ T30] audit: type=1400 audit(268442067.059:788): avc: denied { create } for pid=10527 comm="syz.0.18980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6354.593744][ T30] audit: type=1400 audit(268442067.099:789): avc: denied { bind } for pid=10527 comm="syz.0.18980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6354.634502][ T30] audit: type=1400 audit(268442067.139:790): avc: denied { write } for pid=10527 comm="syz.0.18980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6372.657990][ T30] audit: type=1400 audit(268442085.159:791): avc: denied { watch } for pid=10676 comm="syz.0.19051" path="/1809" dev="tmpfs" ino=9322 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6374.480894][ T8510] atkbd serio0: keyboard reset failed on [ 6410.064554][ T30] audit: type=1400 audit(268442122.569:792): avc: denied { setattr } for pid=10969 comm="syz.0.19192" name="virtual_nci" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6433.261470][ T30] audit: type=1400 audit(268442145.759:793): avc: denied { sqpoll } for pid=11153 comm="syz.3.19280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6438.312446][ T30] audit: type=1400 audit(268442150.819:794): avc: denied { read write } for pid=11186 comm="syz.3.19294" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 6438.324693][ T30] audit: type=1400 audit(268442150.829:795): avc: denied { open } for pid=11186 comm="syz.3.19294" path="/dev/uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 6438.374145][ T30] audit: type=1400 audit(268442150.879:796): avc: denied { ioctl } for pid=11186 comm="syz.3.19294" path="/dev/uinput" dev="devtmpfs" ino=707 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 6438.426846][T11188] input: syz1 as /devices/virtual/input/input17 [ 6455.607664][ T30] audit: type=1400 audit(268442168.109:797): avc: denied { execute } for pid=11307 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6455.645537][ T30] audit: type=1400 audit(268442168.149:798): avc: denied { execute_no_trans } for pid=11307 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6455.806561][T26134] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6456.246540][T26134] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6456.715782][T26134] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6456.735687][ T30] audit: type=1400 audit(268442169.239:799): avc: denied { mounton } for pid=11312 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 6457.103287][T26134] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6458.294913][ T30] audit: type=1400 audit(268442170.799:800): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 6461.152137][ T30] audit: type=1400 audit(268442173.649:801): avc: denied { write } for pid=11333 comm="syz.0.19363" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:klogd_exec_t:s0" [ 6464.185766][T26134] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6464.287906][T26134] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6464.407682][T26134] bond0 (unregistering): Released all slaves [ 6465.089796][T26134] hsr_slave_0: left promiscuous mode [ 6465.112446][T26134] hsr_slave_1: left promiscuous mode [ 6465.365254][T26134] veth1_macvtap: left promiscuous mode [ 6465.371432][T26134] veth0_macvtap: left promiscuous mode [ 6465.374588][T26134] veth1_vlan: left promiscuous mode [ 6465.377587][T26134] veth0_vlan: left promiscuous mode [ 6487.801860][T11312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6487.943216][T11312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6495.404752][T11312] hsr_slave_0: entered promiscuous mode [ 6495.441918][T11312] hsr_slave_1: entered promiscuous mode [ 6500.430203][T11312] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 6500.551584][T11312] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 6500.637374][T11312] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 6500.757309][T11312] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 6507.310098][T11312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6533.675897][T11312] veth0_vlan: entered promiscuous mode [ 6533.737144][T11312] veth1_vlan: entered promiscuous mode [ 6534.094311][T11312] veth0_macvtap: entered promiscuous mode [ 6534.142096][T11312] veth1_macvtap: entered promiscuous mode [ 6534.872507][T26134] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6534.877010][T26134] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6534.941098][ T1038] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6534.942389][ T1038] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6536.189824][ T30] audit: type=1400 audit(268442248.689:802): avc: denied { mounton } for pid=11312 