last executing test programs: 7m35.726458633s ago: executing program 0 (id=5478): mkdir(&(0x7f0000000440)='./file1\x00', 0x0) fstatat64(0xffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f0000000000), 0x800) 7m34.264098254s ago: executing program 0 (id=5479): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername$inet6(r0, 0x0, &(0x7f0000000080)) 7m34.263835834s ago: executing program 1 (id=5480): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f0000002980)={0x0, 0x0, &(0x7f0000002940)={&(0x7f00000028c0)={0x14, 0x0, 0x10, 0x70bd26, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x50}, 0x5a) 7m22.404841553s ago: executing program 0 (id=5481): r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0x5450, 0x0) 7m22.324008065s ago: executing program 1 (id=5482): r0 = openat$sequencer(0xffffff9c, &(0x7f0000000100), 0x41, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 7m19.270713652s ago: executing program 1 (id=5483): pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$TFD_IOC_SET_TICKS(r0, 0x5450, 0x0) 7m18.591906671s ago: executing program 0 (id=5484): r0 = openat$vcs(0xffffff9c, &(0x7f0000001840), 0x0, 0x0) close$binfmt(r0) 7m17.394598636s ago: executing program 1 (id=5485): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fchown(r0, 0x0, 0xee00) 7m6.863703086s ago: executing program 0 (id=5486): r0 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x5421, &(0x7f0000000100)) 7m6.773219979s ago: executing program 1 (id=5487): r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x5451, 0x0) 7m4.423649766s ago: executing program 0 (id=5488): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x5450, 0x0) 7m4.024758647s ago: executing program 1 (id=5489): r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$BTRFS_IOC_FS_INFO(r0, 0x5450, 0x0) 6m16.945531141s ago: executing program 32 (id=5488): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDGKBSENT(r0, 0x5450, 0x0) 6m16.815486905s ago: executing program 33 (id=5489): r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$BTRFS_IOC_FS_INFO(r0, 0x5450, 0x0) 4.292254427s ago: executing program 2 (id=6206): r0 = socket(0x10, 0x3, 0x9) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x200, 0x70bd2d, 0x25dfdbfc, {{}, {}, {0xc, 0x14, 'syz0\x00'}}}, 0x28}, 0x1, 0x0, 0x0, 0x40090}, 0x4080) 3.940443577s ago: executing program 2 (id=6208): r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_TEST_OP_ACCESS_PAGES(r0, 0x40049409, 0x0) 3.631550086s ago: executing program 2 (id=6210): pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x5452, &(0x7f0000000000)={'team0\x00'}) 3.332841904s ago: executing program 2 (id=6212): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$sock(r0, 0x0, 0x0, 0x40040) 3.061271812s ago: executing program 2 (id=6214): r0 = socket$unix(0x1, 0x1, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x8970, &(0x7f0000000fc0)) 1.41054816s ago: executing program 3 (id=6220): r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x0) fcntl$getown(r0, 0x9) 1.137095507s ago: executing program 3 (id=6221): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$random(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 851.674255ms ago: executing program 3 (id=6222): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x5450, 0x0) 570.445713ms ago: executing program 3 (id=6223): r0 = socket(0xa, 0x3, 0x101) sendmsg$NL80211_CMD_SET_WOWLAN(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x2, 0xf0ff7f}, 0x18, &(0x7f0000000080)={0x0}}, 0x0) 258.391832ms ago: executing program 3 (id=6224): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) fcntl$setownex(r0, 0xf, &(0x7f00000024c0)) 162.422205ms ago: executing program 2 (id=6225): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 0s ago: executing program 3 (id=6226): r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x5450, 0x0) kernel console output (not intermixed with test programs): rmissive=1 [ 4292.430172][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 4292.430275][ T31] audit: type=1400 audit(4292.290:274): avc: denied { create } for pid=11330 comm="syz.0.3560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4292.441272][ T31] audit: type=1400 audit(4292.300:275): avc: denied { getopt } for pid=11330 comm="syz.0.3560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4294.322500][ T31] audit: type=1400 audit(4294.190:276): avc: denied { setopt } for pid=11334 comm="syz.0.3561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4295.474842][ T31] audit: type=1400 audit(4295.340:277): avc: denied { append } for pid=11337 comm="syz.1.3563" name="adsp1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4295.672131][ T31] audit: type=1400 audit(4295.530:278): avc: denied { map } for pid=11337 comm="syz.1.3563" path="/dev/adsp1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4309.911269][ T31] audit: type=1400 audit(4309.770:279): avc: denied { ioctl } for pid=11349 comm="syz.0.3570" path="socket:[24788]" dev="sockfs" ino=24788 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 4336.060075][ T31] audit: type=1400 audit(4335.920:280): avc: denied { read } for pid=11371 comm="syz.0.3580" path="socket:[24825]" dev="sockfs" ino=24825 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4366.034220][ T31] audit: type=1400 audit(4365.900:281): avc: denied { write } for pid=11388 comm="syz.0.3589" name="dev" dev="proc" ino=4026532755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 4377.306774][ T31] audit: type=1400 audit(4377.170:282): avc: denied { setopt } for pid=11394 comm="syz.1.3593" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4381.987335][ T31] audit: type=1400 audit(4381.850:283): avc: denied { ioctl } for pid=11407 comm="syz.0.3599" path="pid:[4026532651]" dev="nsfs" ino=4026532651 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4408.687831][ T31] audit: type=1400 audit(4408.550:284): avc: denied { prog_load } for pid=11433 comm="syz.1.3610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4408.688531][ T31] audit: type=1400 audit(4408.550:285): avc: denied { bpf } for pid=11433 comm="syz.1.3610" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4408.689240][ T31] audit: type=1400 audit(4408.550:286): avc: denied { perfmon } for pid=11433 comm="syz.1.3610" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4408.689948][ T31] audit: type=1400 audit(4408.550:287): avc: denied { prog_run } for pid=11433 comm="syz.1.3610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4422.665118][ T31] audit: type=1400 audit(4422.530:288): avc: denied { setopt } for pid=11442 comm="syz.0.3614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4437.663806][ T31] audit: type=1400 audit(4437.530:289): avc: denied { create } for pid=11458 comm="syz.0.3622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4437.841537][ T31] audit: type=1400 audit(4437.700:290): avc: denied { setattr } for pid=11458 comm="syz.0.3622" name="PING" dev="sockfs" ino=24041 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4441.815242][ T31] audit: type=1400 audit(4441.680:291): avc: denied { create } for pid=11468 comm="syz.0.3627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4441.923617][ T31] audit: type=1400 audit(4441.790:292): avc: denied { write } for pid=11468 comm="syz.0.3627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4441.923632][T11470] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11470 comm=syz.0.3627 [ 4480.232848][ T31] audit: type=1400 audit(4480.100:293): avc: denied { write } for pid=11487 comm="syz.1.3638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4480.248887][ T31] audit: type=1400 audit(4480.110:294): avc: denied { connect } for pid=11487 comm="syz.1.3638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4480.273944][ T31] audit: type=1400 audit(4480.140:295): avc: denied { name_connect } for pid=11487 comm="syz.1.3638" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 4482.201945][ T31] audit: type=1400 audit(4482.070:296): avc: denied { ioctl } for pid=11490 comm="syz.1.3640" path="socket:[24088]" dev="sockfs" ino=24088 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4505.072022][ T31] audit: type=1400 audit(4504.930:297): avc: denied { create } for pid=11496 comm="syz.0.3642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4507.541945][ T31] audit: type=1400 audit(4507.410:298): avc: denied { setopt } for pid=11503 comm="syz.0.3646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4521.763233][ T31] audit: type=1400 audit(4521.630:299): avc: denied { write } for pid=11514 comm="syz.1.3652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4533.661702][T10969] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 4551.663114][T11555] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2576 sclass=netlink_route_socket pid=11555 comm=syz.1.3664 [ 4553.262772][T11559] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11559 comm=syz.1.3666 [ 4554.695418][T11562] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11562 comm=syz.1.3668 [ 4563.233107][T11586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11586 comm=syz.1.3680 [ 4565.643772][ T31] audit: type=1400 audit(4565.510:300): avc: denied { write } for pid=11589 comm="syz.0.3682" path="socket:[25177]" dev="sockfs" ino=25177 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4597.802479][ T31] audit: type=1400 audit(4597.670:301): avc: denied { load_policy } for pid=11645 comm="syz.1.3710" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 4597.803145][T11647] SELinux: policydb version 0 does not match my version range 15-33 [ 4597.804440][T11647] SELinux: failed to load policy [ 4599.392988][ T31] audit: type=1400 audit(4599.260:302): avc: denied { create } for pid=11650 comm="syz.1.3712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 4599.408610][ T31] audit: type=1400 audit(4599.270:303): avc: denied { write } for pid=11650 comm="syz.1.3712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 4608.792328][ T31] audit: type=1400 audit(4608.660:304): avc: denied { ioctl } for pid=11675 comm="syz.0.3725" path="socket:[25317]" dev="sockfs" ino=25317 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4653.162503][ T31] audit: type=1400 audit(4653.030:305): avc: denied { read } for pid=11686 comm="syz.1.3731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4665.834675][ T31] audit: type=1400 audit(4665.700:306): avc: denied { read } for pid=11696 comm="syz.0.3736" path="socket:[24420]" dev="sockfs" ino=24420 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4669.035835][ T31] audit: type=1400 audit(4668.900:307): avc: denied { sys_module } for pid=11703 comm="syz.1.3739" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4697.993348][ T31] audit: type=1400 audit(4697.860:308): avc: denied { write } for pid=11735 comm="syz.0.3754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4711.862145][T11748] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11748 comm=syz.0.3760 [ 4714.363286][ T31] audit: type=1400 audit(4714.230:309): avc: denied { ioctl } for pid=11753 comm="syz.1.3763" path="socket:[25420]" dev="sockfs" ino=25420 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4788.502683][ T31] audit: type=1400 audit(4788.370:310): avc: denied { setopt } for pid=11819 comm="syz.1.3799" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4790.766042][T11826] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=11826 comm=syz.0.3801 [ 4793.415286][ T31] audit: type=1400 audit(4793.280:311): avc: denied { create } for pid=11836 comm="syz.0.3807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4793.632771][ T31] audit: type=1400 audit(4793.500:312): avc: denied { ioctl } for pid=11836 comm="syz.0.3807" path="socket:[25525]" dev="sockfs" ino=25525 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4860.663806][ T31] audit: type=1400 audit(4860.530:313): avc: denied { accept } for pid=11897 comm="syz.0.3837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 4872.792021][T11909] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11909 comm=syz.0.3841 [ 4886.288716][ T31] audit: type=1400 audit(4886.150:314): avc: denied { read } for pid=11918 comm="syz.0.3846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 4888.683137][ T31] audit: type=1400 audit(4888.540:315): avc: denied { mounton } for pid=11921 comm="syz.0.3848" path="/1736/file0" dev="tmpfs" ino=8823 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 4888.899363][ T31] audit: type=1400 audit(4888.760:316): avc: denied { mount } for pid=11921 comm="syz.0.3848" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 4888.937418][ T31] audit: type=1400 audit(4888.800:317): avc: denied { unmount } for pid=3355 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 4903.832066][T11936] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11936 comm=syz.0.3854 [ 4916.385480][ T31] audit: type=1400 audit(4916.250:318): avc: denied { create } for pid=11941 comm="syz.1.3857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 4935.914882][T11963] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11963 comm=syz.1.3868 [ 4950.496864][T11974] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11974 comm=syz.1.3872 [ 4962.871489][ T31] audit: type=1400 audit(4962.730:319): avc: denied { create } for pid=11979 comm="syz.0.3876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 4963.223256][ T31] audit: type=1400 audit(4963.090:320): avc: denied { write } for pid=11979 comm="syz.0.3876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 4965.314206][ T31] audit: type=1400 audit(4965.180:321): avc: denied { create } for pid=11984 comm="syz.0.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 4965.383199][ T31] audit: type=1400 audit(4965.250:322): avc: denied { write } for pid=11984 comm="syz.0.