last executing test programs: 32.14962088s ago: executing program 0 (id=33509): pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x541b, 0x0) 32.006847077s ago: executing program 0 (id=33516): r0 = socket$nl_generic(0x10, 0x3, 0x10) write$nbd(r0, &(0x7f0000000000), 0x10) 31.867790843s ago: executing program 0 (id=33514): r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) fcntl$setlease(r0, 0x8, 0x0) 31.721465151s ago: executing program 0 (id=33517): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) write$UHID_INPUT(r0, 0x0, 0x0) 31.57084857s ago: executing program 0 (id=33522): r0 = inotify_init() ioctl$AUTOFS_IOC_PROTOVER(r0, 0x5450, 0x0) 31.467559669s ago: executing program 0 (id=33520): r0 = openat$rfkill(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) read(r0, 0x0, 0x0) 589.996308ms ago: executing program 1 (id=33528): pipe2(&(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$selinux_load(r0, 0x0, 0x0) 439.923566ms ago: executing program 1 (id=33529): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x5450, 0x0) 330.970096ms ago: executing program 1 (id=33530): r0 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) 240.622274ms ago: executing program 1 (id=33531): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001380)='smaps\x00') ioctl$TIOCSISO7816(r0, 0x5450, 0x0) 128.649985ms ago: executing program 1 (id=33532): r0 = socket(0x10, 0x2, 0x0) connect$packet(r0, 0x0, 0x0) 0s ago: executing program 1 (id=33533): r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x5450, 0x0) kernel console output (not intermixed with test programs): object_r:device_t tclass=blk_file permissive=1 [ 3636.648102][ T31] audit: type=1400 audit(3636.570:59991): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3636.694720][ T3182] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3182 comm=syz.1.31385 [ 3641.437941][ T3329] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=6 sclass=netlink_tcpdiag_socket pid=3329 comm=syz.1.31456 [ 3641.617602][ T31] kauditd_printk_skb: 384 callbacks suppressed [ 3641.617677][ T31] audit: type=1400 audit(3641.550:60376): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3641.628294][ T31] audit: type=1400 audit(3641.560:60377): avc: denied { read write open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3641.629243][ T31] audit: type=1400 audit(3641.560:60378): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3641.635928][ T31] audit: type=1400 audit(3641.560:60379): avc: denied { read } for pid=3334 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3641.677819][ T31] audit: type=1400 audit(3641.610:60380): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3641.678607][ T31] audit: type=1400 audit(3641.610:60381): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3641.679100][ T31] audit: type=1400 audit(3641.610:60382): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3641.725641][ T31] audit: type=1400 audit(3641.650:60383): avc: denied { read } for pid=3337 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3641.739675][ T31] audit: type=1400 audit(3641.670:60384): avc: denied { create } for pid=3338 comm="syz.0.31461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 3641.760649][ T31] audit: type=1400 audit(3641.690:60385): avc: denied { ioctl } for pid=3338 comm="syz.0.31461" path="socket:[214059]" dev="sockfs" ino=214059 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 3642.318265][ T3358] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3358 comm=syz.1.31468 [ 3643.878448][ T3403] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=3403 comm=syz.1.31491 [ 3645.951401][ T3460] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3460 comm=syz.1.31519 [ 3646.146906][ T3466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3466 comm=syz.1.31522 [ 3646.638098][ T31] kauditd_printk_skb: 353 callbacks suppressed [ 3646.638154][ T31] audit: type=1400 audit(3646.570:60739): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3646.638882][ T31] audit: type=1400 audit(3646.570:60740): avc: denied { read write open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3646.639397][ T31] audit: type=1400 audit(3646.570:60741): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3646.658197][ T31] audit: type=1400 audit(3646.590:60742): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3646.659294][ T31] audit: type=1400 audit(3646.590:60743): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3646.660372][ T31] audit: type=1400 audit(3646.590:60744): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3646.701923][ T31] audit: type=1400 audit(3646.630:60745): avc: denied { read } for pid=3481 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3646.727563][ T31] audit: type=1400 audit(3646.660:60746): avc: denied { read } for pid=3482 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3646.749264][ T31] audit: type=1400 audit(3646.680:60747): avc: denied { create } for pid=3482 comm="syz.0.31531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 3646.753227][ T3484] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3484 comm=syz.0.31531 [ 3646.753342][ T31] audit: type=1400 audit(3646.680:60748): avc: denied { write } for pid=3482 comm="syz.0.31531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 3651.680315][ T31] kauditd_printk_skb: 318 callbacks suppressed [ 3651.680397][ T31] audit: type=1400 audit(3651.610:61067): avc: denied { read } for pid=3611 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3651.693744][ T3612] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=136 sclass=netlink_audit_socket pid=3612 comm=syz.1.31596 [ 3651.701386][ T31] audit: type=1400 audit(3651.630:61068): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3651.702571][ T31] audit: type=1400 audit(3651.630:61069): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3651.703467][ T31] audit: type=1400 audit(3651.630:61070): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3651.704158][ T31] audit: type=1400 audit(3651.630:61071): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3651.704844][ T31] audit: type=1400 audit(3651.630:61072): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3651.720562][ T31] audit: type=1400 audit(3651.650:61073): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3651.721890][ T31] audit: type=1400 audit(3651.650:61074): avc: denied { open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3651.723056][ T31] audit: type=1400 audit(3651.650:61075): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3651.753677][ T31] audit: type=1400 audit(3651.680:61076): avc: denied { read } for pid=3613 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3656.722460][ T31] kauditd_printk_skb: 336 callbacks suppressed [ 3656.722566][ T31] audit: type=1400 audit(3656.650:61413): avc: denied { read } for pid=3750 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3656.733265][ T31] audit: type=1400 audit(3656.660:61414): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3656.734461][ T31] audit: type=1400 audit(3656.660:61415): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3656.739295][ T31] audit: type=1400 audit(3656.660:61416): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3656.740127][ T31] audit: type=1400 audit(3656.660:61417): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3656.740832][ T31] audit: type=1400 audit(3656.660:61418): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3656.742631][ T31] audit: type=1400 audit(3656.670:61419): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3656.744230][ T31] audit: type=1400 audit(3656.670:61420): avc: denied { read write open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3656.746487][ T31] audit: type=1400 audit(3656.680:61421): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3656.798231][ T31] audit: type=1400 audit(3656.730:61422): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3657.042056][ T3757] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3757 comm=syz.1.31666 [ 3661.598668][ T3877] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3877 comm=syz.1.31725 [ 3661.737761][ T31] kauditd_printk_skb: 339 callbacks suppressed [ 3661.737841][ T31] audit: type=1400 audit(3661.670:61762): avc: denied { read } for pid=3879 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3661.754305][ T31] audit: type=1400 audit(3661.680:61763): avc: denied { read } for pid=3880 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3661.787747][ T31] audit: type=1400 audit(3661.720:61764): avc: denied { read } for pid=3880 comm="syz.0.31733" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3661.799840][ T31] audit: type=1400 audit(3661.720:61765): avc: denied { open } for pid=3880 comm="syz.0.31733" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3661.839813][ T31] audit: type=1400 audit(3661.770:61766): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3661.856817][ T31] audit: type=1400 audit(3661.770:61767): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3661.862693][ T31] audit: type=1400 audit(3661.790:61768): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3661.881078][ T31] audit: type=1400 audit(3661.800:61769): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3661.908722][ T31] audit: type=1400 audit(3661.800:61770): avc: denied { open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3661.909720][ T31] audit: type=1400 audit(3661.800:61771): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3664.370274][ T3947] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3947 comm=syz.0.31761 [ 3666.759246][ T31] kauditd_printk_skb: 309 callbacks suppressed [ 3666.759358][ T31] audit: type=1400 audit(3666.690:62081): avc: denied { ioctl } for pid=4008 comm="syz.0.31796" path="socket:[216311]" dev="sockfs" ino=216311 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3666.780216][ T31] audit: type=1400 audit(3666.710:62082): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3666.781334][ T31] audit: type=1400 audit(3666.710:62083): avc: denied { open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3666.782296][ T31] audit: type=1400 audit(3666.710:62084): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3666.790771][ T31] audit: type=1400 audit(3666.720:62085): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3666.791676][ T31] audit: type=1400 audit(3666.720:62086): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3666.792586][ T31] audit: type=1400 audit(3666.720:62087): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3666.793484][ T31] audit: type=1400 audit(3666.720:62088): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3666.794319][ T31] audit: type=1400 audit(3666.720:62089): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3666.829351][ T31] audit: type=1400 audit(3666.760:62090): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3667.277838][ T4023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4023 comm=syz.1.31799 [ 3668.670530][ T4061] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=4061 comm=syz.1.31818 [ 3671.767858][ T31] kauditd_printk_skb: 324 callbacks suppressed [ 3671.767940][ T31] audit: type=1400 audit(3671.700:62415): avc: denied { read } for pid=4140 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3671.779115][ T31] audit: type=1400 audit(3671.710:62416): avc: denied { read } for pid=4139 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3671.791649][ T31] audit: type=1400 audit(3671.720:62417): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3671.798435][ T31] audit: type=1400 audit(3671.730:62418): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3671.805810][ T31] audit: type=1400 audit(3671.730:62419): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3671.806511][ T31] audit: type=1400 audit(3671.730:62420): avc: denied { read } for pid=4139 comm="syz.0.31859" name="nbd0" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3671.807157][ T31] audit: type=1400 audit(3671.730:62421): avc: denied { read open } for pid=4139 comm="syz.0.31859" path="/dev/nbd0" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3671.807774][ T31] audit: type=1400 audit(3671.730:62422): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3671.813512][ T31] audit: type=1400 audit(3671.730:62423): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3671.820370][ T31] audit: type=1400 audit(3671.750:62424): avc: denied { ioctl } for pid=4139 comm="syz.0.31859" path="/dev/nbd0" dev="devtmpfs" ino=651 ioctlcmd=0xab01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3676.779494][ T31] kauditd_printk_skb: 259 callbacks suppressed [ 3676.779600][ T31] audit: type=1400 audit(3676.710:62684): avc: denied { read } for pid=4244 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3676.799135][ T31] audit: type=1400 audit(3676.730:62685): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3676.808631][ T31] audit: type=1400 audit(3676.740:62686): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3676.809585][ T31] audit: type=1400 audit(3676.740:62687): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3676.810430][ T31] audit: type=1400 audit(3676.740:62688): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3676.811220][ T31] audit: type=1400 audit(3676.740:62689): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3676.845819][ T31] audit: type=1400 audit(3676.760:62690): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3676.846740][ T31] audit: type=1400 audit(3676.760:62691): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3676.847796][ T31] audit: type=1400 audit(3676.770:62692): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3676.865946][ T31] audit: type=1400 audit(3676.780:62693): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3677.459331][ T4261] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4261 comm=syz.1.31918 [ 3681.816043][ T31] kauditd_printk_skb: 324 callbacks suppressed [ 3681.816135][ T31] audit: type=1400 audit(3681.740:63018): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3681.827160][ T31] audit: type=1400 audit(3681.750:63019): avc: denied { read } for pid=4368 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3681.828951][ T31] audit: type=1400 audit(3681.750:63020): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3681.829963][ T31] audit: type=1400 audit(3681.750:63021): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3681.839365][ T31] audit: type=1400 audit(3681.770:63022): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3681.840328][ T31] audit: type=1400 audit(3681.770:63023): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3681.841203][ T31] audit: type=1400 audit(3681.770:63024): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3681.841983][ T31] audit: type=1400 audit(3681.770:63025): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3681.842862][ T31] audit: type=1400 audit(3681.770:63026): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3681.922806][ T31] audit: type=1400 audit(3681.840:63027): avc: denied { read } for pid=4370 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3682.687869][ T4391] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=4391 comm=syz.1.31981 [ 3684.640929][ T4441] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=6 sclass=netlink_tcpdiag_socket pid=4441 comm=syz.0.32011 [ 3684.649646][ T4442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4442 comm=syz.1.32004 [ 3686.825518][ T31] kauditd_printk_skb: 305 callbacks suppressed [ 3686.825603][ T31] audit: type=1400 audit(3686.750:63333): avc: denied { read } for pid=4484 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3686.839349][ T31] audit: type=1400 audit(3686.770:63334): avc: denied { read } for pid=4485 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3686.851407][ T31] audit: type=1400 audit(3686.770:63335): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3686.854743][ T31] audit: type=1400 audit(3686.780:63337): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3686.855885][ T31] audit: type=1400 audit(3686.780:63336): avc: denied { read } for pid=4485 comm="syz.0.32029" name="audio1" dev="devtmpfs" ino=739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3686.856595][ T31] audit: type=1400 audit(3686.780:63338): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3686.857169][ T31] audit: type=1400 audit(3686.780:63340): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3686.857879][ T31] audit: type=1400 audit(3686.780:63339): avc: denied { open } for pid=4485 comm="syz.0.32029" path="/dev/audio1" dev="devtmpfs" ino=739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3686.858641][ T31] audit: type=1400 audit(3686.780:63341): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3686.879493][ T31] audit: type=1400 audit(3686.810:63342): avc: denied { ioctl } for pid=4485 comm="syz.0.32029" path="/dev/audio1" dev="devtmpfs" ino=739 ioctlcmd=0x3313 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3691.876874][ T31] kauditd_printk_skb: 292 callbacks suppressed [ 3691.876976][ T31] audit: type=1400 audit(3691.810:63635): avc: denied { read } for pid=4602 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3691.891486][ T31] audit: type=1400 audit(3691.820:63636): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3691.892522][ T31] audit: type=1400 audit(3691.820:63637): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3691.893295][ T31] audit: type=1400 audit(3691.820:63638): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3691.894241][ T31] audit: type=1400 audit(3691.820:63639): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3691.894928][ T31] audit: type=1400 audit(3691.820:63640): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3691.902502][ T31] audit: type=1400 audit(3691.830:63641): avc: denied { create } for pid=4602 comm="syz.0.32088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3691.906654][ T31] audit: type=1400 audit(3691.830:63642): avc: denied { ioctl } for pid=4602 comm="syz.0.32088" path="socket:[217525]" dev="sockfs" ino=217525 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3691.917331][ T31] audit: type=1400 audit(3691.830:63643): avc: denied { read open } for pid=4602 comm="syz.0.32088" path="net:[4026532661]" dev="nsfs" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3691.964068][ T31] audit: type=1400 audit(3691.890:63644): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3696.231508][ T4681] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4681 comm=syz.0.32127 [ 3696.919497][ T31] kauditd_printk_skb: 209 callbacks suppressed [ 3696.919590][ T31] audit: type=1400 audit(3696.850:63854): avc: denied { read } for pid=4688 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3697.064229][ T31] audit: type=1400 audit(3696.990:63855): avc: denied { read } for pid=4690 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3697.084466][ T31] audit: type=1400 audit(3697.010:63856): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3697.092741][ T31] audit: type=1400 audit(3697.010:63857): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3697.093936][ T31] audit: type=1400 audit(3697.010:63858): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3697.094664][ T31] audit: type=1400 audit(3697.010:63859): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3697.108363][ T31] audit: type=1400 audit(3697.040:63860): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3697.113307][ T31] audit: type=1400 audit(3697.040:63861): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3697.114138][ T31] audit: type=1400 audit(3697.040:63862): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3697.114860][ T31] audit: type=1400 audit(3697.040:63863): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3697.639239][ T4705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=4705 comm=syz.1.32138 [ 3701.223362][ T4758] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4758 comm=syz.0.32164 [ 3701.947829][ T31] kauditd_printk_skb: 197 callbacks suppressed [ 3701.947943][ T31] audit: type=1400 audit(3701.880:64061): avc: denied { read } for pid=4765 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3701.979808][ T31] audit: type=1400 audit(3701.910:64062): avc: denied { read } for pid=4764 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3702.106752][ T31] audit: type=1400 audit(3702.040:64063): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3702.108035][ T31] audit: type=1400 audit(3702.040:64064): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3702.109016][ T31] audit: type=1400 audit(3702.040:64065): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3702.122781][ T31] audit: type=1400 audit(3702.050:64066): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3702.126974][ T31] audit: type=1400 audit(3702.060:64067): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3702.139673][ T31] audit: type=1400 audit(3702.060:64068): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3702.164056][ T31] audit: type=1400 audit(3702.080:64069): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3702.176380][ T31] audit: type=1400 audit(3702.080:64070): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3707.015601][ T31] kauditd_printk_skb: 138 callbacks suppressed [ 3707.015715][ T31] audit: type=1400 audit(3706.930:64209): avc: denied { read } for pid=4821 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3707.038639][ T31] audit: type=1400 audit(3706.970:64210): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3707.039992][ T31] audit: type=1400 audit(3706.970:64211): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3707.042235][ T31] audit: type=1400 audit(3706.970:64212): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3707.043489][ T31] audit: type=1400 audit(3706.970:64213): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3707.046126][ T31] audit: type=1400 audit(3706.970:64214): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3707.061197][ T31] audit: type=1400 