comm="syz-executor" path="/syzkaller.bcDjuf/syz-tmp" dev="vda" ino=1881 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 6536.210008][ T30] audit: type=1400 audit(268442248.709:803): avc: denied { mount } for pid=11312 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 6536.346448][ T30] audit: type=1400 audit(268442248.849:804): avc: denied { mount } for pid=11312 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 6536.472627][ T30] audit: type=1400 audit(268442248.969:805): avc: denied { mounton } for pid=11312 comm="syz-executor" path="/syzkaller.bcDjuf/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 6536.621203][ T30] audit: type=1400 audit(268442249.129:806): avc: denied { mounton } for pid=11312 comm="syz-executor" path="/syzkaller.bcDjuf/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=143285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 6536.924273][ T30] audit: type=1400 audit(268442249.429:807): avc: denied { unmount } for pid=11312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 6536.980871][ T30] audit: type=1400 audit(268442249.469:808): avc: denied { mounton } for pid=11312 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 6537.021219][ T30] audit: type=1400 audit(268442249.489:809): avc: denied { mount } for pid=11312 comm="syz-executor" name="/" dev="gadgetfs" ino=4066 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 6537.054175][ T30] audit: type=1400 audit(268442249.559:810): avc: denied { mount } for pid=11312 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 6537.063662][ T30] audit: type=1400 audit(268442249.569:811): avc: denied { mounton } for pid=11312 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 6542.992975][T11704] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6543.022996][T11704] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6551.322253][T11751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11751 comm=syz.4.19492 [ 6584.728109][ T30] audit: type=1400 audit(268442297.229:812): avc: denied { ioctl } for pid=11902 comm="syz.0.19565" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 6587.429625][T11918] ALSA: seq fatal error: cannot create timer (-22) [ 6631.613645][ T30] audit: type=1400 audit(268442344.109:813): avc: denied { read } for pid=12187 comm="syz.4.19704" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6634.944885][ T30] audit: type=1400 audit(268442347.449:814): avc: denied { write } for pid=12207 comm="syz.0.19713" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6634.960237][ T30] audit: type=1400 audit(268442347.469:815): avc: denied { open } for pid=12207 comm="syz.0.19713" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6634.964893][ T30] audit: type=1400 audit(268442347.469:816): avc: denied { ioctl } for pid=12207 comm="syz.0.19713" path="/dev/nullb0" dev="devtmpfs" ino=671 ioctlcmd=0x127f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6645.356910][ T30] audit: type=1400 audit(268442357.859:817): avc: denied { create } for pid=12269 comm="syz.4.19745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6645.399890][ T30] audit: type=1400 audit(268442357.899:818): avc: denied { setopt } for pid=12269 comm="syz.4.19745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6693.289903][ T30] audit: type=1400 audit(268442405.789:819): avc: denied { connect } for pid=12589 comm="syz.0.19904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6720.979923][ T30] audit: type=1400 audit(268442433.479:820): avc: denied { create } for pid=12750 comm="syz.0.19982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6721.019500][ T30] audit: type=1400 audit(268442433.519:821): avc: denied { bind } for pid=12750 comm="syz.0.19982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6783.021396][ T30] audit: type=1400 audit(268442495.519:822): avc: denied { create } for pid=13142 comm="syz.4.20176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6874.489760][ T30] audit: type=1400 audit(268442586.989:823): avc: denied { watch_reads } for pid=13674 comm="syz.4.20436" path="/484" dev="tmpfs" ino=2513 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6906.497710][T13857] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 6922.154353][T13939] hugetlbfs: syz.0.20560 (13939): Using mlock ulimits for SHM_HUGETLB is obsolete [ 6938.535953][ T30] audit: type=1400 audit(268442651.039:824): avc: denied { mounton } for pid=14020 comm="syz.0.20601" path="/syzcgroup/unified/syz0" dev="cgroup2" ino=62 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 6938.706479][ T30] audit: type=1400 audit(268442651.209:825): avc: denied { ioctl } for pid=14020 