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 4965.872946][T11986] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pid=11986 comm=syz.1.3879 [ 5003.661878][T11992] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2305 sclass=netlink_xfrm_socket pid=11992 comm=syz.0.3883 [ 5028.307552][ T31] audit: type=1400 audit(5028.170:323): avc: denied { setopt } for pid=12042 comm="syz.1.3908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 5031.455935][ T31] audit: type=1400 audit(5031.320:324): avc: denied { write } for pid=12047 comm="syz.0.3911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5105.254685][ T31] audit: type=1400 audit(5105.120:325): avc: denied { execmem } for pid=12104 comm="syz.1.3940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5107.612603][ T31] audit: type=1400 audit(5107.480:326): avc: denied { getopt } for pid=12111 comm="syz.0.3943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 5119.792144][T12120] capability: warning: `syz.1.3947' uses deprecated v2 capabilities in a way that may be insecure [ 5151.643901][ T31] audit: type=1400 audit(5151.510:327): avc: denied { read } for pid=12142 comm="syz.1.3959" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5151.674860][ T31] audit: type=1400 audit(5151.540:328): avc: denied { open } for pid=12142 comm="syz.1.3959" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5233.632295][ T31] audit: type=1400 audit(5233.500:329): avc: denied { ioctl } for pid=12207 comm="syz.0.3992" path="socket:[27134]" dev="sockfs" ino=27134 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5262.981453][ T31] audit: type=1400 audit(5262.840:330): avc: denied { create } for pid=12232 comm="syz.0.4006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5263.033559][ T31] audit: type=1400 audit(5262.900:331): avc: denied { setopt } for pid=12232 comm="syz.0.4006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5304.871798][ T31] audit: type=1400 audit(5304.730:332): avc: denied { bind } for pid=12258 comm="syz.1.4020" lport=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5321.367156][ T31] audit: type=1400 audit(5321.230:333): avc: denied { nlmsg_write } for pid=12272 comm="syz.0.4027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5419.065753][ T31] audit: type=1400 audit(5418.930:334): avc: denied { sqpoll } for pid=12361 comm="syz.1.4070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5466.032654][ T31] audit: type=1400 audit(5465.890:335): avc: denied { create } for pid=12387 comm="syz.0.4083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5508.552959][ T31] audit: type=1400 audit(5508.420:336): avc: denied { ioctl } for pid=12415 comm="syz.0.4097" path="socket:[27758]" dev="sockfs" ino=27758 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 5537.924092][ T31] audit: type=1400 audit(5537.790:337): avc: denied { create } for pid=12440 comm="syz.1.4110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 5537.964141][ T31] audit: type=1400 audit(5537.830:338): avc: denied { write } for pid=12440 comm="syz.1.4110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 5573.582667][T12478] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12478 comm=syz.0.4129 [ 5577.012464][ T31] audit: type=1400 audit(5576.880:339): avc: denied { lock } for pid=12485 comm="syz.0.4133" path="/dev/snd/pcmC0D0c" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5592.833477][ T31] audit: type=1400 audit(5592.690:340): avc: denied { write } for pid=12500 comm="syz.1.4141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5641.272110][ T31] audit: type=1400 audit(5641.140:341): avc: denied { accept } for pid=12541 comm="syz.1.4162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5669.592157][ T31] audit: type=1400 audit(5669.460:342): avc: denied { accept } for pid=12567 comm="syz.0.4172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 5673.652740][ T31] audit: type=1400 audit(5673.520:343): avc: denied { setopt } for pid=12577 comm="syz.0.4177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5689.435270][ T31] audit: type=1400 audit(5689.300:344): avc: denied { name_bind } for pid=12609 comm="syz.0.4193" src=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 5689.483358][ T31] audit: type=1400 audit(5689.350:345): avc: denied { node_bind } for pid=12609 comm="syz.0.4193" src=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5692.863662][ T31] audit: type=1400 audit(5692.730:346): avc: denied { create } for pid=12618 comm="syz.0.4198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 5693.052135][T12620] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12620 comm=syz.0.4198 [ 5693.063047][ T31] audit: type=1400 audit(5692.920:347): avc: denied { write } for pid=12618 comm="syz.0.4198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 5696.432181][T12628] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12628 comm=syz.0.4202 [ 5753.104812][ T31] audit: type=1400 audit(5752.970:348): avc: denied { ioctl } for pid=12669 comm="syz.1.4223" path="socket:[28943]" dev="sockfs" ino=28943 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5855.195616][ T31] audit: type=1400 audit(5855.060:349): avc: denied { write } for pid=12761 comm="syz.0.4268" path="socket:[29053]" dev="sockfs" ino=29053 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 5886.306722][ T31] audit: type=1400 audit(5886.170:350): avc: denied { getopt } for pid=12788 comm="syz.0.4282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5931.962251][T12819] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12819 comm=syz.0.4298 [ 5962.392165][T12838] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=125 sclass=netlink_audit_socket pid=12838 comm=syz.0.4308 [ 5962.549683][ T31] audit: type=1400 audit(5962.410:351): avc: denied { write } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5962.550547][ T31] audit: type=1400 audit(5962.410:352): avc: denied { remove_name } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5962.552060][ T31] audit: type=1400 audit(5962.410:353): avc: denied { rename } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5962.552593][ T31] audit: type=1400 audit(5962.410:354): avc: denied { add_name } for pid=2907 comm="syslogd" name="messages.0" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5962.553052][ T31] audit: type=1400 audit(5962.410:355): avc: denied { create } for pid=2907 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5977.811338][ T31] audit: type=1400 audit(5977.670:356): avc: denied { getopt } for pid=12856 comm="syz.1.4314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6002.322318][ T31] audit: type=1400 audit(6002.190:357): avc: denied { setattr } for pid=12871 comm="syz.0.4318" name="NETLINK" dev="sockfs" ino=29240 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6050.583235][ T31] audit: type=1400 audit(6050.450:358): avc: denied { create } for pid=12900 comm="syz.0.4334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 6124.242683][T12953] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12953 comm=syz.1.4360 [ 6139.523818][T12966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=12966 comm=syz.1.4364 [ 6170.854438][ T31] audit: type=1400 audit(6170.720:359): avc: denied { map_create } for pid=12987 comm="syz.1.4375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6170.855470][ T31] audit: type=1400 audit(6170.720:360): avc: denied { map_read map_write } for pid=12987 comm="syz.1.4375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6213.531847][ T31] audit: type=1400 audit(6213.390:361): avc: denied { write } for pid=13012 comm="syz.0.4390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6346.993025][T13137] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13137 comm=syz.0.4454 [ 6360.766120][ T31] audit: type=1400 audit(6360.630:362): avc: denied { setopt } for pid=13146 comm="syz.0.4459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 6373.042037][T13153] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=256 sclass=netlink_audit_socket pid=13153 comm=syz.1.4462 [ 6403.243201][ T31] audit: type=1400 audit(6403.110:363): avc: denied { write } for pid=13173 comm="syz.1.4473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6404.572712][ T31] audit: type=1400 audit(6404.440:364): avc: denied { ioctl } for pid=13175 comm="syz.0.4474" path="socket:[30031]" dev="sockfs" ino=30031 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 6465.702519][T13221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5138 sclass=netlink_route_socket pid=13221 comm=syz.1.4497 [ 6594.333129][T13324] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13324 comm=syz.0.4547 [ 6656.743044][T13382] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=13382 comm=syz.1.4575 [ 6780.615545][ T31] audit: type=1400 audit(6780.480:365): avc: denied { create } for pid=13451 comm="syz.1.4613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6835.701657][ T31] audit: type=1400 audit(6835.560:366): avc: denied { ioctl } for pid=13499 comm="syz.0.4637" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 6895.435028][ T31] audit: type=1400 audit(6895.300:367): avc: denied { read write } for pid=3355 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6895.439233][ T31] audit: type=1400 audit(6895.300:368): avc: denied { open } for pid=3355 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6895.439876][ T31] audit: type=1400 audit(6895.300:369): avc: denied { ioctl } for pid=3355 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6896.996063][ T31] audit: type=1400 audit(6896.860:370): avc: denied { read } for pid=13548 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6899.093634][ T31] audit: type=1400 audit(6898.960:371): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 6899.098463][ T31] audit: type=1400 audit(6898.960:372): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6899.099223][ T31] audit: type=1400 audit(6898.960:373): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6899.100073][ T31] audit: type=1400 audit(6898.960:374): avc: denied { open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6899.111982][ T31] audit: type=1400 audit(6898.960:375): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6899.188061][ T31] audit: type=1400 audit(6899.050:376): avc: denied { module_request } for pid=13552 comm="syz.0.4664" kmod="tcp_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6909.515194][ T31] audit: type=1400 audit(6909.380:377): avc: denied { open } for pid=13556 comm="syz.0.4666" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6909.598700][ T31] audit: type=1400 audit(6909.460:378): avc: denied { setattr } for pid=13556 comm="syz.0.4666" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6909.923270][ T31] audit: type=1400 audit(6909.790:379): avc: denied { ioctl } for pid=13555 comm="syz.1.4665" path="/dev/snd/controlC0" dev="devtmpfs" ino=722 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6913.353898][ T31] audit: type=1400 audit(6913.220:380): avc: denied { append } for pid=13563 comm="syz.0.4670" name="mouse0" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6924.411430][ T31] audit: type=1400 audit(6924.270:381): avc: denied { write } for pid=13568 comm="syz.1.4672" name="dsp1" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6928.833214][ T31] audit: type=1400 audit(6928.700:382): avc: denied { execmem } for pid=13577 comm="syz.1.4676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6939.463934][ T31] audit: type=1400 audit(6939.330:383): avc: denied { create } for pid=13582 comm="syz.0.4679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 6939.694784][ T31] audit: type=1400 audit(6939.560:384): avc: denied { ioctl } for pid=13582 comm="syz.0.4679" path="socket:[31473]" dev="sockfs" ino=31473 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 6942.161923][ T31] audit: type=1400 audit(6942.020:385): avc: denied { create } for pid=13586 comm="syz.0.4681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6942.323919][ T31] audit: type=1400 audit(6942.190:386): avc: denied { ioctl } for pid=13586 comm="syz.0.4681" path="socket:[30703]" dev="sockfs" ino=30703 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6956.041715][ T31] audit: type=1400 audit(6955.900:387): avc: denied { setopt } for pid=13591 comm="syz.0.4685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6959.803628][ T31] audit: type=1400 audit(6959.670:388): avc: denied { create } for pid=13599 comm="syz.0.4688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6959.934655][ T31] audit: type=1400 audit(6959.800:389): avc: denied { setopt } for pid=13599 comm="syz.0.4688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6971.451575][ T31] audit: type=1400 audit(6971.310:390): avc: denied { create } for pid=13602 comm="syz.0.4694" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6971.459270][ T31] audit: type=1400 audit(6971.310:391): avc: denied { map } for pid=13602 comm="syz.0.4694" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=31507 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6971.482093][ T31] audit: type=1400 audit(6971.310:392): avc: denied { read write } for pid=13602 comm="syz.0.4694" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=31507 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6973.783206][ T31] audit: type=1400 audit(6973.650:393): avc: denied { create } for pid=13607 comm="syz.0.4691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6975.365314][ T31] audit: type=1400 audit(6975.230:394): avc: denied { read } for pid=13610 comm="syz.1.4693" dev="nsfs" ino=4026532656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6975.405120][ T31] audit: type=1400 audit(6975.270:395): avc: denied { open } for pid=13610 comm="syz.1.4693" path="net:[4026532656]" dev="nsfs" ino=4026532656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6975.406133][ T31] audit: type=1400 audit(6975.270:396): avc: denied { create } for pid=13610 comm="syz.1.4693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6983.661636][ T31] audit: type=1400 audit(6983.510:397): avc: denied { write } for pid=13613 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6983.691761][ T31] audit: type=1400 audit(6983.540:398): avc: denied { open } for pid=13613 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6983.696499][ T31] audit: type=1400 audit(6983.540:399): avc: denied { getattr } for pid=13613 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6983.697400][ T31] audit: type=1400 audit(6983.540:400): avc: denied { ioctl } for pid=13613 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6985.266925][ T31] audit: type=1400 audit(6985.120:401): avc: denied { search } for pid=13613 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6985.331668][ T31] audit: type=1400 audit(6985.180:402): avc: denied { read } for pid=13614 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6985.332837][ T31] audit: type=1400 audit(6985.190:403): avc: denied { open } for pid=13614 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6985.333532][ T31] audit: type=1400 audit(6985.190:404): avc: denied { getattr } for pid=13614 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6985.401685][ T31] audit: type=1400 audit(6985.260:405): avc: denied { write } for pid=13613 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6985.425941][ T31] audit: type=1400 audit(6985.290:406): avc: denied { add_name } for pid=13613 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7004.012864][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 7004.012979][ T31] audit: type=1400 audit(7003.880:414): avc: denied { create } for pid=13632 comm="syz.1.4703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7004.133977][ T31] audit: type=1400 audit(7004.000:415): avc: denied { getopt } for pid=13632 comm="syz.1.4703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7031.063375][ T31] audit: type=1400 audit(7030.930:416): avc: denied { read } for pid=13649 comm="syz.1.4712" name="binder1" dev="binder" ino=22 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 7031.067007][ T31] audit: type=1400 audit(7030.930:417): avc: denied { open } for pid=13649 comm="syz.1.4712" path="/dev/binderfs/binder1" dev="binder" ino=22 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 7031.203845][ T31] audit: type=1400 audit(7031.070:418): avc: denied { ioctl } for pid=13649 comm="syz.1.4712" path="/dev/binderfs/binder1" dev="binder" ino=22 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 7046.124220][ T31] audit: type=1400 audit(7045.990:419): avc: denied { write } for pid=13659 comm="syz.0.4717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7048.232524][ T31] audit: type=1400 audit(7048.100:420): avc: denied { setopt } for pid=13664 comm="syz.0.4719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7073.383902][ T31] audit: type=1400 audit(7073.250:421): avc: denied { create } for pid=13673 comm="syz.1.4726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7073.551750][ T31] audit: type=1400 audit(7073.410:422): avc: denied { write } for pid=13673 comm="syz.1.4726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7075.901712][ T31] audit: type=1400 audit(7075.760:423): avc: denied { lock } for pid=13678 comm="syz.1.4728" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7086.615063][ T31] audit: type=1400 audit(7086.480:424): avc: denied { create } for pid=13681 comm="syz.1.4730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 7086.873805][ T31] audit: type=1400 audit(7086.740:425): avc: denied { connect } for pid=13681 comm="syz.1.4730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 7102.603734][ T31] audit: type=1400 audit(7102.470:426): avc: denied { ioctl } for pid=13693 comm="syz.0.4736" path="socket:[31662]" dev="sockfs" ino=31662 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7103.379428][ T31] audit: type=1400 audit(7103.230:427): avc: denied { create } for pid=13695 comm="syz.1.4735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 7103.645045][ T31] audit: type=1400 audit(7103.510:428): avc: denied { read } for pid=13695 comm="syz.1.4735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 7118.423733][ T31] audit: type=1400 audit(7118.290:429): avc: denied { nlmsg_read } for pid=13704 comm="syz.0.4741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 7131.323909][ T31] audit: type=1400 audit(7131.190:430): avc: denied { write } for pid=13710 comm="syz.1.4744" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 7146.394309][ T31] audit: type=1400 audit(7146.260:431): avc: denied { create } for pid=13722 comm="syz.0.4750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 7146.471959][ T31] audit: type=1400 audit(7146.330:432): avc: denied { ioctl } for pid=13722 comm="syz.0.4750" path="socket:[31955]" dev="sockfs" ino=31955 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 7148.096804][ T31] audit: type=1400 audit(7147.960:433): avc: denied { create } for pid=13724 comm="syz.1.4751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 7148.233257][ T31] audit: type=1400 audit(7148.100:434): avc: denied { lock } for pid=13724 comm="syz.1.4751" path="socket:[31960]" dev="sockfs" ino=31960 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 7161.354440][ T31] audit: type=1400 audit(7161.220:435): avc: denied { create } for pid=13732 comm="syz.0.4755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 7161.433762][ T31] audit: type=1400 audit(7161.300:436): avc: denied { ioctl } for pid=13732 comm="syz.0.4755" path="socket:[31970]" dev="sockfs" ino=31970 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 7196.521932][ T31] audit: type=1400 audit(7196.380:437): avc: denied { create } for pid=13760 comm="syz.1.4770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 7196.784734][ T31] audit: type=1400 audit(7196.650:438): avc: denied { create } for pid=13761 comm="syz.0.4771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7270.031767][ T31] audit: type=1400 audit(7269.890:439): avc: denied { write } for pid=13808 comm="syz.0.4795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7270.917609][T13811] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13811 comm=syz.1.4796 [ 7299.924125][ T31] audit: type=1400 audit(7299.790:440): avc: denied { write } for pid=13838 comm="syz.0.4808" name="sockstat6" dev="proc" ino=4026532804 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 7330.422839][ T31] audit: type=1400 audit(7330.290:441): avc: denied { ioctl } for pid=13865 comm="syz.0.4822" path="socket:[32188]" dev="sockfs" ino=32188 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 7343.022092][T13874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13874 comm=syz.1.4825 [ 7345.687510][ T31] audit: type=1400 audit(7345.550:442): avc: denied { mac_admin } for pid=13876 comm="syz.1.4828" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7345.762604][T13878] SELinux: Context system_u:object_r:hald_cache_t:s0 is not valid (left unmapped). [ 7345.763796][ T31] audit: type=1400 audit(7345.630:443): avc: denied { relabelto } for pid=13876 comm="syz.1.4828" name="rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hald_cache_t:s0" [ 7345.765738][ T31] audit: type=1400 audit(7345.630:444): avc: denied { associate } for pid=13876 comm="syz.1.4828" name="rtc0" dev="devtmpfs" ino=699 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:hald_cache_t:s0" [ 7356.971328][ T31] audit: type=1400 audit(7356.830:445): avc: denied { ioctl } for pid=13879 comm="syz.0.4829" path="net:[4026532749]" dev="nsfs" ino=4026532749 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7361.184353][ T31] audit: type=1400 audit(7361.050:446): avc: denied { create } for pid=13887 comm="syz.1.4834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 7405.321853][T13927] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13927 comm=syz.0.4852 [ 7432.939409][ T31] audit: type=1400 audit(7432.800:447): avc: denied { getopt } for pid=13947 comm="syz.0.4863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 7467.265561][ T31] audit: type=1400 audit(7467.130:448): avc: denied { write } for pid=13973 comm="syz.0.4877" name="net" dev="proc" ino=32343 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 7467.325116][ T31] audit: type=1400 audit(7467.190:449): avc: denied { add_name } for pid=13973 comm="syz.0.4877" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 7467.325855][ T31] audit: type=1400 audit(7467.190:450): avc: denied { create } for pid=13973 comm="syz.0.4877" name="pfkey" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=file permissive=1 [ 7467.326458][ T31] audit: type=1400 audit(7467.190:451): avc: denied { associate } for pid=13973 comm="syz.0.4877" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 7506.892906][ T31] audit: type=1400 audit(7506.760:452): avc: denied { ioctl } for pid=13995 comm="syz.0.4885" path="socket:[33237]" dev="sockfs" ino=33237 ioctlcmd=0x8953 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7553.942082][T14037] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5131 sclass=netlink_route_socket pid=14037 comm=syz.1.4907 [ 7580.582562][T14050] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14050 comm=syz.0.4914 [ 7598.376436][ T31] audit: type=1400 audit(7598.240:453): avc: denied { write } for pid=14064 comm="syz.0.4922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 7598.377448][T14066] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=771 sclass=netlink_tcpdiag_socket pid=14066 comm=syz.0.4922 [ 7610.588030][ T31] audit: type=1400 audit(7610.450:454): avc: denied { ioctl } for pid=14071 comm="syz.1.4925" path="socket:[32470]" dev="sockfs" ino=32470 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7613.183947][ T31] audit: type=1400 audit(7613.050:455): avc: denied { create } for pid=14076 comm="syz.0.4928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7613.323399][ T31] audit: type=1400 audit(7613.190:456): avc: denied { ioctl } for pid=14076 comm="syz.0.4928" path="socket:[32471]" dev="sockfs" ino=32471 ioctlcmd=0x8923 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7625.826502][ T31] audit: type=1400 audit(7625.690:457): avc: denied { write } for pid=14083 comm="syz.0.4931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 7626.835173][ T31] audit: type=1400 audit(7626.700:458): avc: denied { create } for pid=14085 comm="syz.1.4932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 7626.992784][ T31] audit: type=1400 audit(7626.860:459): avc: denied { write } for pid=14085 comm="syz.1.4932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 7643.212074][ T31] audit: type=1400 audit(7643.070:460): avc: denied { ioctl } for pid=14096 comm="syz.0.4938" path="socket:[33448]" dev="sockfs" ino=33448 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7670.893994][ T31] audit: type=1400 audit(7670.760:461): avc: denied { create } for pid=14138 comm="syz.1.4960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 7702.100348][ T31] audit: type=1400 audit(7701.960:462): avc: denied { sys_module } for pid=14151 comm="syz.1.4966" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7707.131564][ T31] audit: type=1400 audit(7706.990:463): avc: denied { ioctl } for pid=14163 comm="syz.0.4971" path="socket:[32614]" dev="sockfs" ino=32614 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7711.745490][ T31] audit: type=1400 audit(7711.610:464): avc: denied { create } for pid=14176 comm="syz.0.4977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 7711.863110][ T31] audit: type=1400 audit(7711.730:465): avc: denied { write } for pid=14176 comm="syz.0.4977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 7713.443573][ T31] audit: type=1400 audit(7713.310:466): avc: denied { write } for pid=14178 comm="syz.1.4978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 7714.791875][T14184] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2305 sclass=netlink_tcpdiag_socket pid=14184 comm=syz.0.4981 [ 7716.601493][ T31] audit: type=1400 audit(7716.460:467): avc: denied { nlmsg_write } for pid=14186 comm="syz.0.4982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 7721.504032][T14199] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14199 comm=syz.0.4988 [ 7726.233159][ T31] audit: type=1400 audit(7726.100:468): avc: denied { prog_load } for pid=14209 comm="syz.1.4994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7726.333248][ T31] audit: type=1400 audit(7726.200:469): avc: denied { bpf } for pid=14209 comm="syz.1.4994" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7726.335414][ T31] audit: type=1400 audit(7726.200:470): avc: denied { perfmon } for pid=14209 comm="syz.1.4994" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7726.775259][ T31] audit: type=1400 audit(7726.640:471): avc: denied { prog_run } for pid=14209 comm="syz.1.4994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7784.592443][ T31] audit: type=1400 audit(7784.460:472): avc: denied { write } for pid=14223 comm="syz.0.5000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 7800.754094][T14239] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14239 comm=syz.0.5007 [ 7949.952971][ T31] audit: type=1400 audit(7949.820:473): avc: denied { map_create } for pid=14338 comm="syz.0.5063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7949.960194][ T31] audit: type=1400 audit(7949.820:474): avc: denied { map_read map_write } for pid=14338 comm="syz.0.5063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7995.101916][ T31] audit: type=1400 audit(7994.960:475): avc: denied { connect } for pid=14377 comm="syz.0.5080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7995.103564][ T31] audit: type=1400 audit(7994.970:476): avc: denied { name_connect } for pid=14377 comm="syz.0.5080" dest=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 8025.815178][ T31] audit: type=1400 audit(8025.680:477): avc: denied { write } for pid=14400 comm="syz.1.5091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 8025.817132][ T31] audit: type=1400 audit(8025.680:478): avc: denied { execute } for pid=14401 comm="syz.0.5092" path="/2380/blkio.throttle.io_serviced_recursive" dev="tmpfs" ino=12083 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 8042.703293][T14414] netlink: 'syz.1.5098': attribute type 13 has an invalid length. [ 8062.462964][T14423] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14423 comm=syz.0.5102 [ 8095.687364][ T31] audit: type=1400 audit(8095.550:479): avc: denied { write } for pid=14448 comm="syz.0.5114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 8139.462488][T14507] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=14507 comm=syz.0.5142 [ 8158.633477][ T31] audit: type=1400 audit(8158.490:480): avc: denied { connect } for pid=14523 comm="syz.0.5151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8200.121399][ T31] audit: type=1400 audit(8199.980:481): avc: denied { mounton } for pid=14556 comm="syz.1.5169" path="/2626/file0" dev="tmpfs" ino=13313 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 8200.410350][ T31] audit: type=1400 audit(8200.270:482): avc: denied { unmount } for pid=3359 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 8211.103001][ T31] audit: type=1400 audit(8210.970:483): avc: denied { setopt } for pid=14577 comm="syz.1.5179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 8257.273033][ T31] audit: type=1400 audit(8257.140:484): avc: denied { create } for pid=14610 comm="syz.0.5197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 8259.841587][ T31] audit: type=1400 audit(8259.700:485): avc: denied { ioctl } for pid=14614 comm="syz.1.5198" path="socket:[34380]" dev="sockfs" ino=34380 ioctlcmd=0x8954 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 8261.612583][ T31] audit: type=1400 audit(8261.480:486): avc: denied { write } for pid=14618 comm="syz.1.5201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8304.568200][ T31] audit: type=1400 audit(8304.430:487): avc: denied { setopt } for pid=14646 comm="syz.1.5214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 8347.153177][ T31] audit: type=1400 audit(8347.010:488): avc: denied { read } for pid=14672 comm="syz.0.5226" path="socket:[35423]" dev="sockfs" ino=35423 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 8397.963451][ T31] audit: type=1400 audit(8397.830:489): avc: denied { getopt } for pid=14712 comm="syz.0.5248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 8441.922066][T14739] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14739 comm=syz.0.5261 [ 8456.473950][ T31] audit: type=1400 audit(8456.340:490): avc: denied { read } for pid=14746 comm="syz.0.5264" name="rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hald_cache_t:s0" [ 8456.475547][ T31] audit: type=1400 audit(8456.340:491): avc: denied { open } for pid=14746 comm="syz.0.5264" path="/dev/rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hald_cache_t:s0" [ 8456.487189][ T31] audit: type=1400 audit(8456.350:492): avc: denied { ioctl } for pid=14746 comm="syz.0.5264" path="/dev/rtc0" dev="devtmpfs" ino=699 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:hald_cache_t:s0" [ 8469.433054][ T31] audit: type=1400 audit(8469.300:493): avc: denied { create } for pid=14755 comm="syz.0.5270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 8469.558384][ T31] audit: type=1400 audit(8469.420:494): avc: denied { getopt } for pid=14755 comm="syz.0.5270" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 8485.954809][ T31] audit: type=1400 audit(8485.820:495): avc: denied { create } for pid=14768 comm="syz.0.5276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 8486.074636][ T31] audit: type=1400 audit(8485.940:496): avc: denied { write } for pid=14768 comm="syz.0.5276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 8517.941992][ T31] audit: type=1400 audit(8517.800:497): avc: denied { name_connect } for pid=14798 comm="syz.1.5290" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 8518.053909][ T31] audit: type=1400 audit(8517.920:498): avc: denied { getopt } for pid=14797 comm="syz.0.5291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 8548.705256][T14820] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2 sclass=netlink_audit_socket pid=14820 comm=syz.1.5300 [ 8618.379479][ T31] audit: type=1400 audit(8618.240:499): avc: denied { setopt } for pid=14854 comm="syz.0.5317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 8660.992196][T14885] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14885 comm=syz.1.5332 [ 8667.285359][ T31] audit: type=1400 audit(8667.150:500): avc: denied { create } for pid=14897 comm="syz.0.5340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 8683.072984][ T31] audit: type=1400 audit(8682.940:501): avc: denied { ioctl } for pid=14926 comm="syz.1.5355" path="socket:[35966]" dev="sockfs" ino=35966 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 8707.285804][T14971] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14971 comm=syz.1.5376 [ 8712.173710][ T31] audit: type=1400 audit(8712.040:502): avc: denied { getopt } for pid=14980 comm="syz.0.5381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 8713.482516][ T31] audit: type=1400 audit(8713.340:503): avc: denied { setopt } for pid=14982 comm="syz.1.5382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 8714.047862][ T31] audit: type=1400 audit(8713.910:504): avc: denied { getopt } for pid=14983 comm="syz.0.5383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 8718.224779][ T31] audit: type=1400 audit(8718.090:505): avc: denied { map } for pid=14992 comm="syz.1.5387" path="socket:[36098]" dev="sockfs" ino=36098 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 8725.506495][ T31] audit: type=1400 audit(8725.370:506): avc: denied { mounton } for pid=15004 comm="syz.0.5393" path="/2536/file0" dev="tmpfs" ino=12879 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 8725.532573][ T31] audit: type=1400 audit(8725.370:507): avc: denied { mount } for pid=15004 comm="syz.0.5393" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 8729.464209][ T31] audit: type=1400 audit(8729.330:508): avc: denied { getopt } for pid=15012 comm="syz.0.5397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 8749.641896][ T31] audit: type=1400 audit(8749.500:509): avc: denied { setattr } for pid=15032 comm="syz.1.5407" name="CAN_J1939" dev="sockfs" ino=36168 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 8795.432842][ T31] audit: type=1400 audit(8795.300:510): avc: denied { ioctl } for pid=15065 comm="syz.0.5424" path="socket:[36240]" dev="sockfs" ino=36240 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 8855.315720][ T31] audit: type=1400 audit(8855.180:511): avc: denied { setopt } for pid=15105 comm="syz.1.5443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 8915.393383][ T31] audit: type=1400 audit(8915.260:512): avc: denied { setopt } for pid=15150 comm="syz.1.5467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 8973.254415][ T31] audit: type=1400 audit(8973.120:513): avc: denied { setattr } for pid=15185 comm="syz.1.5485" name="RAWv6" dev="sockfs" ino=36445 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9023.373782][ T31] audit: type=1400 audit(9023.240:514): avc: denied { execute } for pid=15197 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 9023.380335][ T31] audit: type=1400 audit(9023.240:515): avc: denied { execute_no_trans } for pid=15197 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 9023.475992][ T31] audit: type=1400 audit(9023.340:516): avc: denied { mounton } for pid=15202 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 9023.663339][ T2941] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9023.865258][ T2941] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9023.943704][ T2941] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9024.043530][ T2941] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9024.328842][ T2941] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9024.348379][ T2941] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9024.362812][ T2941] bond0 (unregistering): Released all slaves [ 9024.444013][ T2941] hsr_slave_0: left promiscuous mode [ 9024.447752][ T2941] hsr_slave_1: left promiscuous mode [ 9024.473835][ T2941] veth1_macvtap: left promiscuous mode [ 9024.474603][ T2941] veth0_macvtap: left promiscuous mode [ 9024.475133][ T2941] veth1_vlan: left promiscuous mode [ 9024.475589][ T2941] veth0_vlan: left promiscuous mode [ 9025.348955][ T2941] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9025.425116][ T2941] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9025.515895][ T2941] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9025.595156][ T2941] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 9026.126334][ T2941] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 9026.139384][ T2941] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 9026.150266][ T2941] bond0 (unregistering): Released all slaves [ 9026.316765][ T2941] hsr_slave_0: left promiscuous mode [ 9026.342615][ T2941] hsr_slave_1: left promiscuous mode [ 9026.350567][ T2941] veth1_macvtap: left promiscuous mode [ 9026.372133][ T2941] veth0_macvtap: left promiscuous mode [ 9026.373330][ T2941] veth1_vlan: left promiscuous mode [ 9026.373910][ T2941] veth0_vlan: left promiscuous mode [ 9038.516514][T15204] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 9038.526131][T15202] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 9038.546968][T15202] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 9038.583311][T15204] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 9040.073631][T15204] hsr_slave_0: entered promiscuous mode [ 9040.084144][T15204] hsr_slave_1: entered promiscuous mode [ 9040.217683][T15202] hsr_slave_0: entered promiscuous mode [ 9040.219721][T15202] hsr_slave_1: entered promiscuous mode [ 9040.222623][T15202] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 9040.223119][T15202] Cannot create hsr debugfs directory [ 9040.688185][ T31] audit: type=1400 audit(9040.550:517): avc: denied { read } for pid=15204 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9040.698153][T15204] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 9040.716106][T15204] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 9040.740756][T15204] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 9040.759538][T15204] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 9040.859598][T15202] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 9040.874915][T15202] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 9040.889998][T15202] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 9040.908745][T15202] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 9042.120775][T15204] 8021q: adding VLAN 0 to HW filter on device bond0 [ 9042.445977][T15202] 8021q: adding VLAN 0 to HW filter on device bond0 [ 9047.197716][T15204] veth0_vlan: entered promiscuous mode [ 9047.216219][T15204] veth1_vlan: entered promiscuous mode [ 9047.278014][T15204] veth0_macvtap: entered promiscuous mode [ 9047.289693][T15204] veth1_macvtap: entered promiscuous mode [ 9047.357838][T15204] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 9047.359082][T15204] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 9047.359485][T15204] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 9047.359872][T15204] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 9047.508126][ T31] audit: type=1400 audit(9047.360:518): avc: denied { mounton } for pid=15204 comm="syz-executor" path="/syzkaller.0Vt00o/syz-tmp" dev="vda" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 9047.517671][ T31] audit: type=1400 audit(9047.380:519): avc: denied { mount } for pid=15204 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 9047.531703][ T31] audit: type=1400 audit(9047.390:520): avc: denied { mounton } for pid=15204 comm="syz-executor" path="/syzkaller.0Vt00o/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 9047.534460][ T31] audit: type=1400 audit(9047.400:521): avc: denied { mounton } for pid=15204 comm="syz-executor" path="/syzkaller.0Vt00o/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=38086 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 9047.543013][ T31] audit: type=1400 audit(9047.400:522): avc: denied { unmount } for pid=15204 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 9047.566722][ T31] audit: type=1400 audit(9047.430:523): avc: denied { mounton } for pid=15204 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=764 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 9047.570452][ T31] audit: type=1400 audit(9047.430:524): avc: denied { mount } for pid=15204 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 9047.590852][ T31] audit: type=1400 audit(9047.450:525): avc: denied { mounton } for pid=15204 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 9047.609117][ T31] audit: type=1400 audit(9047.450:526): avc: denied { mount } for pid=15204 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 9048.268967][T15202] veth0_vlan: entered promiscuous mode [ 9048.299028][T15202] veth1_vlan: entered promiscuous mode [ 9048.405967][T15202] veth0_macvtap: entered promiscuous mode [ 9048.417470][T15202] veth1_macvtap: entered promiscuous mode [ 9048.432916][T15982] SELinux: Context system_u:object_r:clock_device_t:s0 is not valid (left unmapped). [ 9048.435036][ T31] audit: type=1400 audit(9048.300:527): avc: denied { relabelto } for pid=15981 comm="syz.3.5497" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:clock_device_t:s0" [ 9048.544127][T15202] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 9048.544885][T15202] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 9048.545362][T15202] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 9048.562121][T15202] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 9049.279983][T15998] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15998 comm=syz.2.5503 [ 9049.679570][T16009] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16009 comm=syz.2.5509 [ 9051.325556][T16059] SELinux: Context system_u:object_r:hald_mac_exec_t:s0 is not valid (left unmapped). [ 9065.169403][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 9065.169522][ T31] audit: type=1400 audit(9065.030:537): avc: denied { setattr } for pid=16173 comm="syz.3.5575" name="[userfaultfd]" dev="anon_inodefs" ino=38445 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9065.499575][T16184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2816 sclass=netlink_route_socket pid=16184 comm=syz.2.5578 [ 9067.329216][T16242] random: crng reseeded on system resumption [ 9067.933578][T16259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=16259 comm=syz.3.5611 [ 9068.117266][ T31] audit: type=1400 audit(9067.980:538): avc: denied { getopt } for pid=16263 comm="syz.3.5614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9068.732774][ T31] audit: type=1400 audit(9068.590:539): avc: denied { getopt } for pid=16273 comm="syz.2.5618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 9075.058676][ C1] hrtimer: interrupt took 107969936 ns [ 9078.818691][ T31] audit: type=1400 audit(9078.680:540): avc: denied { map } for pid=16278 comm="syz.3.5619" path="/dev/usbmon0" dev="devtmpfs" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9079.010111][T16284] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16284 comm=syz.2.5622 [ 9079.968982][ T31] audit: type=1400 audit(9079.830:541): avc: granted { setsecparam } for pid=16306 comm="syz.2.5632" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 9080.355190][ T31] audit: type=1400 audit(9080.210:542): avc: denied { getattr } for pid=16315 comm="syz.3.5635" name="[io_uring]" dev="anon_inodefs" ino=38676 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 9080.377223][ T31] audit: type=1400 audit(9080.240:543): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9080.380669][ T31] audit: type=1400 audit(9080.240:544): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9080.393384][ T31] audit: type=1400 audit(9080.260:545): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9080.395972][ T31] audit: type=1400 audit(9080.260:546): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9080.399745][ T31] audit: type=1400 audit(9080.260:547): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9080.798935][ T31] audit: type=1400 audit(9080.660:548): avc: denied { create } for pid=16322 comm="syz.3.5638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 9080.815865][ T31] audit: type=1400 audit(9080.680:549): avc: denied { write } for pid=16322 comm="syz.3.5638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 9094.042434][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 9094.042577][ T31] audit: type=1400 audit(9093.900:594): avc: denied { read } for pid=16356 comm="syz.2.5649" name="midiC2D0" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9094.046285][ T31] audit: type=1400 audit(9093.910:595): avc: denied { read open } for pid=16356 comm="syz.2.5649" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9094.102322][ T31] audit: type=1400 audit(9093.960:596): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9094.143381][ T31] audit: type=1400 audit(9093.990:597): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9094.166077][ T31] audit: type=1400 