audit(3706.990:64215): avc: denied { read } for pid=4820 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3707.082867][ T31] audit: type=1400 audit(3707.010:64216): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3707.083767][ T31] audit: type=1400 audit(3707.010:64217): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3707.084501][ T31] audit: type=1400 audit(3707.010:64218): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3708.279825][ T4847] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1 sclass=netlink_tcpdiag_socket pid=4847 comm=syz.1.32208 [ 3708.493342][ T4853] SELinux: Context system_u:object_r:hald_mac_exec_t:s0 is not valid (left unmapped). [ 3712.043480][ T31] kauditd_printk_skb: 275 callbacks suppressed [ 3712.043590][ T31] audit: type=1400 audit(3711.970:64494): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3712.056109][ T31] audit: type=1400 audit(3711.970:64495): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3712.056912][ T31] audit: type=1400 audit(3711.970:64496): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3712.061760][ T31] audit: type=1400 audit(3711.990:64497): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3712.063238][ T31] audit: type=1400 audit(3711.990:64498): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3712.063991][ T31] audit: type=1400 audit(3711.990:64499): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3712.064677][ T31] audit: type=1400 audit(3711.990:64500): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3712.095619][ T31] audit: type=1400 audit(3711.990:64501): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3712.100248][ T31] audit: type=1400 audit(3712.030:64502): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3712.100967][ T31] audit: type=1400 audit(3712.030:64503): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3717.104369][ T31] kauditd_printk_skb: 312 callbacks suppressed [ 3717.104458][ T31] audit: type=1400 audit(3717.030:64816): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3717.124998][ T31] audit: type=1400 audit(3717.050:64817): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3717.137655][ T31] audit: type=1400 audit(3717.070:64818): avc: denied { read write open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3717.138888][ T31] audit: type=1400 audit(3717.070:64819): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3717.156344][ T31] audit: type=1400 audit(3717.080:64820): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3717.157161][ T31] audit: type=1400 audit(3717.080:64821): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3717.157764][ T31] audit: type=1400 audit(3717.080:64822): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3717.158333][ T31] audit: type=1400 audit(3717.080:64823): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3717.255613][ T31] audit: type=1400 audit(3717.180:64824): avc: denied { read } for pid=5048 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3717.307740][ T31] audit: type=1400 audit(3717.240:64825): avc: denied { write } for pid=5048 comm="syz.1.32309" name="mouse0" dev="devtmpfs" ino=761 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3721.476687][ T5138] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5138 comm=syz.0.32353 [ 3722.141488][ T31] kauditd_printk_skb: 287 callbacks suppressed [ 3722.141562][ T31] audit: type=1400 audit(3722.070:65113): avc: denied { read } for pid=5154 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3722.151717][ T31] audit: type=1400 audit(3722.080:65114): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3722.152481][ T31] audit: type=1400 audit(3722.080:65115): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3722.153077][ T31] audit: type=1400 audit(3722.080:65116): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3722.154642][ T31] audit: type=1400 audit(3722.080:65117): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3722.156271][ T31] audit: type=1400 audit(3722.080:65118): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3722.165554][ T31] audit: type=1400 audit(3722.090:65119): avc: denied { create } for pid=5154 comm="syz.0.32362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3722.170372][ T31] audit: type=1400 audit(3722.100:65120): avc: denied { ioctl } for pid=5154 comm="syz.0.32362" path="socket:[219079]" dev="sockfs" ino=219079 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3722.196953][ T31] audit: type=1400 audit(3722.130:65121): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3722.198174][ T31] audit: type=1400 audit(3722.130:65122): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3727.152529][ T31] kauditd_printk_skb: 250 callbacks suppressed [ 3727.152620][ T31] audit: type=1400 audit(3727.080:65373): avc: denied { read } for pid=5259 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3727.159510][ T31] audit: type=1400 audit(3727.090:65374): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3727.163896][ T31] audit: type=1400 audit(3727.090:65375): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3727.172578][ T31] audit: type=1400 audit(3727.100:65376): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3727.173322][ T31] audit: type=1400 audit(3727.100:65377): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3727.173922][ T31] audit: type=1400 audit(3727.100:65378): avc: denied { open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3727.174838][ T31] audit: type=1400 audit(3727.100:65379): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3727.195509][ T31] audit: type=1400 audit(3727.120:65380): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3727.196324][ T31] audit: type=1400 audit(3727.120:65381): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3727.247385][ T31] audit: type=1400 audit(3727.180:65382): avc: denied { create } for pid=5259 comm="syz.0.32410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3731.449486][ T5308] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5308 comm=syz.1.32433 [ 3732.232747][ T31] kauditd_printk_skb: 154 callbacks suppressed [ 3732.232805][ T31] audit: type=1400 audit(3732.160:65537): avc: denied { read } for pid=5317 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3732.257044][ T31] audit: type=1400 audit(3732.190:65538): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3732.259627][ T31] audit: type=1400 audit(3732.190:65539): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3732.260526][ T31] audit: type=1400 audit(3732.190:65540): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3732.268648][ T31] audit: type=1400 audit(3732.200:65541): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3732.269805][ T31] audit: type=1400 audit(3732.200:65542): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3732.316908][ T31] audit: type=1400 audit(3732.240:65543): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3732.317978][ T31] audit: type=1400 audit(3732.250:65544): avc: denied { open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3732.318950][ T31] audit: type=1400 audit(3732.250:65545): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3732.425759][ T31] audit: type=1400 audit(3732.350:65546): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3733.026001][ T5324] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2573 sclass=netlink_xfrm_socket pid=5324 comm=syz.1.32441 [ 3734.556627][ T5340] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5340 comm=syz.1.32447 [ 3736.286518][ T5379] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5379 comm=syz.0.32468 [ 3737.250915][ T31] kauditd_printk_skb: 236 callbacks suppressed [ 3737.251059][ T31] audit: type=1400 audit(3737.180:65783): avc: denied { read } for pid=5406 comm="syz.1.32482" name="vsock" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3737.254160][ T31] audit: type=1400 audit(3737.180:65784): avc: denied { open } for pid=5406 comm="syz.1.32482" path="/dev/vsock" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3737.261566][ T31] audit: type=1400 audit(3737.190:65785): avc: denied { create } for pid=5407 comm="syz.0.32483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3737.266197][ T31] audit: type=1400 audit(3737.200:65786): avc: denied { ioctl } for pid=5407 comm="syz.0.32483" path="socket:[220493]" dev="sockfs" ino=220493 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3737.270149][ T31] audit: type=1400 audit(3737.200:65787): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3737.287303][ T31] audit: type=1400 audit(3737.200:65788): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3737.288888][ T31] audit: type=1400 audit(3737.220:65789): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3737.289711][ T31] audit: type=1400 audit(3737.220:65790): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3737.290183][ T31] audit: type=1400 audit(3737.220:65791): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3737.296462][ T31] audit: type=1400 audit(3737.230:65792): avc: denied { ioctl } for pid=5406 comm="syz.1.32482" path="/dev/vsock" dev="devtmpfs" ino=763 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3738.762271][ T5443] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=6 sclass=netlink_tcpdiag_socket pid=5443 comm=syz.1.32499 [ 3740.412449][ T5486] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pid=5486 comm=syz.1.32520 [ 3742.293429][ T31] kauditd_printk_skb: 304 callbacks suppressed [ 3742.293523][ T31] audit: type=1400 audit(3742.220:66097): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3742.307365][ T31] audit: type=1400 audit(3742.230:66098): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3742.308470][ T31] audit: type=1400 audit(3742.230:66099): avc: denied { read write open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3742.309360][ T31] audit: type=1400 audit(3742.230:66100): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3742.310122][ T31] audit: type=1400 audit(3742.240:66101): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3742.311105][ T31] audit: type=1400 audit(3742.240:66102): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3742.311995][ T31] audit: type=1400 audit(3742.240:66103): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3742.312868][ T31] audit: type=1400 audit(3742.240:66104): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3742.413614][ T31] audit: type=1400 audit(3742.340:66105): avc: denied { read } for pid=5527 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3742.443468][ T31] audit: type=1400 audit(3742.370:66106): avc: denied { read write } for pid=5527 comm="syz.1.32542" name="ttyprintk" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3746.528132][ T5625] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=5625 comm=syz.1.32590 [ 3747.347151][ T31] kauditd_printk_skb: 288 callbacks suppressed [ 3747.347225][ T31] audit: type=1400 audit(3747.270:66395): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3747.347940][ T31] audit: type=1400 