comm="syz.0.20601" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 6961.750446][ T30] audit: type=1400 audit(268442674.249:826): avc: denied { name_bind } for pid=14119 comm="syz.0.20648" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 6973.286596][ T30] audit: type=1400 audit(268442685.789:827): avc: denied { write } for pid=14183 comm="syz.0.20679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7089.575736][ T30] audit: type=1400 audit(268442802.079:828): avc: denied { ioctl } for pid=14794 comm="syz.0.20980" path="socket:[154603]" dev="sockfs" ino=154603 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 7168.486412][ T2393] atkbd serio1: keyboard reset failed on [ 7216.002786][T15503] input: syz0 as /devices/virtual/input/input19 [ 7250.415877][T15681] netlink: 400 bytes leftover after parsing attributes in process `syz.0.21414'. [ 7379.103987][ T30] audit: type=1400 audit(2000000006.000:829): avc: denied { ioctl } for pid=16371 comm="syz.4.21751" path="socket:[159594]" dev="sockfs" ino=159594 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 7418.703927][ T30] audit: type=1400 audit(2000000045.600:830): avc: denied { execute } for pid=16597 comm="syz.4.21864" path=2F6D656D66643AC0DB1C56873A2A18C16BA7875BA06F283449AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=1191 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 7446.822602][T16748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16748 comm=syz.0.21936 [ 7487.003818][T16963] input: syz0 as /devices/virtual/input/input20 [ 7523.162574][ T30] audit: type=1400 audit(2000000663.053:831): avc: denied { create } for pid=17154 comm="syz.4.22134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 7523.253317][ T30] audit: type=1400 audit(2000000663.133:832): avc: denied { ioctl } for pid=17154 comm="syz.4.22134" path="socket:[162736]" dev="sockfs" ino=162736 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 7527.483227][T17183] binfmt_misc: register: failed to install interpreter file ./file0/file0 [ 7576.123329][ T30] audit: type=1400 audit(2000000716.023:833): avc: denied { write } for pid=17441 comm="syz.4.22275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 7595.524827][ T8510] atkbd serio2: keyboard reset failed on [ 7597.047705][ T8510] atkbd serio2: keyboard reset failed on [ 7599.372900][ T30] audit: type=1400 audit(2000000739.273:834): avc: denied { map } for pid=17578 comm="syz.0.22344" path="socket:[164553]" dev="sockfs" ino=164553 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7599.373941][ T30] audit: type=1400 audit(2000000739.273:835): avc: denied { read } for pid=17578 comm="syz.0.22344" path="socket:[164553]" dev="sockfs" ino=164553 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7602.920918][ T30] audit: type=1400 audit(2000000742.813:836): avc: denied { write } for pid=17597 comm="syz.0.22353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 7602.925213][T17599] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1544 sclass=netlink_xfrm_socket pid=17599 comm=syz.0.22353 [ 7608.970217][ T30] audit: type=1400 audit(2000000748.863:837): avc: denied { create } for pid=17630 comm="syz.0.22369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7609.015141][ T30] audit: type=1400 audit(2000000748.913:838): avc: denied { write } for pid=17630 comm="syz.0.22369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7612.794459][ T30] audit: type=1400 audit(2000000752.693:839): avc: denied { read } for pid=17650 comm="syz.4.22379" path="socket:[164884]" dev="sockfs" ino=164884 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7658.855473][T17913] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17913 comm=syz.4.22507 [ 7693.841936][ T30] audit: type=1400 audit(2000000833.743:840): avc: denied { execute } for pid=18121 comm="syz.0.22609" path="/dev/dsp" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 [ 7704.091645][T18186] misc userio: Begin command sent, but we're already running [ 7705.119449][ T6511] atkbd serio3: keyboard reset failed on [ 7829.716288][ T30] audit: type=1400 audit(2000000969.613:841): avc: denied { setopt } for pid=18858 comm="syz.4.22971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 7840.566573][ T30] audit: type=1400 audit(2000000980.463:842): avc: denied { setopt } for pid=18918 comm="syz.4.23000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 8007.224551][T19855] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 8007.227063][T19855] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 8125.356396][T20539] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=20539 comm=syz.4.23794 [ 8151.676416][ T30] audit: type=1400 