audit(9094.030:598): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9094.192740][ T31] audit: type=1400 audit(9094.050:599): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9094.241932][ T31] audit: type=1400 audit(9094.100:600): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9094.264140][ T31] audit: type=1400 audit(9094.130:601): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9094.270766][ T31] audit: type=1400 audit(9094.130:602): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9094.312073][ T31] audit: type=1400 audit(9094.160:603): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9096.253452][T16376] mmap: syz.2.5658 (16376) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 9109.328709][ T31] kauditd_printk_skb: 263 callbacks suppressed [ 9109.328843][ T31] audit: type=1400 audit(9109.190:867): avc: denied { search } for pid=16398 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9109.345257][ T31] audit: type=1400 audit(9109.210:868): avc: denied { search } for pid=16398 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9109.349942][ T31] audit: type=1400 audit(9109.210:869): avc: denied { search } for pid=16398 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9109.372986][ T31] audit: type=1400 audit(9109.230:870): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9109.374575][ T31] audit: type=1400 audit(9109.230:871): avc: denied { getattr } for pid=16398 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth3.ipv4ll" dev="tmpfs" ino=66 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9109.401859][ T31] audit: type=1400 audit(9109.260:872): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9109.403220][ T31] audit: type=1400 audit(9109.260:873): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9109.404011][ T31] audit: type=1400 audit(9109.260:874): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9109.422428][ T31] audit: type=1400 audit(9109.280:875): avc: denied { search } for pid=16398 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9109.423474][ T31] audit: type=1400 audit(9109.280:876): avc: denied { search } for pid=16398 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9109.599372][T16410] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16410 comm=syz.2.5674 [ 9124.125968][ T31] kauditd_printk_skb: 248 callbacks suppressed [ 9124.126111][ T31] audit: type=1400 audit(9123.990:1125): avc: denied { create } for pid=16460 comm="syz.3.5693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 9124.156524][ T31] audit: type=1400 audit(9124.020:1127): avc: denied { write } for pid=16460 comm="syz.3.5693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 9124.194854][ T31] audit: type=1400 audit(9124.010:1126): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9124.195985][ T31] audit: type=1400 audit(9124.040:1128): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9124.209925][ T31] audit: type=1400 audit(9124.070:1129): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9124.213121][ T31] audit: type=1400 audit(9124.070:1130): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9124.264367][ T31] audit: type=1400 audit(9124.070:1131): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9124.716566][ T31] audit: type=1400 audit(9124.580:1132): avc: denied { search } for pid=16458 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9124.718984][ T31] audit: type=1400 audit(9124.580:1133): avc: denied { read } for pid=16458 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9124.736772][ T31] audit: type=1400 audit(9124.600:1134): avc: denied { read open } for pid=16458 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9139.098412][ T31] kauditd_printk_skb: 100 callbacks suppressed [ 9139.098543][ T31] audit: type=1400 audit(9138.960:1235): avc: denied { read } for pid=16500 comm="syz.2.5710" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:clock_device_t:s0" [ 9139.124284][ T31] audit: type=1400 audit(9138.990:1236): avc: denied { read open } for pid=16500 comm="syz.2.5710" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:clock_device_t:s0" [ 9139.127517][ T31] audit: type=1400 audit(9138.990:1237): avc: denied { search } for pid=16498 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9139.141977][ T31] audit: type=1400 audit(9138.990:1238): avc: denied { search } for pid=16498 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9139.142976][ T31] audit: type=1400 audit(9139.000:1239): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9139.143675][ T31] audit: type=1400 audit(9139.000:1240): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9139.144344][ T31] audit: type=1400 audit(9139.010:1241): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9139.172266][ T31] audit: type=1400 audit(9139.010:1242): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9139.173570][ T31] audit: type=1400 audit(9139.010:1243): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9139.174502][ T31] audit: type=1400 audit(9139.020:1244): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9141.739846][T16527] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16527 comm=syz.2.5722 [ 9175.234145][ T31] kauditd_printk_skb: 206 callbacks suppressed [ 9175.234296][ T31] audit: type=1400 audit(9175.100:1451): avc: denied { search } for pid=16514 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9175.263004][ T31] audit: type=1400 audit(9175.110:1452): avc: denied { read } for pid=16514 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9175.263987][ T31] audit: type=1400 audit(9175.110:1453): avc: denied { read open } for pid=16514 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9175.267414][ T31] audit: type=1400 audit(9175.130:1454): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9175.268987][ T31] audit: type=1400 audit(9175.130:1455): avc: denied { search } for pid=16514 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9175.270053][ T31] audit: type=1400 audit(9175.130:1456): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9175.278009][ T31] audit: type=1400 audit(9175.140:1457): avc: denied { search } for pid=16514 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9175.292658][ T31] audit: type=1400 audit(9175.150:1458): avc: denied { search } for pid=16514 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9175.297988][ T31] audit: type=1400 audit(9175.150:1459): avc: denied { read } for pid=16514 comm="cmp" name="resolv.conf.eth7.ipv4ll" dev="tmpfs" ino=68 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9175.299372][ T31] audit: type=1400 audit(9175.150:1460): avc: denied { read open } for pid=16514 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth7.ipv4ll" dev="tmpfs" ino=68 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9179.629042][T16594] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=16594 comm=syz.3.5755 [ 9195.052271][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 9195.052382][ T31] audit: type=1400 audit(9194.910:1501): avc: denied { read } for pid=16596 comm="syz.3.5758" dev="nsfs" ino=4026532666 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9195.058976][ T31] audit: type=1400 audit(9194.920:1502): avc: denied { read open } for pid=16596 comm="syz.3.5758" path="net:[4026532666]" dev="nsfs" ino=4026532666 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9195.081791][ T31] audit: type=1400 audit(9194.940:1503): avc: denied { create } for pid=16596 comm="syz.3.5758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9195.102030][ T31] audit: type=1400 audit(9194.960:1504): avc: denied { write } for pid=16596 comm="syz.3.5758" path="socket:[40062]" dev="sockfs" ino=40062 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9195.105896][ T31] audit: type=1400 audit(9194.970:1505): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9195.112947][ T31] audit: type=1400 audit(9194.970:1506): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9195.123729][ T31] audit: type=1400 audit(9194.980:1507): avc: denied { write } for pid=16596 comm="syz.3.5758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9195.137939][ T31] audit: type=1400 audit(9195.000:1508): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9195.139066][ T31] audit: type=1400 audit(9195.000:1509): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9195.139763][ T31] audit: type=1400 audit(9195.000:1510): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9209.745118][ T31] kauditd_printk_skb: 215 callbacks suppressed [ 9209.745241][ T31] audit: type=1400 audit(9209.610:1726): avc: denied { search } for pid=16619 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9209.748460][ T31] audit: type=1400 audit(9209.610:1727): avc: denied { search } for pid=16619 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9209.762049][ T31] audit: type=1400 audit(9209.610:1728): avc: denied { search } for pid=16619 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9209.770141][ T31] audit: type=1400 audit(9209.630:1729): avc: denied { search } for pid=16619 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9209.781578][ T31] audit: type=1400 audit(9209.640:1730): avc: denied { search } for pid=16619 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9209.782574][ T31] audit: type=1400 audit(9209.640:1731): avc: denied { search } for pid=16619 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9209.783154][ T31] audit: type=1400 audit(9209.640:1732): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9209.783884][ T31] audit: type=1400 audit(9209.640:1733): avc: denied { getattr } for pid=16619 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9209.805478][ T31] audit: type=1400 audit(9209.660:1734): avc: denied { search } for pid=16619 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9209.806383][ T31] audit: type=1400 audit(9209.660:1735): avc: denied { search } for pid=16619 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9219.995964][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 9219.996092][ T31] audit: type=1400 audit(9219.860:1798): avc: denied { create } for pid=16686 comm="syz.3.5799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9220.015872][ T31] audit: type=1400 audit(9219.880:1799): avc: denied { write } for pid=16686 comm="syz.3.5799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9220.291736][ T31] audit: type=1400 audit(9220.150:1800): avc: denied { create } for pid=16691 comm="syz.2.5802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9220.938796][ T31] audit: type=1400 audit(9220.800:1801): avc: denied { create } for pid=16698 comm="syz.2.5805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 9221.124811][ T31] audit: type=1400 audit(9220.990:1802): avc: denied { read } for pid=16700 comm="syz.3.5806" name="adsp1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9221.130449][ T31] audit: type=1400 audit(9220.990:1803): avc: denied { read open } for pid=16700 comm="syz.3.5806" path="/dev/adsp1" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9221.774478][ T31] audit: type=1400 audit(9221.640:1804): avc: denied { read } for pid=16709 comm="syz.2.5810" name="mixer" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9221.776751][ T31] audit: type=1400 audit(9221.640:1805): avc: denied { read open } for pid=16709 comm="syz.2.5810" path="/dev/mixer" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9221.791875][ T31] audit: type=1400 audit(9221.650:1806): avc: denied { ioctl } for pid=16709 comm="syz.2.5810" path="/dev/mixer" dev="devtmpfs" ino=723 ioctlcmd=0x4d76 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9222.195223][ T31] audit: type=1400 audit(9222.060:1807): avc: denied { create } for pid=16714 comm="syz.2.5812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 9225.402640][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 9225.402750][ T31] audit: type=1400 audit(9225.270:1826): avc: denied { create } for pid=16755 comm="syz.2.5833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 9225.409750][ T31] audit: type=1400 audit(9225.270:1827): avc: denied { ioctl } for pid=16755 comm="syz.2.5833" path="socket:[40328]" dev="sockfs" ino=40328 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 9225.723359][ T31] audit: type=1400 audit(9225.590:1828): avc: denied { create } for pid=16760 comm="syz.3.5836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9225.743435][ T31] audit: type=1400 audit(9225.610:1829): avc: denied { write } for pid=16760 comm="syz.3.5836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 9226.044887][ T31] audit: type=1400 audit(9225.910:1830): avc: denied { create } for pid=16763 comm="syz.2.5837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 9226.056602][ T31] audit: type=1400 audit(9225.920:1831): avc: denied { getopt } for pid=16763 comm="syz.2.5837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 9226.340159][ T31] audit: type=1400 audit(9226.200:1832): avc: denied { create } for pid=16768 comm="syz.3.5839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9226.345352][ T31] audit: type=1400 audit(9226.210:1833): avc: denied { read write } for pid=16767 comm="syz.2.5840" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9226.352254][ T31] audit: type=1400 audit(9226.220:1834): avc: denied { write } for pid=16768 comm="syz.3.5839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9226.352981][ T31] audit: type=1400 audit(9226.220:1835): avc: denied { read write open } for pid=16767 comm="syz.2.5840" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9227.856678][T16791] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16791 comm=syz.3.5850 [ 9230.778200][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 9230.778338][ T31] audit: type=1400 audit(9230.640:1875): avc: denied { search } for pid=16633 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9230.784114][ T31] audit: type=1400 audit(9230.640:1876): avc: denied { read } for pid=16633 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9230.784960][ T31] audit: type=1400 audit(9230.650:1877): avc: denied { read open } for pid=16633 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9230.811403][ T31] audit: type=1400 audit(9230.670:1878): avc: denied { search } for pid=16633 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9230.814618][ T31] audit: type=1400 audit(9230.670:1879): avc: denied { search } for pid=16633 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9230.815195][ T31] audit: type=1400 audit(9230.670:1880): avc: denied { search } for pid=16633 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9230.839640][ T31] audit: type=1400 audit(9230.670:1881): avc: denied { read } for pid=16633 comm="cmp" name="resolv.conf.eth0.ra" dev="tmpfs" ino=69 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9230.851846][ T31] audit: type=1400 audit(9230.680:1882): avc: denied { read open } for pid=16633 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=69 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9230.853022][ T31] audit: type=1400 audit(9230.680:1883): avc: denied { getattr } for pid=16633 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9230.853800][ T31] audit: type=1400 audit(9230.700:1884): avc: denied { getattr } for pid=16633 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=69 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9234.482575][T16859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1549 sclass=netlink_route_socket pid=16859 comm=syz.3.5882 [ 9245.030163][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 9245.030321][ T31] audit: type=1400 audit(9244.890:1926): avc: denied { read } for pid=16866 comm="syz.2.5887" name="nbd2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9245.039677][ T31] audit: type=1400 audit(9244.900:1927): avc: denied { read open } for pid=16866 comm="syz.2.5887" path="/dev/nbd2" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 9245.049701][ T31] audit: type=1400 audit(9244.910:1928): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9245.077611][ T31] audit: type=1400 audit(9244.940:1929): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9245.082631][ T31] audit: type=1400 audit(9244.940:1930): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9245.113624][ T31] audit: type=1400 audit(9244.980:1931): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9245.117409][ T31] audit: type=1400 audit(9244.980:1932): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9245.169869][ T31] audit: type=1400 audit(9245.030:1933): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9245.213092][ T31] audit: type=1400 audit(9245.080:1934): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9245.215985][ T31] audit: type=1400 audit(9245.080:1935): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9260.065861][ T31] kauditd_printk_skb: 38 callbacks suppressed [ 9260.065961][ T31] audit: type=1400 audit(9259.930:1974): avc: denied { create } for pid=16926 comm="syz.2.5917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 9260.076833][ T31] audit: type=1400 audit(9259.940:1975): avc: denied { ioctl } for pid=16926 comm="syz.2.5917" path="socket:[41336]" dev="sockfs" ino=41336 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 9260.080254][T16929] 8021q: VLANs not supported on ipvlan1 [ 9260.141924][ T31] audit: type=1400 audit(9259.980:1976): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9260.143173][ T31] audit: type=1400 audit(9260.000:1977): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9260.144288][ T31] audit: type=1400 audit(9260.000:1978): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9260.155581][ T31] audit: type=1400 audit(9260.020:1979): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9260.158959][ T31] audit: type=1400 audit(9260.020:1980): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9260.199010][ T31] audit: type=1400 audit(9260.060:1981): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9260.222167][ T31] audit: type=1400 audit(9260.080:1982): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9260.288052][ T31] audit: type=1400 audit(9260.100:1983): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9260.766111][T16936] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16936 comm=syz.2.5922 [ 9275.090267][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 9275.090392][ T31] audit: type=1400 audit(9274.950:2016): avc: denied { read } for pid=16991 comm="syz.3.5949" dev="nsfs" ino=4026532666 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9275.126168][ T31] audit: type=1400 audit(9274.990:2017): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9275.145387][ T31] audit: type=1400 audit(9275.000:2018): avc: denied { read open } for pid=16991 comm="syz.3.5949" path="net:[4026532666]" dev="nsfs" ino=4026532666 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9275.148132][ T31] audit: type=1400 audit(9275.010:2019): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9275.149738][ T31] audit: type=1400 audit(9275.010:2020): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9275.166644][ T31] audit: type=1400 audit(9275.030:2021): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9275.167788][ T31] audit: type=1400 audit(9275.030:2022): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9275.192335][ T31] audit: type=1400 audit(9275.050:2023): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9275.216837][ T31] audit: type=1400 audit(9275.080:2024): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9275.219444][ T31] audit: type=1400 audit(9275.080:2025): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9290.927516][ T31] kauditd_printk_skb: 38 callbacks suppressed [ 9290.927638][ T31] audit: type=1400 audit(9290.790:2064): avc: denied { create } for pid=17059 comm="syz.3.5986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9290.955960][ T31] audit: type=1400 audit(9290.820:2066): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9290.963466][ T31] audit: type=1400 audit(9290.810:2065): avc: denied { write } for pid=17059 comm="syz.3.5986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9290.966775][ T31] audit: type=1400 audit(9290.830:2067): avc: denied { read } for pid=17060 comm="syz.2.5985" name="renderD128" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9290.981766][ T31] audit: type=1400 audit(9290.830:2068): avc: denied { read open } for pid=17060 comm="syz.2.5985" path="/dev/dri/renderD128" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9290.982942][ T31] audit: type=1400 audit(9290.840:2069): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9290.983885][ T31] audit: type=1400 audit(9290.840:2070): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9290.984749][ T31] audit: type=1400 audit(9290.840:2071): avc: denied { ioctl } for pid=17060 comm="syz.2.5985" path="/dev/dri/renderD128" dev="devtmpfs" ino=614 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9291.032057][ T31] audit: type=1400 audit(9290.870:2072): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9291.033361][ T31] audit: type=1400 audit(9290.880:2073): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9305.317343][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 9305.317440][ T31] audit: type=1400 audit(9305.180:2115): avc: denied { read write } for pid=17119 comm="syz.2.6016" name="virtual_nci" dev="devtmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9305.320194][ T31] audit: type=1400 audit(9305.180:2116): avc: denied { read write open } for pid=17119 comm="syz.2.6016" path="/dev/virtual_nci" dev="devtmpfs" ino=660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9305.324584][ T31] audit: type=1400 audit(9305.180:2117): avc: denied { read write } for pid=17120 comm="syz.3.6015" name="audio1" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9305.332033][ T31] audit: type=1400 audit(9305.190:2118): avc: denied { read write open } for pid=17120 comm="syz.3.6015" path="/dev/audio1" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9305.349158][ T31] audit: type=1400 audit(9305.210:2119): avc: denied { ioctl } for pid=17120 comm="syz.3.6015" path="/dev/audio1" dev="devtmpfs" ino=727 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9305.362005][ T31] audit: type=1400 audit(9305.220:2120): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9305.381677][ T31] audit: type=1400 audit(9305.240:2121): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9305.405380][ T31] audit: type=1400 audit(9305.260:2122): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9305.405958][ T31] audit: type=1400 audit(9305.260:2123): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9305.406607][ T31] audit: type=1400 audit(9305.260:2124): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9305.709033][T17133] syz.2.6017 (17133): drop_caches: 0 [ 9309.590254][T17184] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1014 sclass=netlink_xfrm_socket pid=17184 comm=syz.3.6043 [ 9320.136671][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 9320.137025][ T31] audit: type=1400 audit(9320.000:2167): avc: denied { create } for pid=17190 comm="syz.3.6048" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 9320.165959][ T31] audit: type=1400 audit(9320.020:2168): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9320.207451][ T31] audit: type=1400 audit(9320.070:2169): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9320.217566][ T31] audit: type=1400 audit(9320.070:2170): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9320.218361][ T31] audit: type=1400 audit(9320.080:2171): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9320.233570][ T31] audit: type=1400 audit(9320.080:2172): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9320.464328][ T31] audit: type=1400 audit(9320.330:2173): avc: denied { create } for pid=17194 comm="syz.2.6049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 9320.474924][ T31] audit: type=1400 audit(9320.340:2174): avc: denied { write } for pid=17194 comm="syz.2.6049" path="socket:[41805]" dev="sockfs" ino=41805 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 9320.482294][ T31] audit: type=1400 audit(9320.340:2175): avc: denied { read } for pid=17193 comm="syz.3.6050" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9320.486130][ T31] audit: type=1400 audit(9320.350:2176): avc: denied { read open } for pid=17193 comm="syz.3.6050" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 9335.572438][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 9335.572593][ T31] audit: type=1400 audit(9335.420:2211): avc: denied { create } for pid=17260 comm="syz.3.6084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 9335.576071][ T31] audit: type=1400 audit(9335.440:2212): avc: denied { write } for pid=17260 comm="syz.3.6084" path="socket:[41914]" dev="sockfs" ino=41914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 9335.590030][ T31] audit: type=1400 audit(9335.440:2213): avc: denied { write } for pid=17260 comm="syz.3.6084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 9335.599100][ T31] audit: type=1400 audit(9335.460:2214): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9335.634464][ T31] audit: type=1400 audit(9335.500:2215): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9335.651995][ T31] audit: type=1400 audit(9335.510:2216): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9335.653006][ T31] audit: type=1400 audit(9335.510:2217): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9335.653755][ T31] audit: type=1400 audit(9335.510:2218): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9335.918004][ T31] audit: type=1400 audit(9335.780:2219): avc: denied { read write } for pid=17264 comm="syz.3.6085" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9335.920506][ T31] audit: type=1400 audit(9335.780:2220): avc: denied { read write open } for pid=17264 comm="syz.3.6085" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9337.176256][T17282] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17282 comm=syz.2.6094 [ 9350.314929][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 9350.315056][ T31] audit: type=1400 audit(9350.180:2264): avc: denied { read } for pid=17333 comm="syz.3.6115" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9350.316310][ T31] audit: type=1400 audit(9350.180:2265): avc: denied { read open } for pid=17333 comm="syz.3.6115" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9350.367485][ T31] audit: type=1400 audit(9350.210:2266): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9350.378873][ T31] audit: type=1400 audit(9350.240:2267): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9350.403808][ T31] audit: type=1400 audit(9350.270:2268): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9350.412240][ T31] audit: type=1400 audit(9350.270:2269): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9350.413374][ T31] audit: type=1400 audit(9350.270:2270): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9351.168760][ T31] audit: type=1400 audit(9351.030:2271): avc: denied { create } for pid=17342 comm="syz.3.6119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9351.188788][ T31] audit: type=1400 audit(9351.050:2272): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9351.217370][ T31] audit: type=1400 audit(9351.060:2273): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9365.195294][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 9365.195380][ T31] audit: type=1400 audit(9365.050:2314): avc: denied { read write } for pid=17395 comm="syz.2.6146" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9365.200102][ T31] audit: type=1400 audit(9365.060:2315): avc: denied { read write open } for pid=17395 comm="syz.2.6146" path="/dev/ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9365.253099][ T31] audit: type=1400 audit(9365.110:2316): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9365.258489][ T31] audit: type=1400 audit(9365.110:2317): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9365.286608][ T31] audit: type=1400 audit(9365.140:2318): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9365.287471][ T31] audit: type=1400 audit(9365.140:2319): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9365.288183][ T31] audit: type=1400 audit(9365.140:2320): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9365.806832][ T31] audit: type=1400 audit(9365.670:2321): avc: denied { create } for pid=17402 comm="syz.2.6149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9365.829571][ T31] audit: type=1400 audit(9365.680:2322): avc: denied { write } for pid=17402 comm="syz.2.6149" lport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9366.176540][ T31] audit: type=1400 audit(9366.040:2323): avc: denied { create } for pid=17406 comm="syz.2.6151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 9368.449702][T17438] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17438 comm=syz.2.6166 [ 9380.209746][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 9380.209876][ T31] audit: type=1400 audit(9380.070:2371): avc: denied { create } for pid=17460 comm="syz.2.6178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9380.253281][ T31] audit: type=1400 audit(9380.120:2372): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9380.271826][ T31] audit: type=1400 audit(9380.120:2373): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9380.277000][ T31] audit: type=1400 audit(9380.130:2374): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9380.321985][ T31] audit: type=1400 audit(9380.130:2375): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9380.327166][ T31] audit: type=1400 audit(9380.130:2376): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9380.615777][ T31] audit: type=1400 audit(9380.480:2377): avc: denied { create } for pid=17464 comm="syz.3.6181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 9380.635791][ T31] audit: type=1400 audit(9380.500:2378): avc: denied { write } for pid=17464 comm="syz.3.6181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 9380.637481][T17466] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=17466 comm=syz.3.6181 [ 9380.975906][ T31] audit: type=1400 audit(9380.840:2379): avc: denied { read } for pid=17469 comm="syz.2.6183" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9380.981950][ T31] audit: type=1400 audit(9380.840:2380): avc: denied { read open } for pid=17469 comm="syz.2.6183" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9381.521769][T17478] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1548 sclass=netlink_tcpdiag_socket pid=17478 comm=syz.3.6187 [ 9381.939647][T17482] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=6 sclass=netlink_tcpdiag_socket pid=17482 comm=syz.3.6188 [ 9383.488141][T17495] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 9383.507051][T17495] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 9395.484699][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 9395.484784][ T31] audit: type=1400 audit(9395.350:2415): avc: denied { create } for pid=17509 comm="syz.2.6202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 9395.508002][ T31] audit: type=1400 audit(9395.370:2416): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9395.515684][ T31] audit: type=1400 audit(9395.380:2417): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9395.519681][ T31] audit: type=1400 audit(9395.380:2418): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9395.526167][ T31] audit: type=1400 audit(9395.390:2419): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9395.530900][ T31] audit: type=1400 audit(9395.390:2420): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9396.200079][T17519] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17519 comm=syz.2.6206 [ 9396.242072][ T31] audit: type=1400 audit(9396.090:2421): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 9396.257825][ T31] audit: type=1400 audit(9396.120:2422): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 9396.277678][ T31] audit: type=1400 audit(9396.130:2423): avc: denied { append } for pid=2907 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9396.281720][ T31] audit: type=1400 audit(9396.140:2424): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 9493.641660][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 9493.641770][ T31] audit: type=1400 audit(9493.500:2440): avc: denied { write } for pid=17567 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9493.644215][ T31] audit: type=1400 audit(9493.500:2441): avc: denied { write open } for pid=17567 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9493.647765][ T31] audit: type=1400 audit(9493.510:2442): avc: denied { getattr } for pid=17567 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9493.656645][ T31] audit: type=1400 audit(9493.510:2443): avc: denied { ioctl } for pid=17567 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 9844.453333][ T32] INFO: task kworker/u10:4:17542 blocked for more than 430 seconds. [ 9844.454503][ T32] Not tainted 6.12.0-syzkaller #0 [ 9844.455495][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9844.456679][ T32] task:kworker/u10:4 state:D stack:0 pid:17542 tgid:17542 ppid:15217 flags:0x00000000 [ 9844.457797][ T32] Call trace: [ 9844.459567][ T32] [<819e0650>] (__schedule) from [<819e12ac>] (schedule+0x2c/0xfc) [ 9844.460568][ T32] r10:82604a54 r9:84a45400 r8:dfacda60 r7:00000002 r6:82604a58 r5:00000000 [ 9844.463041][ T32] r4:84a45400 [ 9844.463474][ T32] [<819e1280>] (schedule) from [<819e13b4>] (io_schedule+0x38/0x48) [ 9844.463921][ T32] r5:00000000 r4:84a45400 [ 9844.464124][ T32] [<819e137c>] (io_schedule) from [<819e1d6c>] (bit_wait_io+0x14/0x5c) [ 9844.464639][ T32] r5:819e1d58 r4:00000002 [ 9844.464931][ T32] [<819e1d58>] (bit_wait_io) from [<819e1968>] (__wait_on_bit+0x7c/0x164) [ 9844.465396][ T32] r5:819e1d58 r4:dfacda48 [ 9844.465603][ T32] [<819e18ec>] (__wait_on_bit) from [<819e1acc>] (out_of_line_wait_on_bit+0x7c/0xa0) [ 9844.465996][ T32] r10:82604d40 r9:832fe1fc r8:832fdd00 r7:000de721 r6:832fc780 r5:832fe1f8 [ 9844.466379][ T32] r4:61c88647 [ 9844.466562][ T32] [<819e1a50>] (out_of_line_wait_on_bit) from [<806a85f4>] (do_get_write_access+0x27c/0x494) [ 9844.467101][ T32] r4:830186c0 [ 9844.467374][ T32] [<806a8378>] (do_get_write_access) from [<806a88a0>] (jbd2_journal_get_write_access+0x94/0xc8) [ 9844.467816][ T32] r10:82e2d000 r9:00000001 r8:000016c6 r7:830186c0 r6:832fe1f8 r5:00000000 [ 9844.468392][ T32] r4:832fc780 [ 9844.468637][ T32] [<806a880c>] (jbd2_journal_get_write_access) from [<8061fa58>] (__ext4_journal_get_write_access+0x38/0x1a4) [ 9844.469203][ T32] r7:81a26148 r6:dfacdb74 r5:83ec1000 r4:832fc780 [ 9844.469440][ T32] [<8061fa20>] (__ext4_journal_get_write_access) from [<8064412c>] (ext4_reserve_inode_write+0x64/0xb8) [ 9844.469900][ T32] r9:00000120 r8:8064938c r7:832fc780 r6:dfacdb74 r5:83181078 r4:00000000 [ 9844.470255][ T32] [<806440c8>] (ext4_reserve_inode_write) from [<806443c0>] (__ext4_mark_inode_dirty+0x60/0x278) [ 9844.472332][ T32] r7:84a45400 r6:832fc780 r5:dfacdb74 r4:83181078 [ 9844.474406][ T32] [<80644360>] (__ext4_mark_inode_dirty) from [<8064938c>] (ext4_dirty_inode+0x60/0x7c) [ 9844.475064][ T32] r10:00000000 r9:00000120 r8:83181078 r7:83ec1000 r6:82eca550 r5:83181078 [ 9844.475399][ T32] r4:832fc780 [ 9844.475592][ T32] [<8064932c>] (ext4_dirty_inode) from [<80560298>] (__mark_inode_dirty+0x54/0x558) [ 9844.475958][ T32] r5:00000008 r4:83181078 [ 9844.476130][ T32] [<80560244>] (__mark_inode_dirty) from [<80542314>] (generic_update_time+0x44/0x4c) [ 9844.476489][ T32] r9:00000120 r8:83181078 r7:84a45400 r6:82eca550 r5:83181078 r4:00000001 [ 9844.476794][ T32] [<805422d0>] (generic_update_time) from [<805430fc>] (touch_atime+0x144/0x178) [ 9844.477130][ T32] r5:83181078 r4:00000001 [ 9844.477339][ T32] [<80542fb8>] (touch_atime) from [<80444b74>] (filemap_read+0x4cc/0x4d4) [ 9844.477714][ T32] r7:dfacddd0 r6:84336180 r5:00000120 r4:00000001 [ 9844.477949][ T32] [<804446a8>] (filemap_read) from [<80444c74>] (generic_file_read_iter+0xf8/0x130) [ 9844.478348][ T32] r10:00004486 r9:00000120 r8:dfacddd0 r7:dfacddb8 r6:00000000 r5:dfacddb8 [ 9844.478652][ T32] r4:00000000 [ 9844.478813][ T32] [<80444b7c>] (generic_file_read_iter) from [<8062e988>] (ext4_file_read_iter+0x54/0x158) [ 9844.479249][ T32] r10:00004486 r9:00000000 r8:00000034 r7:dfacde48 r6:00000000 r5:dfacddb8 [ 9844.479609][ T32] r4:dfacddd0 r3:00000000 [ 9844.479801][ T32] [<8062e934>] (ext4_file_read_iter) from [<8051b198>] (__kernel_read+0x164/0x328) [ 9844.480180][ T32] r9:00000000 r8:00000034 r7:dfacde48 r6:00000000 r5:84a45400 r4:84336180 [ 9844.480515][ T32] [<8051b034>] (__kernel_read) from [<8051b3a8>] (kernel_read+0x4c/0x50) [ 9844.482380][ T32] r9:828c8cc8 r8:00000006 r7:838a7400 r6:dfacde48 r5:00000120 r4:84336180 [ 9844.482733][ T32] [<8051b35c>] (kernel_read) from [<805a2668>] (load_elf_phdrs+0x80/0xc4) [ 9844.483105][ T32] r7:84336180 r6:00000120 r5:838a7400 r4:838a7e5c [ 9844.483362][ T32] [<805a25e8>] (load_elf_phdrs) from [<805a3988>] (load_elf_binary+0xcc/0x141c) [ 9844.483777][ T32] r7:838a7e5c r6:84a45400 r5:fffffff8 r4:838a7e00 [ 9844.484100][ T32] [<805a38bc>] (load_elf_binary) from [<805242b0>] (bprm_execve+0x224/0x5ec) [ 9844.484458][ T32] r10:00004486 r9:828c8cc8 r8:00000006 r7:8271c0e4 r6:838a7e00 r5:fffffff8 [ 9844.484765][ T32] r4:82721b08 [ 9844.484936][ T32] [<8052408c>] (bprm_execve) from [<80525ee0>] (kernel_execve+0xf8/0x190) [ 9844.485293][ T32] r10:00000000 r9:00000000 r8:826f6a90 r7:84caec40 r6:8361c000 r5:838a7e00 [ 9844.485659][ T32] r4:00000000 [ 9844.485867][ T32] [<80525de8>] (kernel_execve) from [<80261324>] (call_usermodehelper_exec_async+0xf0/0x160) [ 9844.486336][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:84cae380 r4:84ddb700 [ 9844.486592][ T32] [<80261234>] (call_usermodehelper_exec_async) from [<80200114>] (ret_from_fork+0x14/0x20) [ 9844.487097][ T32] Exception stack(0xdfacdfb0 to 0xdfacdff8) [ 9844.487535][ T32] dfa0: 00000000 00000000 00000000 00000000 [ 9844.487902][ T32] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9844.488202][ T32] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9844.488506][ T32] r7:00000000 r6:00000000 r5:80261234 r4:84cae380 [ 9844.488881][ T32] INFO: task modprobe:17561 blocked for more than 430 seconds. [ 9844.489160][ T32] Not tainted 6.12.0-syzkaller #0 [ 9844.489427][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9844.489897][ T32] task:modprobe state:D stack:0 pid:17561 tgid:17561 ppid:12884 flags:0x00000004 [ 9844.490345][ T32] Call trace: [ 9844.490535][ T32] [<819e0650>] (__schedule) from [<819e12ac>] (schedule+0x2c/0xfc) [ 9844.490886][ T32] r10:82604a54 r9:840bc800 r8:dfbc9a08 r7:00000002 r6:82604a58 r5:00000000 [ 9844.492320][ T32] r4:840bc800 [ 9844.492511][ T32] [<819e1280>] (schedule) from [<819e13b4>] (io_schedule+0x38/0x48) [ 9844.492880][ T32] r5:00000000 r4:840bc800 [ 9844.493089][ T32] [<819e137c>] (io_schedule) from [<819e1d6c>] (bit_wait_io+0x14/0x5c) [ 9844.493449][ T32] r5:819e1d58 r4:00000002 [ 9844.493647][ T32] [<819e1d58>] (bit_wait_io) from [<819e1968>] (__wait_on_bit+0x7c/0x164) [ 9844.493990][ T32] r5:819e1d58 r4:dfbc99f0 [ 9844.494185][ T32] [<819e18ec>] (__wait_on_bit) from [<819e1acc>] (out_of_line_wait_on_bit+0x7c/0xa0) [ 9844.494628][ T32] r10:82604d40 r9:832fe1fc r8:832fdd00 r7:000de723 r6:831d8cc0 r5:832fe1f8 [ 9844.494949][ T32] r4:61c88647 [ 9844.495114][ T32] [<819e1a50>] (out_of_line_wait_on_bit) from [<806a85f4>] (do_get_write_access+0x27c/0x494) [ 9844.495542][ T32] r4:830186c0 [ 9844.495720][ T32] [<806a8378>] (do_get_write_access) from [<806a88a0>] (jbd2_journal_get_write_access+0x94/0xc8) [ 9844.496142][ T32] r10:82e2d000 r9:00000001 r8:000016c6 r7:830186c0 r6:832fe1f8 r5:00000000 [ 9844.496434][ T32] r4:831d8cc0 [ 9844.496605][ T32] [<806a880c>] (jbd2_journal_get_write_access) from [<8061fa58>] (__ext4_journal_get_write_access+0x38/0x1a4) [ 9844.497053][ T32] r7:81a26148 r6:dfbc9b1c r5:83ec1000 r4:831d8cc0 [ 9844.497295][ T32] [<8061fa20>] (__ext4_journal_get_write_access) from [<8064412c>] (ext4_reserve_inode_write+0x64/0xb8) [ 9844.497559][ T32] r9:00482000 r8:8064938c r7:831d8cc0 r6:dfbc9b1c r5:83181078 r4:00000000 [ 9844.497735][ T32] [<806440c8>] (ext4_reserve_inode_write) from [<806443c0>] (__ext4_mark_inode_dirty+0x60/0x278) [ 9844.497948][ T32] r7:840bc800 r6:831d8cc0 r5:dfbc9b1c r4:83181078 [ 9844.498065][ T32] [<80644360>] (__ext4_mark_inode_dirty) from [<8064938c>] (ext4_dirty_inode+0x60/0x7c) [ 9844.498302][ T32] r10:00000012 r9:00482000 r8:85170840 r7:83ec1000 r6:82eca550 r5:83181078 [ 9844.498451][ T32] r4:831d8cc0 [ 9844.498542][ T32] [<8064932c>] (ext4_dirty_inode) from [<80560298>] (__mark_inode_dirty+0x54/0x558) [ 9844.498742][ T32] r5:00000008 r4:83181078 [ 9844.498875][ T32] [<80560244>] (__mark_inode_dirty) from [<80542314>] (generic_update_time+0x44/0x4c) [ 9844.499115][ T32] r9:00482000 r8:85170840 r7:840bc800 r6:82eca550 r5:83181078 r4:00000001 [ 9844.499312][ T32] [<805422d0>] (generic_update_time) from [<805430fc>] (touch_atime+0x144/0x178) [ 9844.499527][ T32] r5:83181078 r4:00000001 [ 9844.499645][ T32] [<80542fb8>] (touch_atime) from [<8062eeb8>] (ext4_file_mmap+0x5c/0x74) [ 9844.499849][ T32] r7:840bc800 r6:84e43900 r5:00000075 r4:85170840 [ 9844.500044][ T32] [<8062ee5c>] (ext4_file_mmap) from [<804a4134>] (__mmap_region+0x600/0xad0) [ 9844.500377][ T32] r5:00000075 r4:00470000 [ 9844.500560][ T32] [<804a3b34>] (__mmap_region) from [<804a4668>] (mmap_region+0x64/0x110) [ 9844.500977][ T32] r10:850eb540 r9:84e43900 r8:00470000 r7:840bc800 r6:00000075 r5:840bc800 [ 9844.502938][ T32] r4:850eb540 [ 9844.503260][ T32] [<804a4604>] (mmap_region) from [<804a4a70>] (do_mmap+0x35c/0x4cc) [ 9844.503818][ T32] r7:840bc800 r6:00000075 r5:00100012 r4:00012000 [ 9844.504078][ T32] [<804a4714>] (do_mmap) from [<804729f0>] (vm_mmap_pgoff+0xd8/0x18c) [ 9844.504518][ T32] r10:84e43900 r9:00012000 r8:00470000 r7:850eb540 r6:dfbc9de8 r5:00000005 [ 9844.504791][ T32] r4:00000000 [ 9844.504930][ T32] [<80472918>] (vm_mmap_pgoff) from [<80472aec>] (vm_mmap+0x48/0x5c) [ 9844.505237][ T32] r10:00100000 r9:00001000 r8:00000005 r7:00000000 r6:84825260 r5:00012000 [ 9844.505530][ T32] r4:00470000 [ 9844.505691][ T32] [<80472aa4>] (vm_mmap) from [<805a27fc>] (elf_load+0x150/0x218) [ 9844.506031][ T32] [<805a26ac>] (elf_load) from [<805a3b74>] (load_elf_binary+0x2b8/0x141c) [ 9844.506479][ T32] r10:00000003 r9:00470000 r8:84825260 r7:00000000 r6:00470000 r5:00011008 [ 9844.506757][ T32] r4:84825c00 [ 9844.506930][ T32] [<805a38bc>] (load_elf_binary) from [<805242b0>] (bprm_execve+0x224/0x5ec) [ 9844.507265][ T32] r10:00004499 r9:828c8cc8 r8:00000006 r7:8271c0e4 r6:84825c00 r5:fffffff8 [ 9844.507539][ T32] r4:82721b08 [ 9844.507672][ T32] [<8052408c>] (bprm_execve) from [<80525ee0>] (kernel_execve+0xf8/0x190) [ 9844.507985][ T32] r10:00000000 r9:00000000 r8:826f6a90 r7:84bbee00 r6:83bfb000 r5:84825c00 [ 9844.508261][ T32] r4:00000000 [ 9844.508438][ T32] [<80525de8>] (kernel_execve) from [<80261324>] (call_usermodehelper_exec_async+0xf0/0x160) [ 9844.508804][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:84bbe5c0 r4:83778c00 [ 9844.509067][ T32] [<80261234>] (call_usermodehelper_exec_async) from [<80200114>] (ret_from_fork+0x14/0x20) [ 9844.509416][ T32] Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) [ 9844.509640][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 9844.509929][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9844.510221][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9844.510544][ T32] r7:00000000 r6:00000000 r5:80261234 r4:84bbe5c0 [ 9844.511913][ T32] INFO: task syz.2.6225:17564 blocked for more than 430 seconds. [ 9844.512301][ T32] Not tainted 6.12.0-syzkaller #0 [ 9844.512567][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9844.512909][ T32] task:syz.2.6225 state:D stack:0 pid:17564 tgid:17564 ppid:15202 flags:0x00000001 [ 9844.513283][ T32] Call trace: [ 9844.513472][ T32] [<819e0650>] (__schedule) from [<819e12ac>] (schedule+0x2c/0xfc) [ 9844.513771][ T32] r10:82604a30 r9:83c05400 r8:f46e5bf0 r7:00000002 r6:82604a34 r5:00000000 [ 9844.513932][ T32] r4:83c05400 [ 9844.514045][ T32] [<819e1280>] (schedule) from [<819e13b4>] (io_schedule+0x38/0x48) [ 9844.514316][ T32] r5:00000000 r4:83c05400 [ 9844.514486][ T32] [<819e137c>] (io_schedule) from [<819e1d6c>] (bit_wait_io+0x14/0x5c) [ 