audit(3747.270:66396): avc: denied { read } for pid=5643 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3747.349383][ T31] audit: type=1400 audit(3747.280:66397): avc: denied { read write open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3747.352391][ T31] audit: type=1400 audit(3747.280:66398): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3747.359175][ T31] audit: type=1400 audit(3747.290:66399): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3747.375055][ T31] audit: type=1400 audit(3747.300:66401): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3747.385092][ T31] audit: type=1400 audit(3747.300:66400): avc: denied { read } for pid=5643 comm="syz.1.32597" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3747.403282][ T31] audit: type=1400 audit(3747.300:66402): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3747.404239][ T31] audit: type=1400 audit(3747.300:66403): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3747.405190][ T31] audit: type=1400 audit(3747.300:66404): avc: denied { open } for pid=5643 comm="syz.1.32597" path="/dev/urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3750.018321][ T5701] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1005 sclass=netlink_route_socket pid=5701 comm=syz.0.32627 [ 3752.362443][ T31] kauditd_printk_skb: 287 callbacks suppressed [ 3752.362519][ T31] audit: type=1400 audit(3752.290:66692): avc: denied { read } for pid=5757 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3752.373591][ T31] audit: type=1400 audit(3752.300:66693): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3752.374493][ T31] audit: type=1400 audit(3752.300:66694): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3752.379736][ T31] audit: type=1400 audit(3752.300:66695): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3752.389657][ T31] audit: type=1400 audit(3752.320:66696): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3752.390723][ T31] audit: type=1400 audit(3752.320:66697): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3752.402910][ T31] audit: type=1400 audit(3752.330:66698): avc: denied { create } for pid=5757 comm="syz.0.32656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3752.412390][ T31] audit: type=1400 audit(3752.340:66699): avc: denied { write } for pid=5757 comm="syz.0.32656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3752.444566][ T31] audit: type=1400 audit(3752.370:66700): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3752.456739][ T31] audit: type=1400 audit(3752.380:66701): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3757.408725][ T31] kauditd_printk_skb: 181 callbacks suppressed [ 3757.408818][ T31] audit: type=1400 audit(3757.340:66883): avc: denied { read } for pid=5832 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3757.412161][ T31] audit: type=1400 audit(3757.340:66884): avc: denied { read } for pid=5831 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3757.424027][ T31] audit: type=1400 audit(3757.350:66885): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3757.424996][ T31] audit: type=1400 audit(3757.350:66886): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3757.436941][ T31] audit: type=1400 audit(3757.360:66887): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3757.438121][ T31] audit: type=1400 audit(3757.360:66888): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3757.439182][ T31] audit: type=1400 audit(3757.360:66889): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3757.519816][ T31] audit: type=1400 audit(3757.450:66890): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3757.524427][ T31] audit: type=1400 audit(3757.450:66891): avc: denied { read write open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3757.544461][ T31] audit: type=1400 audit(3757.450:66892): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3759.238686][ T5879] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5879 comm=syz.0.32716 [ 3762.119171][ T5956] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5956 comm=syz.0.32752 [ 3762.429026][ T31] kauditd_printk_skb: 313 callbacks suppressed [ 3762.429229][ T31] audit: type=1400 audit(3762.360:67206): avc: denied { read } for pid=5962 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3762.478559][ T31] audit: type=1400 audit(3762.410:67207): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3762.483760][ T31] audit: type=1400 audit(3762.410:67208): avc: denied { open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3762.496895][ T31] audit: type=1400 audit(3762.420:67209): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3762.545232][ T31] audit: type=1400 audit(3762.470:67210): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3762.547038][ T31] audit: type=1400 audit(3762.470:67211): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3762.547697][ T31] audit: type=1400 audit(3762.470:67212): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3762.571210][ T31] audit: type=1400 audit(3762.500:67214): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3762.572167][ T31] audit: type=1400 audit(3762.500:67215): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3762.572868][ T31] audit: type=1400 audit(3762.500:67216): avc: denied { write } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3767.487428][ T31] kauditd_printk_skb: 325 callbacks suppressed [ 3767.487542][ T31] audit: type=1400 audit(3767.420:67541): avc: denied { read } for pid=6089 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3767.499849][ T31] audit: type=1400 audit(3767.430:67542): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3767.509360][ T31] audit: type=1400 audit(3767.440:67543): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3767.514007][ T31] audit: type=1400 audit(3767.440:67544): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3767.516243][ T31] audit: type=1400 audit(3767.450:67545): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3767.524227][ T31] audit: type=1400 audit(3767.450:67546): avc: denied { read } for pid=6089 comm="syz.1.32822" dev="nsfs" ino=4026532759 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3767.525603][ T31] audit: type=1400 audit(3767.450:67547): avc: denied { open } for pid=6089 comm="syz.1.32822" path="net:[4026532759]" dev="nsfs" ino=4026532759 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3767.527869][ T31] audit: type=1400 audit(3767.460:67548): avc: denied { read } for pid=6090 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3767.540183][ T31] audit: type=1400 audit(3767.470:67549): avc: denied { create } for pid=6089 comm="syz.1.32822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3767.541142][ T31] audit: type=1400 audit(3767.470:67550): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3767.919136][ T6100] sctp: [Deprecated]: syz.0.32826 (pid 6100) Use of struct sctp_assoc_value in delayed_ack socket option. [ 3767.919136][ T6100] Use struct sctp_sack_info instead [ 3772.502106][ T31] kauditd_printk_skb: 282 callbacks suppressed [ 3772.503036][ T31] audit: type=1400 audit(3772.430:67833): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3772.521613][ T31] audit: type=1400 audit(3772.440:67834): avc: denied { read write open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3772.522524][ T31] audit: type=1400 audit(3772.440:67835): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3772.580543][ T31] audit: type=1400 audit(3772.500:67836): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3772.583963][ T31] audit: type=1400 audit(3772.500:67837): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3772.584741][ T31] audit: type=1400 audit(3772.500:67838): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3772.591810][ T31] audit: type=1400 audit(3772.500:67839): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3772.592675][ T31] audit: type=1400 audit(3772.500:67840): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3772.605701][ T31] audit: type=1400 audit(3772.520:67841): avc: denied { read } for pid=6200 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3772.620406][ T31] audit: type=1400 audit(3772.550:67842): avc: denied { read } for pid=6201 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3777.517813][ T31] kauditd_printk_skb: 126 callbacks suppressed [ 3777.517936][ T31] audit: type=1400 audit(3777.450:67969): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3777.518888][ T31] audit: type=1400 audit(3777.450:67970): avc: denied { open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3777.520086][ T31] audit: type=1400 audit(3777.450:67971): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3777.551072][ T31] audit: type=1400 audit(3777.480:67972): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3777.558404][ T31] audit: type=1400 audit(3777.490:67973): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.571669][ T31] audit: type=1400 audit(3777.500:67974): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3777.574529][ T31] audit: type=1400 audit(3777.500:67975): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3777.595952][ T31] audit: type=1400 audit(3777.510:67976): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3777.596629][ T31] audit: type=1400 audit(3777.510:67977): avc: denied { read } for pid=6252 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3777.666463][ T31] audit: type=1400 audit(3777.520:67978): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3782.437042][ T6324] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=6324 comm=syz.1.32935 [ 3782.530108][ T31] kauditd_printk_skb: 188 callbacks suppressed [ 3782.530199][ T31] audit: type=1400 audit(3782.460:68167): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3782.536851][ T31] audit: type=1400 audit(3782.460:68168): avc: denied { open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3782.538651][ T31] audit: type=1400 audit(3782.470:68169): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3782.602791][ T31] audit: type=1400 audit(3782.530:68170): avc: denied { read } for pid=6325 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3782.629158][ T31] audit: type=1400 audit(3782.560:68171): avc: denied { read } for pid=6325 comm="syz.1.32938" dev="nsfs" ino=4026532759 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3782.630558][ T31] audit: type=1400 audit(3782.560:68172): avc: denied { open } for pid=6325 comm="syz.1.32938" path="net:[4026532759]" dev="nsfs" ino=4026532759 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3782.633965][ T31] audit: type=1400 audit(3782.560:68173): avc: denied { create } for pid=6325 comm="syz.1.32938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3782.674371][ T31] audit: type=1400 audit(3782.600:68174): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3782.677213][ T31] audit: type=1400 audit(3782.610:68175): avc: denied { open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3782.678823][ T31] audit: type=1400 