audit(2000000210.920:843): avc: denied { associate } for pid=20673 comm="syz.4.23860" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 8158.791823][T20703] process 'syz.0.23874' launched './file1' with NULL argv: empty string added [ 8158.800681][ T30] audit: type=1400 audit(2000000218.040:844): avc: denied { execute_no_trans } for pid=20701 comm="syz.0.23874" path="/4333/file1" dev="tmpfs" ino=22349 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 8200.409941][T20935] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 8200.414640][T20935] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 8218.153587][ T30] audit: type=1400 audit(2000000277.400:845): avc: denied { setopt } for pid=21021 comm="syz.0.24030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 8222.766631][ T30] audit: type=1400 audit(2000000282.010:846): avc: denied { mount } for pid=21052 comm="syz.4.24045" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 8224.103774][ T30] audit: type=1400 audit(2000000283.340:847): avc: denied { ioctl } for pid=21064 comm="syz.4.24050" path="socket:[176642]" dev="sockfs" ino=176642 ioctlcmd=0x64a5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 8427.257508][ T30] audit: type=1400 audit(2000000124.320:848): avc: denied { bind } for pid=22159 comm="syz.0.24579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 8546.861969][ T30] audit: type=1400 audit(2000000243.920:849): avc: denied { setopt } for pid=22682 comm="syz.4.24830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 8549.562645][ T30] audit: type=1400 audit(2000000246.630:850): avc: denied { getopt } for pid=22693 comm="syz.0.24836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8561.700344][T14850] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 8562.011515][T14850] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 8562.012291][T14850] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 8562.012802][T14850] usb 1-1: Product: syz [ 8562.012914][T14850] usb 1-1: Manufacturer: syz [ 8562.013031][T14850] usb 1-1: SerialNumber: syz [ 8563.521258][T14850] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x0000011c. ret = -EPROTO [ 8563.522813][T14850] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 8563.651252][T14850] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 8563.779359][T14850] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -71 [ 8564.090727][T14850] usb 1-1: USB disconnect, device number 7 [ 8571.313605][ T30] audit: type=1400 audit(2000000268.380:851): avc: denied { setopt } for pid=22782 comm="syz.4.24878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 8594.364227][T20018] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 8594.592619][T20018] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 8594.613375][T20018] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 8594.614319][T20018] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 8594.614820][T20018] usb 1-1: SerialNumber: syz [ 8595.851075][T20018] cdc_ether 1-1:1.0 usb0: register 'cdc_ether' at usb-dummy_hcd.0-1, CDC Ethernet Device, 42:42:42:42:42:42 [ 8596.051590][T20018] usb 1-1: USB disconnect, device number 8 [ 8596.280700][T20018] cdc_ether 1-1:1.0 usb0: unregister 'cdc_ether' usb-dummy_hcd.0-1, CDC Ethernet Device [ 8599.535792][ T30] audit: type=1400 audit(2000000296.600:852): avc: denied { unmount } for pid=11312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 8612.671305][ T30] audit: type=1400 audit(2000000309.730:853): avc: denied { mounton } for pid=22939 comm="syz.4.24950" path="/proc/5390/task" dev="proc" ino=183553 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 8664.169743][ T30] audit: type=1400 audit(2000000361.220:854): avc: denied { unlink } for pid=2922 comm="syz-executor" name="file6" dev="tmpfs" ino=25588 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 8689.061600][ T30] audit: type=1400 audit(2000000386.120:855): avc: denied { getopt } for pid=23286 comm="syz.0.25111" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8690.945421][T23300] block nbd4: shutting down sockets [ 8691.084838][ T30] audit: type=1400 audit(2000000388.150:856): avc: denied { read } for pid=23299 comm="syz.0.25116" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8691.150310][ T30] audit: type=1400 audit(2000000388.210:857): avc: denied { map } for pid=23299 comm="syz.0.25116" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8691.151636][ T30] audit: type=1400 audit(2000000388.220:858): avc: denied { execute } for pid=23299 comm="syz.0.25116" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 8696.263247][ T30] audit: type=1400 audit(2000000393.320:859): avc: denied { bind } for pid=23323 comm="syz.4.25126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8696.270667][ T30] audit: type=1400 audit(2000000393.330:860): avc: denied { setopt } for pid=23323 comm="syz.4.25126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8710.183376][T23381] vcan0: tx drop: invalid da for name 0xfffffffffffffffc [ 8724.211477][ T30] audit: type=1400 audit(2000000421.280:861): avc: denied { watch } for pid=23437 comm="syz.0.25182" path="pipe:[113067]" dev="pipefs" ino=113067 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 8724.217515][ T30] audit: type=1400 audit(2000000421.280:862): avc: denied { watch_reads } for pid=23437 comm="syz.0.25182" path="pipe:[113067]" dev="pipefs" ino=113067 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 8740.117464][T23502] Injecting memory failure for pfn 0x6c3b7 at process virtual address 0x207b7000 [ 8740.125516][T23502] Memory failure: 0x6c3b7: recovery action for unsplit thp: Failed [ 8789.886583][ T30] audit: type=1400 audit(2000000486.950:863): avc: denied { map } for pid=23647 comm="syz.0.25280" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 8797.897326][T16607] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8798.145811][T16607] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8798.405845][T16607] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8798.757386][T16607] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 8806.491531][T16607] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 8806.650247][T16607] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 8806.727406][T16607] bond0 (unregistering): Released all slaves [ 8807.881907][T16607] hsr_slave_0: left promiscuous mode [ 8807.913013][T16607] hsr_slave_1: left promiscuous mode [ 8808.314783][T16607] veth1_macvtap: left promiscuous mode [ 8808.316005][T16607] veth0_macvtap: left promiscuous mode [ 8808.323451][T16607] veth1_vlan: left promiscuous mode [ 8808.324598][T16607] veth0_vlan: left promiscuous mode [ 8816.785950][T23721] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=23721 comm=syz.4.25313 [ 8826.411484][T23755] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 8835.335888][ T30] audit: type=1400 audit(2000000532.400:864): avc: denied { ioctl } for pid=23786 comm="syz.4.25330" path="socket:[185195]" dev="sockfs" ino=185195 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 8835.755543][T23678] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 8835.856346][T23678] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 8846.326907][T23678] hsr_slave_0: entered promiscuous mode [ 8846.384099][T23678] hsr_slave_1: entered promiscuous mode [ 8846.397510][T23678] debugfs: 'hsr0' already exists in 'hsr' [ 8846.414310][T23678] Cannot create hsr debugfs directory [ 8850.403420][T23678] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 8850.523440][T23678] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 8850.635621][T23678] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 8850.795396][T23678] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 8859.305055][T23678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 8893.863765][T23678] veth0_vlan: entered promiscuous mode [ 8894.433197][T23678] veth1_vlan: entered promiscuous mode [ 8895.127212][T23678] veth0_macvtap: entered promiscuous mode [ 8895.255632][T23678] veth1_macvtap: entered promiscuous mode [ 8896.266945][ T1038] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 8896.278890][T16255] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 8896.279443][T16255] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 8896.280122][T16255] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 8919.445789][ T30] audit: type=1400 audit(2000000616.510:865): avc: denied { connect } for pid=24073 comm="syz.5.25412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 8919.508921][ T30] audit: type=1400 audit(2000000616.570:866): avc: denied { write } for pid=24073 comm="syz.5.25412" laddr=fe80::7c4a:3aff:fe45:b9f7 lport=5 faddr=ff02::1 fport=20005 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 8919.517912][ T30] audit: type=1400 audit(2000000616.580:867): avc: denied { read } for pid=24073 comm="syz.5.25412" path="socket:[186833]" dev="sockfs" ino=186833 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 8948.842204][T24162] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24162 comm=syz.5.25454 [ 8954.932402][ T30] audit: type=1400 audit(2000000652.000:868): avc: denied { listen } for pid=24179 comm="syz.4.25462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 8954.944510][ T30] audit: type=1400 audit(2000000652.010:869): avc: denied { accept } for pid=24179 comm="syz.4.25462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 8968.691226][ T30] audit: type=1400 audit(2000000665.750:870): avc: denied { create } for pid=24214 comm="syz.5.25479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 8993.047240][ T30] audit: type=1400 audit(2000000690.110:871): avc: denied { setopt } for pid=24308 comm="syz.5.25523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 9007.720858][ T30] audit: type=1400 audit(2000000704.760:872): avc: denied { setattr } for pid=24356 comm="syz.4.25545" name="RDS" dev="sockfs" ino=188227 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 9026.713985][ T30] audit: type=1400 audit(2000000723.780:873): avc: denied { read } for pid=24411 comm="syz.4.25572" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 9026.740717][ T30] audit: type=1400 audit(2000000723.800:874): avc: denied { open } for pid=24411 comm="syz.4.25572" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 9026.784362][ T30] audit: type=1400 audit(2000000723.850:875): avc: denied { ioctl } for pid=24411 comm="syz.4.25572" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 9081.936334][T24581] vxcan0: tx address claim with dlc 0 [ 9093.200814][ T30] audit: type=1400 audit(2000000790.230:876): avc: denied { bind } for pid=24616 comm="syz.5.25670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 9093.215907][T24618] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 9093.217499][T24618] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 9118.247000][ T30] audit: type=1400 audit(2000000815.310:877): avc: denied { write } for pid=24692 comm="syz.4.25707" name="001" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 9118.412292][T24693] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.25707' sets config #0 [ 9118.441273][T24693] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.25707' sets config #1 [ 9158.628971][ T30] audit: type=1400 audit(2000000855.690:878): avc: denied { bind } for pid=24814 comm="syz.4.25764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 9158.642692][ T30] audit: type=1400 audit(2000000855.710:879): avc: denied { write } for pid=24814 comm="syz.4.25764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 9162.324570][ T30] audit: type=1400 audit(2000000859.360:880): avc: denied { mount } for pid=24825 comm="syz.5.25769" name="/" dev="configfs" ino=1103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 9162.381236][ T30] audit: type=1400 audit(2000000859.440:881): avc: denied { search } for pid=24825 comm="syz.5.25769" name="/" dev="configfs" ino=1103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 9162.413278][ T30] audit: type=1400 audit(2000000859.470:882): avc: denied { search } for pid=24825 comm="syz.5.25769" name="/" dev="configfs" ino=1103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 9162.425301][ T30] audit: type=1400 audit(2000000859.490:883): avc: denied { search } for pid=24825 comm="syz.5.25769" name="/" dev="configfs" ino=1103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 9180.529812][T24896] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=513 sclass=netlink_audit_socket pid=24896 comm=syz.5.25801 [ 9200.799889][ T30] audit: type=1400 audit(2000000897.830:884): avc: denied { mount } for pid=24977 comm="syz.4.25841" name="/" dev="autofs" ino=190547 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 9201.251603][ T30] audit: type=1400 audit(2000000898.290:885): avc: denied { unmount } for pid=11312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 9226.600371][T25069] pim6reg1: entered allmulticast mode [ 9228.450965][T25079] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 9228.480851][T25079] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 9228.546504][ T30] audit: type=1400 audit(2000000925.610:886): avc: denied { bind } for pid=25077 comm="syz.5.25889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 9228.584141][ T30] audit: type=1400 audit(2000000925.650:887): avc: denied { ioctl } for pid=25077 comm="syz.5.25889" path="socket:[190764]" dev="sockfs" ino=190764 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 9229.215780][T25081] loop2: detected capacity change from 0 to 7 [ 9233.237369][T21983] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9234.271823][T21983] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9234.636457][T21983] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9235.016662][T21983] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9240.899689][ T30] audit: type=1400 audit(2000000937.960:888): avc: denied { nlmsg_read } for pid=25122 