9844.514809][ T32] r5:819e1d58 r4:00000002 [ 9844.514978][ T32] [<819e1d58>] (bit_wait_io) from [<819e1968>] (__wait_on_bit+0x7c/0x164) [ 9844.515263][ T32] r5:819e1d58 r4:f46e5bd8 [ 9844.515555][ T32] [<819e18ec>] (__wait_on_bit) from [<819e1acc>] (out_of_line_wait_on_bit+0x7c/0xa0) [ 9844.515866][ T32] r10:82604d40 r9:832fe094 r8:832fdd00 r7:000de720 r6:832fc7b0 r5:832fe090 [ 9844.516072][ T32] r4:61c88647 [ 9844.516197][ T32] [<819e1a50>] (out_of_line_wait_on_bit) from [<806a85f4>] (do_get_write_access+0x27c/0x494) [ 9844.516481][ T32] r4:830f8300 [ 9844.516628][ T32] [<806a8378>] (do_get_write_access) from [<806a88a0>] (jbd2_journal_get_write_access+0x94/0xc8) [ 9844.516966][ T32] r10:82e2d000 r9:00000001 r8:000016c6 r7:830f8300 r6:832fe090 r5:00000000 [ 9844.517210][ T32] r4:832fc7b0 [ 9844.517368][ T32] [<806a880c>] (jbd2_journal_get_write_access) from [<8061fa58>] (__ext4_journal_get_write_access+0x38/0x1a4) [ 9844.517732][ T32] r7:81a26148 r6:f46e5d04 r5:83ec1000 r4:832fc7b0 [ 9844.517950][ T32] [<8061fa20>] (__ext4_journal_get_write_access) from [<8064412c>] (ext4_reserve_inode_write+0x64/0xb8) [ 9844.518364][ T32] r9:85170240 r8:8064938c r7:832fc7b0 r6:f46e5d04 r5:83094d58 r4:00000000 [ 9844.518610][ T32] [<806440c8>] (ext4_reserve_inode_write) from [<806443c0>] (__ext4_mark_inode_dirty+0x60/0x278) [ 9844.518925][ T32] r7:83c05400 r6:832fc7b0 r5:f46e5d04 r4:83094d58 [ 9844.519123][ T32] [<80644360>] (__ext4_mark_inode_dirty) from [<8064938c>] (ext4_dirty_inode+0x60/0x7c) [ 9844.519468][ T32] r10:f46e5fb0 r9:85170240 r8:def94ff8 r7:83ec1000 r6:83094d58 r5:83094d58 [ 9844.519717][ T32] r4:832fc7b0 [ 9844.519867][ T32] [<8064932c>] (ext4_dirty_inode) from [<80560298>] (__mark_inode_dirty+0x54/0x558) [ 9844.520200][ T32] r5:00000008 r4:83094d58 [ 9844.520381][ T32] [<80560244>] (__mark_inode_dirty) from [<80542314>] (generic_update_time+0x44/0x4c) [ 9844.520726][ T32] r9:85170240 r8:def94ff8 r7:f46e5e90 r6:83094d58 r5:83094d58 r4:00000006 [ 9844.523389][ T32] [<805422d0>] (generic_update_time) from [<805423c8>] (file_update_time+0x7c/0x80) [ 9844.523812][ T32] r5:83db39c0 r4:00000000 [ 9844.523991][ T32] [<8054234c>] (file_update_time) from [<806496e4>] (ext4_page_mkwrite+0xbc/0x660) [ 9844.524350][ T32] r7:f46e5e90 r6:00000000 r5:83ec1000 r4:83094d58 [ 9844.524587][ T32] [<80649628>] (ext4_page_mkwrite) from [<8049279c>] (do_page_mkwrite+0x54/0x10c) [ 9844.524927][ T32] r10:f46e5fb0 r9:84e42d00 r8:00000200 r7:00001255 r6:def94ff8 r5:83c05400 [ 9844.525240][ T32] r4:f46e5e90 [ 9844.525407][ T32] [<80492748>] (do_page_mkwrite) from [<804994bc>] (handle_mm_fault+0xa5c/0x135c) [ 9844.525728][ T32] r7:00000040 r6:31920000 r5:83c05400 r4:00001255 [ 9844.525953][ T32] [<80498a60>] (handle_mm_fault) from [<802142d0>] (do_page_fault+0x1c8/0x3d8) [ 9844.526381][ T32] r10:00000002 r9:84e42d00 r8:00000255 r7:83c05400 r6:00000a06 r5:31920000 [ 9844.527058][ T32] r4:f46e5fb0 [ 9844.527588][ T32] [<80214108>] (do_page_fault) from [<80214660>] (do_translation_fault+0xfc/0x12c) [ 9844.527889][ T32] r10:00000000 r9:7ea6dac8 r8:80214564 r7:f46e5fb0 r6:31920000 r5:00000a06 [ 9844.528086][ T32] r4:8261d374 [ 9844.528223][ T32] [<80214564>] (do_translation_fault) from [<802146c8>] (do_DataAbort+0x38/0xa8) [ 9844.528551][ T32] r9:7ea6dac8 r8:80214564 r7:f46e5fb0 r6:31920000 r5:00000a06 r4:8261d374 [ 9844.528795][ T32] [<80214690>] (do_DataAbort) from [<80200ebc>] (__dabt_usr+0x5c/0x60) [ 9844.529075][ T32] Exception stack(0xf46e5fb0 to 0xf46e5ff8) [ 9844.529310][ T32] 5fa0: 005ffdf0 001d88f8 00600000 00270000 [ 9844.529623][ T32] 5fc0: 00258000 002703b4 7ea6d998 00000001 00000000 7ea6dac8 00000000 00000163 [ 9844.529905][ T32] 5fe0: 31920000 7ea6d838 000004b4 0002503c 60000010 ffffffff [ 9844.530152][ T32] r8:824b2044 r7:83c05400 r6:ffffffff r5:60000010 r4:0002503c [ 9844.530444][ T32] INFO: task syz.3.6226:17565 blocked for more than 430 seconds. [ 9844.530737][ T32] Not tainted 6.12.0-syzkaller #0 [ 9844.532741][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 9844.533059][ T32] task:syz.3.6226 state:D stack:0 pid:17565 tgid:17565 ppid:15204 flags:0x00000001 [ 9844.533315][ T32] Call trace: [ 9844.533406][ T32] [<819e0650>] (__schedule) from [<819e12ac>] (schedule+0x2c/0xfc) [ 9844.533610][ T32] r10:82604a30 r9:83c03000 r8:dfc11bf0 r7:00000002 r6:82604a34 r5:00000000 [ 9844.533751][ T32] r4:83c03000 [ 9844.533865][ T32] [<819e1280>] (schedule) from [<819e13b4>] (io_schedule+0x38/0x48) [ 9844.534167][ T32] r5:00000000 r4:83c03000 [ 9844.534392][ T32] [<819e137c>] (io_schedule) from [<819e1d6c>] (bit_wait_io+0x14/0x5c) [ 9844.534717][ T32] r5:819e1d58 r4:00000002 [ 9844.534907][ T32] [<819e1d58>] (bit_wait_io) from [<819e1968>] (__wait_on_bit+0x7c/0x164) [ 9844.535182][ T32] r5:819e1d58 r4:dfc11bd8 [ 9844.535370][ T32] [<819e18ec>] (__wait_on_bit) from [<819e1acc>] (out_of_line_wait_on_bit+0x7c/0xa0) [ 9844.535731][ T32] r10:82604d40 r9:832fe094 r8:832fdd00 r7:000de721 r6:831d8cf0 r5:832fe090 [ 9844.536036][ T32] r4:61c88647 [ 9844.536237][ T32] [<819e1a50>] (out_of_line_wait_on_bit) from [<806a85f4>] (do_get_write_access+0x27c/0x494) [ 9844.536681][ T32] r4:830f8300 [ 9844.536844][ T32] [<806a8378>] (do_get_write_access) from [<806a88a0>] (jbd2_journal_get_write_access+0x94/0xc8) [ 9844.537290][ T32] r10:82e2d000 r9:00000001 r8:000016c6 r7:830f8300 r6:832fe090 r5:00000000 [ 9844.537653][ T32] r4:831d8cf0 [ 9844.537804][ T32] [<806a880c>] (jbd2_journal_get_write_access) from [<8061fa58>] (__ext4_journal_get_write_access+0x38/0x1a4) [ 9844.538352][ T32] r7:81a26148 r6:dfc11d04 r5:83ec1000 r4:831d8cf0 [ 9844.538649][ T32] [<8061fa20>] (__ext4_journal_get_write_access) from [<8064412c>] (ext4_reserve_inode_write+0x64/0xb8) [ 9844.539025][ T32] r9:85170720 r8:8064938c r7:831d8cf0 r6:dfc11d04 r5:8318e978 r4:00000000 [ 9844.539240][ T32] [<806440c8>] (ext4_reserve_inode_write) from [<806443c0>] (__ext4_mark_inode_dirty+0x60/0x278) [ 9844.539549][ T32] r7:83c03000 r6:831d8cf0 r5:dfc11d04 r4:8318e978 [ 9844.539722][ T32] [<80644360>] (__ext4_mark_inode_dirty) from [<8064938c>] (ext4_dirty_inode+0x60/0x7c) [ 9844.540064][ T32] r10:dfc11fb0 r9:85170720 r8:dee679cc r7:83ec1000 r6:8318e978 r5:8318e978 [ 9844.540433][ T32] r4:831d8cf0 [ 9844.540631][ T32] [<8064932c>] (ext4_dirty_inode) from [<80560298>] (__mark_inode_dirty+0x54/0x558) [ 9844.542651][ T32] r5:00000008 r4:8318e978 [ 9844.542945][ T32] [<80560244>] (__mark_inode_dirty) from [<80542314>] (generic_update_time+0x44/0x4c) [ 9844.543405][ T32] r9:85170720 r8:dee679cc r7:dfc11e90 r6:8318e978 r5:8318e978 r4:00000006 [ 9844.543796][ T32] [<805422d0>] (generic_update_time) from [<805423c8>] (file_update_time+0x7c/0x80) [ 9844.544201][ T32] r5:842fb9c0 r4:00000000 [ 9844.544422][ T32] [<8054234c>] (file_update_time) from [<806496e4>] (ext4_page_mkwrite+0xbc/0x660) [ 9844.544844][ T32] r7:dfc11e90 r6:00000000 r5:83ec1000 r4:8318e978 [ 9844.545104][ T32] [<80649628>] (ext4_page_mkwrite) from [<8049279c>] (do_page_mkwrite+0x54/0x10c) [ 9844.545507][ T32] r10:dfc11fb0 r9:84e43600 r8:00000200 r7:00001255 r6:dee679cc r5:83c03000 [ 9844.545909][ T32] r4:dfc11e90 [ 9844.546095][ T32] [<80492748>] (do_page_mkwrite) from [<804994bc>] (handle_mm_fault+0xa5c/0x135c) [ 9844.546554][ T32] r7:00000040 r6:31d20000 r5:83c03000 r4:00001255 [ 9844.546837][ T32] [<80498a60>] (handle_mm_fault) from [<802142d0>] (do_page_fault+0x1c8/0x3d8) [ 9844.547229][ T32] r10:00000002 r9:84e43600 r8:00000255 r7:83c03000 r6:00000a06 r5:31d20000 [ 9844.547566][ T32] r4:dfc11fb0 [ 9844.547743][ T32] [<80214108>] (do_page_fault) from [<80214660>] (do_translation_fault+0xfc/0x12c) [ 9844.548144][ T32] r10:00000000 r9:7eefcac8 r8:80214564 r7:dfc11fb0 r6:31d20000 r5:00000a06 [ 9844.548495][ T32] r4:8261d374 [ 9844.548686][ T32] [<80214564>] (do_translation_fault) from [<802146c8>] (do_DataAbort+0x38/0xa8) [ 9844.549087][ T32] r9:7eefcac8 r8:80214564 r7:dfc11fb0 r6:31d20000 r5:00000a06 r4:8261d374 [ 9844.549428][ T32] [<80214690>] (do_DataAbort) from [<80200ebc>] (__dabt_usr+0x5c/0x60) [ 9844.549790][ T32] Exception stack(0xdfc11fb0 to 0xdfc11ff8) [ 9844.550073][ T32] 1fa0: 005ffdf0 001d88f8 00600000 00270000 [ 9844.550495][ T32] 1fc0: 00258000 002703b4 7eefc998 00000001 00000000 7eefcac8 00000000 0000017c [ 9844.552221][ T32] 1fe0: 31d20000 7eefc838 000004b4 0002503c 60000010 ffffffff [ 9844.552618][ T32] r8:824b2044 r7:83c03000 r6:ffffffff r5:60000010 r4:0002503c [ 9844.553768][ T32] NMI backtrace for cpu 1 [ 9844.554281][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-syzkaller #0 [ 9844.554743][ T32] Hardware name: ARM-Versatile Express [ 9844.555038][ T32] Call trace: [ 9844.555267][ T32] [<819be5f8>] (dump_backtrace) from [<819be6f4>] (show_stack+0x18/0x1c) [ 9844.555708][ T32] r7:00000000 r6:00000113 r5:60000193 r4:82043260 [ 9844.555979][ T32] [<819be6dc>] (show_stack) from [<819dc738>] (dump_stack_lvl+0x70/0x7c) [ 9844.556344][ T32] [<819dc6c8>] (dump_stack_lvl) from [<819dc75c>] (dump_stack+0x18/0x1c) [ 9844.556703][ T32] r5:00000001 r4:00000001 [ 9844.556909][ T32] [<819dc744>] (dump_stack) from [<819ab8b0>] (nmi_cpu_backtrace+0x160/0x17c) [ 9844.557313][ T32] [<819ab750>] (nmi_cpu_backtrace) from [<819ab9fc>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 9844.557782][ T32] r7:00000001 r6:8260c610 r5:8261b0d0 r4:ffffffff [ 9844.558045][ T32] [<819ab8cc>] (nmi_trigger_cpumask_backtrace) from [<80210428>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 9844.558660][ T32] r9:000e9040 r8:828b7ca4 r7:8260c770 r6:00007f40 r5:8261b688 r4:83e4051c [ 9844.558974][ T32] [<80210410>] (arch_trigger_cpumask_backtrace) from [<80359a2c>] (watchdog+0x498/0x5b8) [ 9844.559386][ T32] [<80359594>] (watchdog) from [<80270ae0>] (kthread+0x104/0x134) [ 9844.559774][ T32] r10:00000000 r9:df819e58 r8:82cd0e40 r7:00000000 r6:80359594 r5:82e59800 [ 9844.560097][ T32] r4:82fa2000 [ 9844.560282][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 9844.560731][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 9844.561363][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 9844.562033][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9844.562506][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9844.562895][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:82fa2000 [ 9844.564356][ T32] Sending NMI from CPU 1 to CPUs 0: [ 9844.565442][ C0] NMI backtrace for cpu 0 skipped: idling at default_idle_call+0x4c/0x198 [ 9844.566634][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 9844.567644][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-syzkaller #0 [ 9844.568011][ T32] Hardware name: ARM-Versatile Express [ 9844.568264][ T32] Call trace: [ 9844.568462][ T32] [<819be5f8>] (dump_backtrace) from [<819be6f4>] (show_stack+0x18/0x1c) [ 9844.568882][ T32] r7:00000000 r6:82623304 r5:00000000 r4:82043260 [ 9844.569138][ T32] [<819be6dc>] (show_stack) from [<819dc71c>] (dump_stack_lvl+0x54/0x7c) [ 9844.569504][ T32] [<819dc6c8>] (dump_stack_lvl) from [<819dc75c>] (dump_stack+0x18/0x1c) [ 9844.569861][ T32] r5:00000000 r4:82871d18 [ 9844.570070][ T32] [<819dc744>] (dump_stack) from [<819bf220>] (panic+0x120/0x374) [ 9844.570463][ T32] [<819bf100>] (panic) from [<803598ac>] (watchdog+0x318/0x5b8) [ 9844.571066][ T32] r3:00000000 r2:00000000 r1:00000001 r0:82043d8c [ 9844.571650][ T32] r7:8260c770 [ 9844.571821][ T32] [<80359594>] (watchdog) from [<80270ae0>] (kthread+0x104/0x134) [ 9844.572330][ T32] r10:00000000 r9:df819e58 r8:82cd0e40 r7:00000000 r6:80359594 r5:82e59800 [ 9844.572712][ T32] r4:82fa2000 [ 9844.572891][ T32] [<802709dc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 9844.573270][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 9844.573574][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 9844.573961][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 9844.574486][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 9844.574846][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802709dc r4:82fa2000 [ 9844.577306][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:30:13 Registers: info registers vcpu 0 CPU#0 R00=827bccf8 R01=00000024 R02=ffffffff R03=819de588 R04=828b6200 R05=001dc06a R06=fc1f8800 R07=000008f3 R08=848c8c24 R09=848c8848 R10=00000000 R11=df971c6c R12=df971c70 R13=df971c60 R14=81250650 R15=819de598 PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005627e9 s17=00000000 d08=00000000005627e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=08080006 s33=02058003 d16=0205800308080006 s34=ffffffff s35=05880303 d17=05880303ffffffff s36=03000800 s37=80020590 d18=8002059003000800 s38=04800304 s39=03038002 d19=0303800204800304 s40=08000380 s41=03880340 d20=0388034008000380 s42=03000400 s43=0400038c d21=0400038c03000400 s44=03900300 s45=03000800 d22=0300080003900300 s46=08000398 s47=03a00300 d23=03a0030008000398 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=0af3b2db s53=210996c1 d26=210996c10af3b2db s54=5cf37709 s55=0c444e75 d27=0c444e755cf37709 s56=9ff5e69d s57=9493156c d28=9493156c9ff5e69d s58=fed12f4d s59=d9c8627b d29=d9c8627bfed12f4d s60=417c1efc s61=e0ec3cca d30=e0ec3cca417c1efc s62=3e743f88 s63=3c396a86 d31=3c396a863e743f88 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=82043260 R02=00000000 R03=819de588 R04=0000000a R05=826f8e08 R06=00000000 R07=826f8e00 R08=82e59800 R09=00000028 R10=826f8e08 R11=df8e1d18 R12=df8e1d1c R13=df8e1d0c R14=8031b2f8 R15=819de598 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=7c000000 s03=000a4ca6 d01=000a4ca67c000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=ffa1b53e s09=00db9f81 d04=00db9f81ffa1b53e s10=ffffffff s11=00000000 d05=00000000ffffffff s12=ff9ae1d6 s13=ff705938 d06=ff705938ff9ae1d6 s14=ffffffff s15=ffffffff d07=ffffffffffffffff s16=fe000000 s17=014cda2d d08=014cda2dfe000000 s18=2a000000 s19=ffffd44c d09=ffffd44c2a000000 s20=ff18bfda s21=ff705938 d10=ff705938ff18bfda s22=ffffffff s23=ffffffff d11=ffffffffffffffff s24=01a1b53e s25=00000000 d12=0000000001a1b53e s26=7c000000 s27=000a4ca6 d13=000a4ca67c000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=ff18050a s33=ff2fe618 d16=ff2fe618ff18050a s34=ffffffff s35=ffffffff d17=ffffffffffffffff s36=fea9e12c s37=001417b0 d18=001417b0fea9e12c s38=ffffffff s39=00000000 d19=00000000ffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=ffbe723f s43=ffffffff d21=ffffffffffbe723f s44=00000000 s45=00000000 d22=0000000000000000 s46=ffea2615 s47=ffffffff d23=ffffffffffea2615 s48=ff670f5f s49=014cda2d d24=014cda2dff670f5f s50=fe60d38f s51=ffffffff d25=fffffffffe60d38f s52=006df528 s53=ff77b534 d26=ff77b534006df528 s54=fe1ec773 s55=ff6f23e2 d27=ff6f23e2fe1ec773 s56=ff8f5302 s57=00ab7452 d28=00ab7452ff8f5302 s58=0055ba29 s59=fe1ec773 d29=fe1ec7730055ba29 s60=83c5bfe8 s61=000a4ca6 d30=000a4ca683c5bfe8 s62=1d40e1af s63=ffccb4bc d31=ffccb4bc1d40e1af FPSCR: 00000000