audit(3782.610:68176): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3787.826193][ T31] kauditd_printk_skb: 84 callbacks suppressed [ 3787.826359][ T31] audit: type=1400 audit(3787.740:68261): avc: denied { read } for pid=6357 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3787.919368][ T31] audit: type=1400 audit(3787.850:68262): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3787.941885][ T31] audit: type=1400 audit(3787.870:68263): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3787.945999][ T31] audit: type=1400 audit(3787.870:68264): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3787.947229][ T31] audit: type=1400 audit(3787.870:68265): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3787.951117][ T31] audit: type=1400 audit(3787.870:68266): avc: denied { read write } for pid=6357 comm="syz.1.32954" name="dsp1" dev="devtmpfs" ino=738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3787.976385][ T31] audit: type=1400 audit(3787.870:68267): avc: denied { read open } for pid=6357 comm="syz.1.32954" path="/dev/dsp1" dev="devtmpfs" ino=738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3787.977282][ T31] audit: type=1400 audit(3787.870:68268): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3787.977942][ T31] audit: type=1400 audit(3787.890:68269): avc: denied { ioctl } for pid=6357 comm="syz.1.32954" path="/dev/dsp1" dev="devtmpfs" ino=738 ioctlcmd=0x4dfd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3788.170354][ T31] audit: type=1400 audit(3788.100:68270): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3791.910928][ T6406] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2573 sclass=netlink_xfrm_socket pid=6406 comm=syz.0.32975 [ 3792.862229][ T31] kauditd_printk_skb: 196 callbacks suppressed [ 3792.862330][ T31] audit: type=1400 audit(3792.790:68467): avc: denied { read } for pid=6427 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3792.880917][ T31] audit: type=1400 audit(3792.810:68468): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3792.883833][ T31] audit: type=1400 audit(3792.810:68469): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3792.884631][ T31] audit: type=1400 audit(3792.810:68470): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3792.903012][ T31] audit: type=1400 audit(3792.810:68471): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3792.911168][ T31] audit: type=1400 audit(3792.810:68472): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3792.928536][ T31] audit: type=1400 audit(3792.850:68473): avc: denied { read append } for pid=6427 comm="syz.0.32990" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3792.930729][ T31] audit: type=1400 audit(3792.850:68474): avc: denied { open } for pid=6427 comm="syz.0.32990" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3792.931783][ T31] audit: type=1400 audit(3792.860:68475): avc: denied { ioctl } for pid=6427 comm="syz.0.32990" path="/dev/vcs" dev="devtmpfs" ino=13 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3792.950433][ T31] audit: type=1400 audit(3792.880:68476): avc: denied { read } for pid=6428 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3795.520854][ T6494] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6494 comm=syz.0.33022 [ 3796.026987][ T6506] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6506 comm=syz.1.33028 [ 3796.280681][ T6512] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6512 comm=syz.1.33030 [ 3797.902830][ T31] kauditd_printk_skb: 318 callbacks suppressed [ 3797.902925][ T31] audit: type=1400 audit(3797.830:68795): avc: denied { read write } for pid=3114 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3797.904277][ T31] audit: type=1400 audit(3797.830:68796): avc: denied { read write open } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3797.905117][ T31] audit: type=1400 audit(3797.830:68797): avc: denied { ioctl } for pid=3114 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3797.916961][ T31] audit: type=1400 audit(3797.840:68798): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3797.928011][ T31] audit: type=1400 audit(3797.860:68799): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3797.930964][ T31] audit: type=1400 audit(3797.860:68800): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3797.936204][ T31] audit: type=1400 audit(3797.860:68801): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3797.937104][ T31] audit: type=1400 audit(3797.860:68802): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3797.955914][ T31] audit: type=1400 audit(3797.870:68803): avc: denied { read } for pid=6551 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3797.963784][ T31] audit: type=1400 audit(3797.890:68804): avc: denied { read } for pid=6552 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:dhcp_etc_t:s0" [ 3828.937658][ T31] kauditd_printk_skb: 69 callbacks suppressed [ 3828.937738][ T31] audit: type=1400 audit(3828.870:68874): avc: denied { execute } for pid=6587 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3828.951798][ T31] audit: type=1400 audit(3828.880:68875): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3828.960067][ T31] audit: type=1400 audit(3828.890:68876): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3828.961322][ T31] audit: type=1400 audit(3828.890:68877): avc: denied { execute_no_trans } for pid=6587 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3828.985908][ T31] audit: type=1400 audit(3828.900:68878): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3828.986712][ T31] audit: type=1400 audit(3828.900:68879): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3828.987409][ T31] audit: type=1400 audit(3828.900:68880): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3828.988048][ T31] audit: type=1400 audit(3828.910:68881): avc: denied { execute } for pid=6587 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3829.029669][ T31] audit: type=1400 audit(3828.960:68882): avc: denied { execmem } for pid=6587 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3829.054490][ T31] audit: type=1400 audit(3828.980:68883): avc: denied { read } for pid=6589 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3831.561982][ T6589] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3831.576286][ T6589] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3831.743542][ T6591] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3831.753975][ T6591] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3832.885175][ T6589] hsr_slave_0: entered promiscuous mode [ 3832.889292][ T6589] hsr_slave_1: entered promiscuous mode [ 3832.891643][ T6589] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3832.892089][ T6589] Cannot create hsr debugfs directory [ 3833.048608][ T6591] hsr_slave_0: entered promiscuous mode [ 3833.052971][ T6591] hsr_slave_1: entered promiscuous mode [ 3833.055156][ T6591] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 3833.060076][ T6591] Cannot create hsr debugfs directory [ 3833.419748][ T6589] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3833.464523][ T6589] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3833.534161][ T6589] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3833.609154][ T6589] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3833.747117][ T6591] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3833.754467][ T6589] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 3833.763810][ T6589] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 3833.772230][ T6589] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 3833.778902][ T6589] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 3833.798960][ T6591] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3833.872332][ T6591] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3833.937741][ T6591] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3833.972471][ T31] kauditd_printk_skb: 114 callbacks suppressed [ 3833.972552][ T31] audit: type=1400 audit(3833.900:68998): avc: denied { sys_module } for pid=6589 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3833.973449][ T31] audit: type=1400 audit(3833.900:68999): avc: denied { module_request } for pid=6589 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3834.078452][ T31] audit: type=1400 audit(3834.010:69000): avc: denied { create } for pid=6591 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3834.080919][ T31] audit: type=1400 audit(3834.010:69001): avc: denied { write } for pid=6591 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3834.093680][ T6591] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 3834.108796][ T6591] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 3834.116397][ T31] audit: type=1400 audit(3834.010:69002): avc: denied { read } for pid=6591 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3834.117429][ T31] audit: type=1400 audit(3834.030:69003): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3834.130884][ T6591] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 3834.134897][ T31] audit: type=1400 audit(3834.050:69004): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3834.137160][ T31] audit: type=1400 audit(3834.050:69005): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3834.143594][ T31] audit: type=1400 audit(3834.050:69006): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3834.144983][ T31] audit: type=1400 audit(3834.050:69007): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3834.177713][ T6591] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 3834.887608][ T6589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3835.181867][ T6591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3838.918588][ T6591] veth0_vlan: entered promiscuous mode [ 3838.954783][ T6591] veth1_vlan: entered promiscuous mode [ 3839.000773][ T6589] veth0_vlan: entered promiscuous mode [ 3839.026838][ T6591] veth0_macvtap: entered promiscuous mode [ 3839.032325][ T6589] veth1_vlan: entered promiscuous mode [ 3839.044533][ T6591] veth1_macvtap: entered promiscuous mode [ 3839.095094][ T6591] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3839.096114][ T6591] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3839.096574][ T6591] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3839.096806][ T6591] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3839.109113][ T31] kauditd_printk_skb: 118 callbacks suppressed [ 3839.109196][ T31] audit: type=1400 audit(3839.040:69126): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3839.117875][ T31] audit: type=1400 audit(3839.050:69127): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3839.118527][ T31] audit: type=1400 audit(3839.050:69128): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3839.119255][ T31] audit: type=1400 audit(3839.050:69129): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3839.119973][ T31] audit: type=1400 audit(3839.050:69130): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3839.131136][ T6589] veth0_macvtap: entered promiscuous mode [ 3839.165110][ T6589] veth1_macvtap: entered promiscuous mode [ 3839.200579][ T31] audit: type=1400 audit(3839.130:69131): avc: denied { mounton } for pid=6591 comm="syz-executor" path="/syzkaller.s0Imbq/syz-tmp" dev="vda" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 3839.205091][ T31] audit: type=1400 audit(3839.130:69132): avc: denied { mount } for pid=6591 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 3839.209496][ T31] audit: type=1400 audit(3839.130:69133): avc: denied { mounton } for pid=6591 comm="syz-executor" path="/syzkaller.s0Imbq/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3839.212944][ T31] audit: type=1400 audit(3839.140:69134): avc: denied { mount } for pid=6591 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3839.229964][ T31] audit: type=1400 audit(3839.140:69135): avc: denied { mounton } for pid=6591 comm="syz-executor" path="/syzkaller.s0Imbq/syz-tmp/newroot/selinux" dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3839.290789][ T6589] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3839.291355][ T6589] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3839.291652][ T6589] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3839.292121][ T6589] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3839.673508][ T7303] block nbd1: NBD_DISCONNECT [ 3839.778610][ T7308] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7308 comm=syz.1.33072 [ 3840.581887][ T7340] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=7340 comm=syz.0.33088 [ 3846.206902][ T31] kauditd_printk_skb: 339 callbacks suppressed [ 3846.207055][ T31] audit: type=1400 audit(3846.130:69475): avc: denied { read write } for pid=6591 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3846.208143][ T31] audit: type=1400 audit(3846.130:69476): avc: denied { open } for pid=6591 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3846.208958][ T31] audit: type=1400 audit(3846.130:69477): avc: denied { ioctl } for pid=6591 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3846.240204][ T31] audit: type=1400 audit(3846.170:69478): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3846.241395][ T31] audit: type=1400 audit(3846.170:69479): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3846.242238][ T31] audit: type=1400 audit(3846.170:69480): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3846.254766][ T31] audit: type=1400 audit(3846.170:69481): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3846.256393][ T31] audit: type=1400 audit(3846.170:69482): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3846.340228][ T31] audit: type=1400 audit(3846.270:69483): avc: denied { read write } for pid=6591 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3846.341754][ T31] audit: type=1400 audit(3846.270:69484): avc: denied { open } for pid=6591 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3847.009267][ T7469] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7469 comm=syz.1.33151 [ 3847.119158][ T7471] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7471 comm=syz.1.33152 [ 3847.232101][ T7473] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1794 sclass=netlink_route_socket pid=7473 comm=syz.1.33153 [ 3848.792363][ T7450] kexec: Could not allocate control_code_buffer [ 3849.529128][ T7527] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7527 comm=syz.0.33180 [ 3851.245832][ T31] kauditd_printk_skb: 296 callbacks suppressed [ 3851.245902][ T31] audit: type=1400 audit(3851.170:69781): avc: denied { read } for pid=7588 comm="syz.1.33211" dev="nsfs" ino=4026532946 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3851.248446][ T31] audit: type=1400 audit(3851.180:69782): avc: denied { open } for pid=7588 comm="syz.1.33211" path="cgroup:[4026532946]" dev="nsfs" ino=4026532946 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3851.251906][ T31] audit: type=1400 audit(3851.180:69783): avc: denied { ioctl } for pid=7588 comm="syz.1.33211" path="cgroup:[4026532946]" dev="nsfs" ino=4026532946 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3851.262906][ T31] audit: type=1400 audit(3851.190:69784): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3851.266356][ T31] audit: type=1400 audit(3851.190:69785): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3851.267387][ T31] audit: type=1400 audit(3851.190:69786): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3851.273702][ T31] audit: type=1400 audit(3851.200:69787): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3851.274559][ T31] audit: type=1400 audit(3851.200:69788): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3851.285108][ T31] audit: type=1400 audit(3851.210:69789): avc: denied { read write } for pid=6591 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3851.295804][ T31] audit: type=1400 audit(3851.220:69790): avc: denied { read write open } for pid=6591 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3851.981860][ T7622] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7622 comm=syz.1.33227 [ 3852.447600][ T7636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7636 comm=syz.0.33234 [ 3855.143477][ T7724] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7724 comm=syz.1.33279 [ 3856.304144][ T31] kauditd_printk_skb: 386 callbacks suppressed [ 3856.304253][ T31] audit: type=1400 audit(3856.230:70177): avc: denied { read write } for pid=7765 comm="syz.0.33300" name="uinput" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3856.312891][ T31] audit: type=1400 audit(3856.230:70178): avc: denied { open } for pid=7765 comm="syz.0.33300" path="/dev/uinput" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3856.313906][ T31] audit: type=1400 audit(3856.240:70179): avc: denied { setattr } for pid=7765 comm="syz.0.33300" name="uinput" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3856.319440][ T31] audit: type=1400 audit(3856.250:70180): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3856.336512][ T31] audit: type=1400 audit(3856.260:70181): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3856.337532][ T31] audit: type=1400 audit(3856.270:70182): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3856.338312][ T31] audit: type=1400 audit(3856.270:70183): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3856.339038][ T31] audit: type=1400 audit(3856.270:70184): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3856.345013][ T31] audit: type=1400 audit(3856.270:70185): avc: denied { read write } for pid=6589 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3856.356200][ T31] audit: type=1400 audit(3856.270:70186): avc: denied { read write } for pid=6591 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3856.809381][ T7782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7782 comm=syz.1.33307 [ 3861.396472][ T31] kauditd_printk_skb: 326 callbacks suppressed [ 3861.396562][ T31] audit: type=1400 audit(3861.320:70513): avc: denied { read write } for pid=6591 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3861.398045][ T31] audit: type=1400 audit(3861.330:70514): avc: denied { open } for pid=6591 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3861.398714][ T31] audit: type=1400 audit(3861.330:70515): avc: denied { ioctl } for pid=6591 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3861.419533][ T31] audit: type=1400 audit(3861.350:70516): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3861.422365][ T31] audit: type=1400 audit(3861.350:70517): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3861.423633][ T31] audit: type=1400 audit(3861.350:70518): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3861.424876][ T31] audit: type=1400 audit(3861.350:70519): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3861.440813][ T31] audit: type=1400 audit(3861.370:70520): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3861.473154][ T31] audit: type=1400 audit(3861.400:70521): avc: denied { read write } for pid=6589 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3861.475287][ T31] audit: type=1400 audit(3861.400:70522): avc: denied { open } for pid=6589 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3862.609533][ T7966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=7966 comm=syz.0.33399 [ 3863.817457][ T8001] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8001 comm=syz.0.33414 [ 3866.454651][ T31] kauditd_printk_skb: 291 callbacks suppressed [ 3866.454747][ T31] audit: type=1400 audit(3866.380:70814): avc: denied { create } for pid=8076 comm="syz.1.33453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3866.473483][ T31] audit: type=1400 audit(3866.400:70815): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3866.474405][ T31] audit: type=1400 audit(3866.400:70816): avc: denied { ioctl } for pid=8076 comm="syz.1.33453" path="socket:[228435]" dev="sockfs" ino=228435 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3866.477829][ T31] audit: type=1400 audit(3866.410:70817): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3866.483926][ T31] audit: type=1400 audit(3866.410:70818): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3866.486083][ T31] audit: type=1400 audit(3866.420:70819): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3866.488757][ T31] audit: type=1400 audit(3866.420:70820): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3866.493392][ T31] audit: type=1400 audit(3866.420:70821): avc: denied { read write } for pid=6589 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3866.494116][ T31] audit: type=1400 audit(3866.420:70822): avc: denied { open } for pid=6589 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3866.494839][ T31] audit: type=1400 audit(3866.420:70823): avc: denied { ioctl } for pid=6589 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3866.838841][ T8088] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=8088 comm=syz.0.33458 [ 3867.131728][ T8094] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=8094 comm=syz.0.33462 [ 3868.961785][ T8122] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8122 comm=syz.1.33475 [ 3871.537910][ T31] kauditd_printk_skb: 260 callbacks suppressed [ 3871.538016][ T31] audit: type=1400 audit(3871.470:71084): avc: denied { create } for pid=8194 comm="syz.0.33516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3871.556044][ T31] audit: type=1400 audit(3871.480:71085): avc: denied { write } for pid=8194 comm="syz.0.33516" path="socket:[227830]" dev="sockfs" ino=227830 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3871.560786][ T31] audit: type=1400 audit(3871.490:71086): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3871.568446][ T31] audit: type=1400 audit(3871.500:71087): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3871.580960][ T31] audit: type=1400 audit(3871.510:71088): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3871.581738][ T31] audit: type=1400 audit(3871.510:71089): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3871.582320][ T31] audit: type=1400 