comm="syz.4.25906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 9242.992568][T21983] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9243.081248][T21983] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9243.156024][T21983] bond0 (unregistering): Released all slaves [ 9243.957699][T21983] hsr_slave_0: left promiscuous mode [ 9243.999262][T21983] hsr_slave_1: left promiscuous mode [ 9244.366598][T21983] veth1_macvtap: left promiscuous mode [ 9244.371034][T21983] veth0_macvtap: left promiscuous mode [ 9244.374174][T21983] veth1_vlan: left promiscuous mode [ 9244.378928][T21983] veth0_vlan: left promiscuous mode [ 9274.271271][T25099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 9274.383047][T25099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 9282.454213][T25099] hsr_slave_0: entered promiscuous mode [ 9282.483981][T25099] hsr_slave_1: entered promiscuous mode [ 9282.550325][T25099] debugfs: 'hsr0' already exists in 'hsr' [ 9282.551293][T25099] Cannot create hsr debugfs directory [ 9292.002913][T25099] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 9292.079556][T25099] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 9292.115406][T25099] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 9292.152474][T25099] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 9298.283800][T25274] netlink: 12 bytes leftover after parsing attributes in process `syz.4.25941'. [ 9298.497748][T25274] netlink: 12 bytes leftover after parsing attributes in process `syz.4.25941'. [ 9299.121546][T25099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 9306.302977][T25279] infiniband syz1: set active [ 9306.303979][T25279] infiniband syz1: added syz_tun [ 9307.936483][T25279] RDS/IB: syz1: added [ 9307.984638][T25279] smc: adding ib device syz1 with port count 1 [ 9307.995971][T25279] smc: ib device syz1 port 1 has pnetid [ 9330.537227][T25099] veth0_vlan: entered promiscuous mode [ 9330.826460][T25099] veth1_vlan: entered promiscuous mode [ 9331.971487][T25099] veth0_macvtap: entered promiscuous mode [ 9332.030893][T25099] veth1_macvtap: entered promiscuous mode [ 9333.023462][T23559] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 9333.025274][T23559] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 9333.037816][T23559] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 9333.043412][T23559] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 9335.291553][T16255] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9335.985186][T16255] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9336.507821][T16255] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9337.197883][T16255] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9343.106467][T16255] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9343.205819][T16255] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9343.313466][T16255] bond0 (unregistering): Released all slaves [ 9352.081119][T16255] hsr_slave_0: left promiscuous mode [ 9352.094199][T16255] hsr_slave_1: left promiscuous mode [ 9352.508786][T16255] veth1_macvtap: left promiscuous mode [ 9352.521104][T16255] veth0_macvtap: left promiscuous mode [ 9352.571736][T16255] veth1_vlan: left promiscuous mode [ 9352.573273][T16255] veth0_vlan: left promiscuous mode [ 9373.222034][T22316] smc: removing ib device syz1 [ 9373.287470][T25184] syz1: Port: 1 Link DOWN [ 9376.597095][T25363] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 9376.841672][T25363] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 9383.501396][T11312] unregister_netdevice: waiting for syz_tun to become free. Usage count = 2 [ 9383.506978][T11312] ref_tracker: netdev@000000001d53c17a has 1/1 users at [ 9383.506978][T11312] ib_device_set_netdev+0x1cc/0x580 [ 9383.506978][T11312] rxe_register_device+0x200/0x2b8 [ 9383.506978][T11312] rxe_add+0xd60/0x10c8 [ 9383.506978][T11312] rxe_net_add+0x9c/0xf4 [ 9383.506978][T11312] rxe_newlink+0x58/0x14c [ 9383.506978][T11312] nldev_newlink+0x280/0x4b4 [ 9383.506978][T11312] rdma_nl_rcv_msg+0x274/0x56c [ 9383.506978][T11312] rdma_nl_rcv_skb.constprop.0.isra.0+0x1f0/0x328 [ 9383.506978][T11312] rdma_nl_rcv+0x10/0x1c [ 9383.506978][T11312] netlink_unicast+0x424/0x700 [ 9383.506978][T11312] netlink_sendmsg+0x644/0xa54 [ 9383.506978][T11312] __sock_sendmsg+0xc8/0x168 [ 9383.506978][T11312] ____sys_sendmsg+0x500/0x764 [ 9383.506978][T11312] ___sys_sendmsg+0x11c/0x19c [ 9383.506978][T11312] __sys_sendmsg+0x114/0x19c [ 9383.506978][T11312] __arm64_sys_sendmsg+0x70/0xa0 [ 9383.506978][T11312] [ 9383.569906][ T30] audit: type=1400 audit(2000001080.620:889): avc: denied { write } for pid=3314 comm="syz-executor" path="pipe:[3575]" dev="pipefs" ino=3575 