audit(3871.510:71090): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3871.606178][ T31] audit: type=1400 audit(3871.530:71091): avc: denied { read write } for pid=6591 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3871.607090][ T31] audit: type=1400 audit(3871.530:71092): avc: denied { open } for pid=6591 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3871.613822][ T31] audit: type=1400 audit(3871.530:71093): avc: denied { ioctl } for pid=6591 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3902.168468][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 3902.168542][ T31] audit: type=1400 audit(3902.100:71122): avc: denied { execute } for pid=8214 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3902.173097][ T31] audit: type=1400 audit(3902.100:71123): avc: denied { execute_no_trans } for pid=8214 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3902.177401][ T31] audit: type=1400 audit(3902.110:71124): avc: denied { execute } for pid=8214 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3902.180450][ T31] audit: type=1400 audit(3902.110:71125): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3902.182866][ T31] audit: type=1400 audit(3902.110:71126): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3902.189567][ T31] audit: type=1400 audit(3902.120:71127): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3902.205777][ T31] audit: type=1400 audit(3902.130:71128): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3902.219547][ T31] audit: type=1400 audit(3902.140:71129): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3902.245102][ T31] audit: type=1400 audit(3902.170:71130): avc: denied { execmem } for pid=8214 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3902.254254][ T31] audit: type=1400 audit(3902.180:71131): avc: denied { read } for pid=8215 comm="syz.1.33523" name="rtc0" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3907.940220][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 3907.940334][ T31] audit: type=1400 audit(3907.870:71191): avc: denied { write } for pid=8267 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3907.946948][ T31] audit: type=1400 audit(3907.870:71192): avc: denied { open } for pid=8267 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3907.966274][ T31] audit: type=1400 audit(3907.870:71193): avc: denied { getattr } for pid=8267 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3907.972416][ T31] audit: type=1400 audit(3907.870:71194): avc: denied { ioctl } for pid=8267 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3907.999201][ T31] audit: type=1400 audit(3907.890:71195): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3908.000277][ T31] audit: type=1400 audit(3907.890:71196): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3908.001266][ T31] audit: type=1400 audit(3907.900:71197): avc: denied { search } for pid=8267 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3908.002377][ T31] audit: type=1400 audit(3907.900:71198): avc: denied { search } for pid=8267 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3908.003418][ T31] audit: type=1400 audit(3907.910:71199): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3908.004567][ T31] audit: type=1400 audit(3907.910:71200): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3933.612522][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 3933.612635][ T31] audit: type=1400 audit(3933.540:71247): avc: denied { execute } for pid=8272 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3933.614808][ T31] audit: type=1400 audit(3933.540:71248): avc: denied { execute_no_trans } for pid=8272 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3933.624269][ T31] audit: type=1400 audit(3933.550:71249): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 3933.632604][ T31] audit: type=1400 audit(3933.560:71250): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3933.633655][ T31] audit: type=1400 audit(3933.560:71251): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3933.634321][ T31] audit: type=1400 audit(3933.560:71253): avc: denied { append open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3933.639041][ T31] audit: type=1400 audit(3933.560:71252): avc: denied { execute } for pid=8272 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3933.639904][ T31] audit: type=1400 audit(3933.560:71254): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3933.663993][ T31] audit: type=1400 audit(3933.590:71255): avc: denied { execmem } for pid=8272 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3933.692887][ T31] audit: type=1400 audit(3933.620:71256): avc: denied { read } for pid=8273 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4238.872055][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 4238.872169][ T31] audit: type=1400 audit(4238.800:71273): avc: denied { write } for pid=8303 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4238.880632][ T31] audit: type=1400 audit(4238.800:71274): avc: denied { open } for pid=8303 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4238.887434][ T31] audit: type=1400 audit(4238.810:71275): avc: denied { getattr } for pid=8303 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4238.894179][ T31] audit: type=1400 audit(4238.810:71276): avc: denied { ioctl } for pid=8303 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4238.905906][ T31] audit: type=1400 audit(4238.810:71277): avc: denied { read } for pid=2928 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 4238.910979][ T31] audit: type=1400 audit(4238.810:71278): avc: denied { search } for pid=2928 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4238.919319][ T31] audit: type=1400 audit(4238.810:71279): avc: denied { append } for pid=2928 comm="syslogd" name="messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4238.928179][ T31] audit: type=1400 audit(4238.810:71280): avc: denied { open } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4238.933482][ T31] audit: type=1400 audit(4238.810:71281): avc: denied { getattr } for pid=2928 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=13 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4238.941273][ T31] audit: type=1400 audit(4238.870:71282): avc: denied { search } for pid=8303 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4243.749071][ T32] INFO: task kworker/1:3:30309 blocked for more than 430 seconds. [ 4243.751832][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 4243.753192][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4243.753716][ T32] task:kworker/1:3 state:D stack:0 pid:30309 tgid:30309 ppid:2 flags:0x00000000 [ 4243.758131][ T32] Workqueue: events rfkill_global_led_trigger_worker [ 4243.759571][ T32] Call trace: [ 4243.760228][ T32] [<819bb4d4>] (__schedule) from [<819bc114>] (schedule+0x2c/0xfc) [ 4243.760816][ T32] r10:82c18205 r9:00000000 r8:827ec148 r7:00000002 r6:ee821e74 r5:84a7d400 [ 4243.761150][ T32] r4:84a7d400 [ 4243.761363][ T32] [<819bc0e8>] (schedule) from [<819bc4c8>] (schedule_preempt_disabled+0x18/0x24) [ 4243.761674][ T32] r5:84a7d400 r4:827ec144 [ 4243.761839][ T32] [<819bc4b0>] (schedule_preempt_disabled) from [<819befa0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4243.764699][ T32] [<819becb8>] (__mutex_lock.constprop.0) from [<819bf86c>] (__mutex_lock_slowpath+0x14/0x18) [ 4243.768453][ T32] r10:82c18205 r9:84a7d400 r8:01800000 r7:ddde40c0 r6:82c18200 r5:82931ed4 [ 4243.769354][ T32] r4:827ec144 [ 4243.770006][ T32] [<819bf858>] (__mutex_lock_slowpath) from [<819bf8ac>] (mutex_lock+0x3c/0x40) [ 4243.770717][ T32] [<819bf870>] (mutex_lock) from [<818c28a0>] (rfkill_global_led_trigger_worker+0x1c/0xc0) [ 4243.771193][ T32] [<818c2884>] (rfkill_global_led_trigger_worker) from [<80266034>] (process_one_work+0x1b4/0x4f4) [ 4243.771592][ T32] r5:82931ed4 r4:84786d00 [ 4243.771777][ T32] [<80265e80>] (process_one_work) from [<80266c18>] (worker_thread+0x1ec/0x3bc) [ 4243.772125][ T32] r10:84a7d400 r9:84786d2c r8:61c88647 r7:ddde40e0 r6:82604d40 r5:ddde40c0 [ 4243.772436][ T32] r4:84786d00 [ 4243.772609][ T32] [<80266a2c>] (worker_thread) from [<8026fc90>] (kthread+0x104/0x134) [ 4243.772957][ T32] r10:00000000 r9:eb0f9e78 r8:84be4100 r7:84786d00 r6:80266a2c r5:84a7d400 [ 4243.778051][ T32] r4:84bbb000 [ 4243.778348][ T32] [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4243.779191][ T32] Exception stack(0xee821fb0 to 0xee821ff8) [ 4243.779571][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 4243.779874][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4243.780132][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4243.787732][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:84bbb000 [ 4243.788570][ T32] INFO: task syz.0.33063:6575 blocked for more than 430 seconds. [ 4243.788946][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 4243.789201][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4243.789514][ T32] task:syz.0.33063 state:D stack:0 pid:6575 tgid:6575 ppid:3114 flags:0x00000001 [ 4243.789951][ T32] Call trace: [ 4243.790144][ T32] [<819bb4d4>] (__schedule) from [<819bc114>] (schedule+0x2c/0xfc) [ 4243.792575][ T32] r10:000001b4 r9:00000000 r8:827ec148 r7:00000002 r6:eab75df4 r5:834b0c00 [ 4243.793657][ T32] r4:834b0c00 [ 4243.793829][ T32] [<819bc0e8>] (schedule) from [<819bc4c8>] (schedule_preempt_disabled+0x18/0x24) [ 4243.800964][ T32] r5:834b0c00 r4:827ec144 [ 4243.804429][ T32] [<819bc4b0>] (schedule_preempt_disabled) from [<819befa0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4243.804950][ T32] [<819becb8>] (__mutex_lock.constprop.0) from [<819bf86c>] (__mutex_lock_slowpath+0x14/0x18) [ 4243.806340][ T32] r10:000001b4 r9:834b0c00 r8:84bcd550 r7:84a61000 r6:84a61024 r5:847b4a40 [ 4243.806668][ T32] r4:847b4800 [ 4243.806828][ T32] [<819bf858>] (__mutex_lock_slowpath) from [<819bf8ac>] (mutex_lock+0x3c/0x40) [ 4243.807256][ T32] [<819bf870>] (mutex_lock) from [<818c3378>] (rfkill_unregister+0x5c/0xc4) [ 4243.807588][ T32] [<818c331c>] (rfkill_unregister) from [<81907760>] (nfc_unregister_device+0x44/0x118) [ 4243.807962][ T32] r5:847b505c r4:847b5000 [ 4243.808146][ T32] [<8190771c>] (nfc_unregister_device) from [<8191470c>] (nci_unregister_device+0x94/0x98) [ 4243.808601][ T32] r5:84a61024 r4:84a61024 [ 4243.808822][ T32] [<81914678>] (nci_unregister_device) from [<80b059f4>] (virtual_ncidev_close+0x18/0x30) [ 4243.809320][ T32] r9:834b0c00 r8:84bcd550 r7:8383c658 r6:830dddd0 r5:000e001b r4:8522fec0 [ 4243.809658][ T32] [<80b059dc>] (virtual_ncidev_close) from [<8051815c>] (__fput+0xdc/0x2e4) [ 4243.810095][ T32] r5:000e001b r4:841ffa80 [ 4243.810337][ T32] [<80518080>] (__fput) from [<805183ec>] (____fput+0x14/0x18) [ 4243.810707][ T32] r9:834b0c00 r8:82871694 r7:834b0c00 r6:834b1484 r5:834b1454 r4:00000000 [ 4243.811132][ T32] [<805183d8>] (____fput) from [<8026c5cc>] (task_work_run+0x90/0xb8) [ 4243.811477][ T32] [<8026c53c>] (task_work_run) from [<8020bde0>] (do_work_pending+0x448/0x4f8) [ 4243.811836][ T32] r9:834b0c00 r8:8020029c r7:000001b4 r6:8020029c r5:eab75fb0 