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 9383.570787][ T30] audit: type=1400 audit(2000001080.630:890): avc: denied { read } for pid=3119 comm="syslogd" name="log" dev="vda" ino=1857 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9383.571342][ T30] audit: type=1400 audit(2000001080.630:891): avc: denied { search } for pid=3119 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 9383.624715][ T30] audit: type=1400 audit(2000001080.690:892): avc: denied { search } for pid=3119 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9383.643865][ T30] audit: type=1400 audit(2000001080.690:893): avc: denied { add_name } for pid=3119 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9383.644413][ T30] audit: type=1400 audit(2000001080.700:894): avc: denied { create } for pid=3119 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9383.644666][ T30] audit: type=1400 audit(2000001080.700:895): avc: denied { append open } for pid=3119 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9383.676844][ T30] audit: type=1400 audit(2000001080.720:896): avc: denied { getattr } for pid=3119 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9387.346676][T16255] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9388.137826][T16255] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9388.835095][T16255] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9389.262276][T16255] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9394.471787][T16255] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9394.555093][T16255] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9394.616458][T16255] bond0 (unregistering): Released all slaves [ 9395.176280][T16255] hsr_slave_0: left promiscuous mode [ 9395.203833][T16255] hsr_slave_1: left promiscuous mode [ 9395.331391][T16255] veth1_macvtap: left promiscuous mode [ 9395.334067][T16255] veth0_macvtap: left promiscuous mode [ 9395.339877][T16255] veth1_vlan: left promiscuous mode [ 9395.342836][T16255] veth0_vlan: left promiscuous mode [ 9404.420043][T16255] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9404.552595][T16255] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9404.655987][T16255] bond0 (unregistering): Released all slaves VM DIAGNOSIS: 06:25:24 Registers: info registers vcpu 0 CPU#0 PC=ffff800085445edc X00=0000000100000103 X01=ffff7fffe2fce000 X02=0000000000000000 X03=1fffe00001c51001 X04=00000000a8fa6606 X05=0000000000000000 X06=ffff00000e288ba8 X07=509e9446815602bc X08=0000000000000000 X09=ffff8000897f6000 X10=ffff00000e288a90 X11=0000000000000002 X12=0000000000000006 X13=0000000000000000 X14=0000000002bae49e X15=ffff0000367e4000 X16=0000000000000000 X17=1fffe000030669e0 X18=1fffe00003178c03 X19=ffff800080035f88 X20=ffff800080006aa0 X21=ffff00000e288000 X22=0000000000000000 X23=ffff8000800360b8 X24=ffff000018334e00 X25=ffff000018334c80 X26=1fffe00006cfc80e X27=ffff0000367e4028 X28=ffff00001833566e X29=ffff800080006a80 X30=ffff800080398158 SP=ffff800080006a80 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000010 Q00=0000000000000000:0000000000000000 Q01=646972622f656764:6972622f30326874 Q02=0000aaaacc34884c:00000064695f6567 Q03=0000000000000000:ffffffffffff0000 Q04=0000000000000000:00000000ffffff00 Q05=0000000000000000:c0c00000cc00000c Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000002 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc23a32a0:0000ffffc23a32a0 Q17=ffffff80ffffffd8:0000ffffc23a3270 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008034fcf8 X00=00000000000000c0 X01=00000000ffffe8b0 X02=0000000000000000 X03=ffff80008034fca0 X04=ffff7000141b6e67 X05=ffff8000a0db7330 X06=ffff7000141b6e66 X07=0000000000000001 X08=ffff8000a0db7337 X09=dfff800000000000 X10=ffff7000141b6e66 X11=1ffff000141b6e66 X12=ffff7000141b6e67 X13=00000000ffffffff X14=0000000000000000 X15=0000000000000007 X16=ffff00006a0ab4c4 X17=206567617355202e X18=0000000000000000 X19=1ffff000141b6e97 X20=ffff8000a0db74b0 X21=ffff8000a0db74b8 X22=ffff800087230e60 X23=1ffff000141b6e62 X24=ffff8000a0db7330 X25=00000000ffffe8b0 X26=000000000000000d X27=00000000ffffe8b0 X28=1fffe0000d4156b5 X29=ffff8000a0db72b0 X30=ffff80008034fca0 SP=ffff8000a0db72b0 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2e2e2e2e2e2e2e2e:2e2e2e2e2e2e2e2e Q01=0000000000000000:00007367616c665f Q02=cccccccccccccccc:cccc000000000000 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:cccccccccc000000 Q06=0000ffffc23a360e:0000ffffc23a3600 Q07=0000ffffc23a3629:0000ffffc23a361b Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc238eec0:0000ffffc238eec0 Q17=ffffff80ffffffd0:0000ffffc238ee90 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000