r4:834b0c00 [ 4243.812146][ T32] [<8020b998>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 4243.812533][ T32] Exception stack(0xeab75fb0 to 0xeab75ff8) [ 4243.812898][ T32] 5fa0: 00000000 0000001e 00000000 7ebf7938 [ 4243.813253][ T32] 5fc0: 00000000 00008127 00000000 000001b4 00000000 002862c4 00000000 ffffffff [ 4243.816762][ T32] 5fe0: 7ebf7838 7ebf7828 00024234 00132ec0 20000010 00000003 [ 4243.817633][ T32] r10:000001b4 r9:834b0c00 r8:8020029c r7:000001b4 r6:00000000 r5:00008127 [ 4243.817935][ T32] r4:00000000 [ 4243.818813][ T32] INFO: task syz.1.33064:6580 blocked for more than 430 seconds. [ 4243.820965][ T32] Not tainted 6.12.0-rc2-syzkaller #0 [ 4243.822645][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4243.822945][ T32] task:syz.1.33064 state:D stack:0 pid:6580 tgid:6576 ppid:3115 flags:0x00000001 [ 4243.823396][ T32] Call trace: [ 4243.823587][ T32] [<819bb4d4>] (__schedule) from [<819bc114>] (schedule+0x2c/0xfc) [ 4243.824019][ T32] r10:81c81694 r9:00000000 r8:847b5060 r7:00000002 r6:eabf5de4 r5:82e45400 [ 4243.828345][ T32] r4:82e45400 [ 4243.829497][ T32] [<819bc0e8>] (schedule) from [<819bc4c8>] (schedule_preempt_disabled+0x18/0x24) [ 4243.829872][ T32] r5:82e45400 r4:847b505c [ 4243.830104][ T32] [<819bc4b0>] (schedule_preempt_disabled) from [<819befa0>] (__mutex_lock.constprop.0+0x2e8/0xae0) [ 4243.830553][ T32] [<819becb8>] (__mutex_lock.constprop.0) from [<819bf86c>] (__mutex_lock_slowpath+0x14/0x18) [ 4243.831073][ T32] r10:81c81694 r9:20000080 r8:00000000 r7:82e45400 r6:00000001 r5:847b505c [ 4243.831401][ T32] r4:847b5000 [ 4243.831607][ T32] [<819bf858>] (__mutex_lock_slowpath) from [<819bf8ac>] (mutex_lock+0x3c/0x40) [ 4243.832079][ T32] [<819bf870>] (mutex_lock) from [<81907fd8>] (nfc_dev_down+0x20/0xc8) [ 4243.832441][ T32] [<81907fb8>] (nfc_dev_down) from [<819080ac>] (nfc_rfkill_set_block+0x2c/0x68) [ 4243.832929][ T32] r7:82e45400 r6:00000001 r5:847b5000 r4:00000001 [ 4243.833206][ T32] [<81908080>] (nfc_rfkill_set_block) from [<818c3688>] (rfkill_set_block+0x90/0x144) [ 4243.833571][ T32] r5:00000000 r4:847b4800 [ 4243.833756][ T32] [<818c35f8>] (rfkill_set_block) from [<818c3c40>] (rfkill_fop_write+0x1a8/0x258) [ 4243.834105][ T32] r7:82e45400 r6:847b4800 r5:827ec158 r4:00000008 [ 4243.834326][ T32] [<818c3a98>] (rfkill_fop_write) from [<8051669c>] (vfs_write+0xac/0x44c) [ 4243.834652][ T32] r6:00000008 r5:841ff300 r4:818c3a98 [ 4243.834875][ T32] [<805165f0>] (vfs_write) from [<80516c0c>] (ksys_write+0xc4/0xf8) [ 4243.836019][ T32] r10:00000004 r9:82e45400 r8:8020029c r7:00000008 r6:20000080 r5:841ff300 [ 4243.836354][ T32] r4:841ff301 [ 4243.836505][ T32] [<80516b48>] (ksys_write) from [<80516c50>] (sys_write+0x10/0x14) [ 4243.837513][ T32] r7:00000004 r6:002862f0 r5:00000000 r4:00000000 [ 4243.837800][ T32] [<80516c40>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4243.838194][ T32] Exception stack(0xeabf5fa8 to 0xeabf5ff0) [ 4243.838446][ T32] 5fa0: 00000000 00000000 00000003 20000080 00000008 00000000 [ 4243.838801][ T32] 5fc0: 00000000 00000000 002862f0 00000004 00000000 00006364 003d0f00 76b0e0bc [ 4243.839225][ T32] 5fe0: 76b0dec0 76b0deb0 00018af8 00132ec0 [ 4243.840035][ T32] NMI backtrace for cpu 0 [ 4243.840433][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc2-syzkaller #0 [ 4243.840856][ T32] Hardware name: ARM-Versatile Express [ 4243.841193][ T32] Call trace: [ 4243.841549][ T32] [<81999018>] (dump_backtrace) from [<81999114>] (show_stack+0x18/0x1c) [ 4243.841962][ T32] r7:00000000 r6:00000013 r5:60000093 r4:8203d3fc [ 4243.842280][ T32] [<819990fc>] (show_stack) from [<819b75c0>] (dump_stack_lvl+0x70/0x7c) [ 4243.842667][ T32] [<819b7550>] (dump_stack_lvl) from [<819b75e4>] (dump_stack+0x18/0x1c) [ 4243.843104][ T32] r5:00000000 r4:00000001 [ 4243.843364][ T32] [<819b75cc>] (dump_stack) from [<819862d8>] (nmi_cpu_backtrace+0x160/0x17c) [ 4243.843846][ T32] [<81986178>] (nmi_cpu_backtrace) from [<81986424>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 4243.844288][ T32] r7:00000000 r6:8260c5d0 r5:8261af0c r4:ffffffff [ 4243.844556][ T32] [<819862f4>] (nmi_trigger_cpumask_backtrace) from [<802103e8>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 4243.845093][ T32] r9:00060480 r8:828b6cf8 r7:8260c730 r6:00007f45 r5:8261b4c8 r4:8367b51c [ 4243.845645][ T32] [<802103d0>] (arch_trigger_cpumask_backtrace) from [<80358148>] (watchdog+0x498/0x5b8) [ 4243.846218][ T32] [<80357cb0>] (watchdog) from [<8026fc90>] (kthread+0x104/0x134) [ 4243.846588][ T32] r10:00000000 r9:df819e58 r8:82cd0940 r7:00000000 r6:80357cb0 r5:82e49800 [ 4243.846900][ T32] r4:82fa64c0 [ 4243.847117][ T32] [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4243.847456][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 4243.847720][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 4243.848283][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4243.848622][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4243.849013][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:82fa64c0 [ 4243.850207][ T32] Sending NMI from CPU 0 to CPUs 1: [ 4243.851230][ C1] NMI backtrace for cpu 1 [ 4243.851834][ C1] CPU: 1 UID: 0 PID: 3107 Comm: sshd Not tainted 6.12.0-rc2-syzkaller #0 [ 4243.852077][ C1] Hardware name: ARM-Versatile Express [ 4243.852278][ C1] PC is at do_sys_poll+0x130/0x644 [ 4243.853278][ C1] LR is at do_sys_poll+0x444/0x644 [ 4243.853342][ C1] pc : [<80531b98>] lr : [<80531eac>] psr: 60000013 [ 4243.853378][ C1] sp : df969b78 ip : 824eb767 fp : df969f4c [ 4243.853415][ C1] r10: 00000001 r9 : 00000001 r8 : b5403587 [ 4243.853452][ C1] r7 : b5003500 r6 : df969c00 r5 : 00000000 r4 : 014eb768 [ 4243.853486][ C1] r3 : 00000000 r2 : 00000000 r1 : 00000001 r0 : 00000000 [ 4243.853587][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 4243.853653][ C1] Control: 30c5387d Table: 83d2c740 DAC: 00000000 [ 4243.853733][ C1] Call trace: [ 4243.854424][ C1] [<80531a68>] (do_sys_poll) from [<80532f54>] (sys_ppoll+0xac/0xfc) [ 4243.854713][ C1] r10:0000019e r9:83e55400 r8:df969f68 r7:7ef0827c r6:00000007 r5:014eb730 [ 4243.854786][ C1] r4:7ef08170 [ 4243.854887][ C1] [<80532ea8>] (sys_ppoll) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4243.855060][ C1] Exception stack(0xdf969fa8 to 0xdf969ff0) [ 4243.855323][ C1] 9fa0: 00000008 76fbec80 014eb730 00000007 7ef08170 7ef0827c [ 4243.855373][ C1] 9fc0: 00000008 76fbec80 7ef0827c 0000019e 014eb730 7ef081fc 7ef0827c 00000000 [ 4243.855401][ C1] 9fe0: 7ef08170 7ef08170 76bb0f38 76bb0e90 [ 4243.855467][ C1] r8:8020029c r7:0000019e r6:7ef0827c r5:76fbec80 r4:00000008 [ 4243.856539][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 4243.861757][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.12.0-rc2-syzkaller #0 [ 4243.862139][ T32] Hardware name: ARM-Versatile Express [ 4243.862403][ T32] Call trace: [ 4243.862595][ T32] [<81999018>] (dump_backtrace) from [<81999114>] (show_stack+0x18/0x1c) [ 4243.863063][ T32] r7:00000000 r6:82622f44 r5:00000000 r4:8203d3fc [ 4243.863311][ T32] [<819990fc>] (show_stack) from [<819b75a4>] (dump_stack_lvl+0x54/0x7c) [ 4243.863619][ T32] [<819b7550>] (dump_stack_lvl) from [<819b75e4>] (dump_stack+0x18/0x1c) [ 4243.864069][ T32] r5:00000000 r4:82870d18 [ 4243.864238][ T32] [<819b75cc>] (dump_stack) from [<81999c40>] (panic+0x120/0x374) [ 4243.864493][ T32] [<81999b20>] (panic) from [<80357fc8>] (watchdog+0x318/0x5b8) [ 4243.864776][ T32] r3:00000000 r2:00000000 r1:00000001 r0:8203defc [ 4243.865004][ T32] r7:8260c730 [ 4243.865374][ T32] [<80357cb0>] (watchdog) from [<8026fc90>] (kthread+0x104/0x134) [ 4243.865855][ T32] r10:00000000 r9:df819e58 r8:82cd0940 r7:00000000 r6:80357cb0 r5:82e49800 [ 4243.866162][ T32] r4:82fa64c0 [ 4243.866326][ T32] [<8026fb8c>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4243.866638][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 4243.867062][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 4243.867399][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4243.867722][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4243.868034][ T32] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fb8c r4:82fa64c0 [ 4243.870270][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 00:14:43 Registers: info registers vcpu 0 CPU#0 R00=0000003e R01=00000000 R02=00000000 R03=82e49800 R04=84a7d400 R05=00000002 R06=00007f61 R07=84a7da18 R08=827f28e7 R09=00060480 R10=82604d40 R11=df8e1f24 R12=df8e1e48 R13=df8e1f08 R14=802bc9f4 R15=8027c084 PSR=60000013 -ZC- A S svc32 s00=e4000000 s01=ffffffff d00=ffffffffe4000000 s02=cc000000 s03=000911f5 d01=000911f5cc000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=0185ea1b s09=ffae3cfa d04=ffae3cfa0185ea1b s10=00000000 s11=ffffffff d05=ffffffff00000000 s12=fe76b96a s13=ff0dc64b d06=ff0dc64bfe76b96a s14=ffffffff s15=ffffffff d07=ffffffffffffffff s16=fe000000 s17=061ff0f6 d08=061ff0f6fe000000 s18=0e000000 s19=fffd26b3 d09=fffd26b30e000000 s20=febe987a s21=ff0dc64c d10=ff0dc64cfebe987a s22=ffffffff s23=ffffffff d11=ffffffffffffffff s24=e785ea1b s25=ffffffff d12=ffffffffe785ea1b s26=cc000000 s27=000911f5 d13=000911f5cc000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=fec0b17f s33=00350c31 d16=00350c31fec0b17f s34=ffffffff s35=00000000 d17=00000000ffffffff s36=fe72e24b s37=ff8f783f d18=ff8f783ffe72e24b s38=ffffffff s39=ffffffff d19=ffffffffffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=fbba0c95 s43=ffffffff d21=fffffffffbba0c95 s44=fffffff9 s45=ffffffff d22=fffffffffffffff9 s46=fe935987 s47=ffffffff d23=fffffffffe935987 s48=fe520de8 s49=061ff0f6 d24=061ff0f6fe520de8 s50=e4efa505 s51=ffffffff d25=ffffffffe4efa505 s52=ffc85948 s53=00fa3102 d26=00fa3102ffc85948 s54=fe962aa1 s55=00253e5c d27=00253e5cfe962aa1 s56=ff8db65b s57=017cad2a d28=017cad2aff8db65b s58=00be5695 s59=fe962aa1 d29=fe962aa100be5695 s60=ce3d3500 s61=000911f5 d30=000911f5ce3d3500 s62=fc964516 s63=0028bc20 d31=0028bc20fc964516 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=827bbd38 R01=821dee84 R02=103b2500 R03=819b9410 R04=828b5200 R05=000cd170 R06=000cd170 R07=e681fe00 R08=ddddb270 R09=ddddb2c0 R10=000003dc R11=df805e6c R12=df805e70 R13=df805e60 R14=8123a8ac R15=819b9420 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005727e9 s17=00000000 d08=00000000005727e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=80808408 s33=42808080 d16=4280808080808408 s34=00060800 s35=0303fe08 d17=0303fe0800060800 s36=80021780 s37=10800310 d18=1080031080021780 s38=03200400 s39=04001084 d19=0400108403200400 s40=10880300 s41=03000800 d20=0300080010880300 s42=08001090 s43=04808080 d21=0480808008001090 s44=00178803 s45=90031808 d22=9003180800178803 s46=16800217 s47=02168003 d23=0216800316800217 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=4e1eb98f s53=3d5269a3 d26=3d5269a34e1eb98f s54=28e6b202 s55=ec380a52 d27=ec380a5228e6b202 s56=d7dabef5 s57=1a45fa15 d28=1a45fa15d7dabef5 s58=86edc47b s59=7c60424e d29=7c60424e86edc47b s60=3a511a82 s61=5a5d733c d30=5a5d733c3a511a82 s62=550f3449 s63=5da18aeb d31=5da18aeb550f3449 FPSCR: 00000000