last executing test programs: 700.100312ms ago: executing program 0 (id=3002): r0 = eventfd2(0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x5450, 0x0) 599.963995ms ago: executing program 0 (id=3005): r0 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$KDSIGACCEPT(r0, 0x5421, 0x2081004b) 491.096609ms ago: executing program 0 (id=3006): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$BTRFS_IOC_FS_INFO(r0, 0x5451, 0x0) 491.016429ms ago: executing program 1 (id=3007): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000100000c02000000000000000000000d0000000000005f"], 0x0, 0x34}, 0x20) ioctl$FITHAW(r0, 0x5450) 432.846166ms ago: executing program 1 (id=3008): r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x5450, 0x0) 432.713996ms ago: executing program 0 (id=3009): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x5450, 0x0) 350.701986ms ago: executing program 1 (id=3010): r0 = socket$igmp(0x2, 0x3, 0x2) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) 350.583046ms ago: executing program 0 (id=3011): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x5451, 0x0) 239.73899ms ago: executing program 1 (id=3012): r0 = openat$selinux_policy(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0x5450, 0x0) 221.370702ms ago: executing program 0 (id=3013): ioctl$FITHAW(0xffffffffffffffff, 0xc0045878) syz_usb_connect(0x3, 0x36, &(0x7f0000000700)={{0x12, 0x1, 0x201, 0x34, 0x74, 0x48, 0x10, 0x1901, 0x197, 0xf6d9, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0xc, 0xfa, 0x30, 0x8, [{{0x9, 0x4, 0x67, 0x2, 0x2, 0x3, 0x62, 0x2, 0x4, [], [{{0x9, 0x5, 0xa, 0x4, 0x20, 0x7, 0x1, 0xf8}}, {{0x9, 0x5, 0x7, 0x3, 0x400, 0x1, 0x70, 0x3}}]}}]}}]}}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0}) 112.723346ms ago: executing program 1 (id=3014): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000680)={0x1, 0xf}, 0x8) 0s ago: executing program 1 (id=3015): socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) kernel console output (not intermixed with test programs): [ 48.161630][ T29] audit: type=1400 audit(48.080:56): avc: denied { read write } for pid=3091 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 48.163488][ T29] audit: type=1400 audit(48.080:57): avc: denied { open } for pid=3091 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:39482' (ED25519) to the list of known hosts. [ 63.655463][ T29] audit: type=1400 audit(63.570:58): avc: denied { name_bind } for pid=3094 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 65.438345][ T29] audit: type=1400 audit(65.360:59): avc: denied { execute } for pid=3095 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 65.485303][ T29] audit: type=1400 audit(65.400:60): avc: denied { execute_no_trans } for pid=3095 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.047718][ T29] audit: type=1400 audit(68.970:61): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.052143][ T29] audit: type=1400 audit(68.970:62): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.068788][ T3095] cgroup: Unknown subsys name 'net' [ 69.076819][ T29] audit: type=1400 audit(69.000:63): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.245362][ T3095] cgroup: Unknown subsys name 'cpuset' [ 69.250669][ T3095] cgroup: Unknown subsys name 'hugetlb' [ 69.252948][ T3095] cgroup: Unknown subsys name 'rlimit' [ 69.459618][ T29] audit: type=1400 audit(69.380:64): avc: denied { setattr } for pid=3095 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 69.461472][ T29] audit: type=1400 audit(69.380:65): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 69.463910][ T29] audit: type=1400 audit(69.380:66): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.656869][ T3097] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.659492][ T29] audit: type=1400 audit(69.580:67): avc: denied { relabelto } for pid=3097 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.663124][ T29] audit: type=1400 audit(69.580:68): avc: denied { write } for pid=3097 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.693353][ T29] audit: type=1400 audit(69.610:69): avc: denied { read } for pid=3095 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.705148][ T29] audit: type=1400 audit(69.620:70): avc: denied { open } for pid=3095 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.175781][ T3095] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 78.209545][ T29] audit: type=1400 audit(78.130:71): avc: denied { execmem } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 78.282042][ T29] audit: type=1400 audit(78.200:72): avc: denied { read } for pid=3100 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.284100][ T29] audit: type=1400 audit(78.200:73): avc: denied { open } for pid=3100 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 78.292461][ T29] audit: type=1400 audit(78.210:74): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 78.324316][ T29] audit: type=1400 audit(78.240:75): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 78.405245][ T29] audit: type=1400 audit(78.320:76): avc: denied { sys_module } for pid=3100 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 78.870689][ T29] audit: type=1400 audit(78.790:77): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 79.809609][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.818456][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 79.893557][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 79.909141][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 80.612195][ T3101] hsr_slave_0: entered promiscuous mode [ 80.620566][ T3101] hsr_slave_1: entered promiscuous mode [ 80.898403][ T3100] hsr_slave_0: entered promiscuous mode [ 80.903579][ T3100] hsr_slave_1: entered promiscuous mode [ 80.909428][ T3100] debugfs: 'hsr0' already exists in 'hsr' [ 80.911780][ T3100] Cannot create hsr debugfs directory [ 81.240359][ T29] audit: type=1400 audit(81.160:78): avc: denied { create } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.242365][ T29] audit: type=1400 audit(81.160:79): avc: denied { write } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.249172][ T29] audit: type=1400 audit(81.170:80): avc: denied { read } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 81.272811][ T3101] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 81.293414][ T3101] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 81.303228][ T3101] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 81.324404][ T3101] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 81.415223][ T3100] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 81.423282][ T3100] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 81.430951][ T3100] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 81.441167][ T3100] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 82.042793][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.078916][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.647205][ T3100] veth0_vlan: entered promiscuous mode [ 84.677419][ T3100] veth1_vlan: entered promiscuous mode [ 84.773939][ T3100] veth0_macvtap: entered promiscuous mode [ 84.816088][ T3100] veth1_macvtap: entered promiscuous mode [ 84.823874][ T3101] veth0_vlan: entered promiscuous mode [ 84.850252][ T3101] veth1_vlan: entered promiscuous mode [ 84.918774][ T52] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.920109][ T52] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.926560][ T52] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.927073][ T52] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.990207][ T3101] veth0_macvtap: entered promiscuous mode [ 85.011560][ T3101] veth1_macvtap: entered promiscuous mode [ 85.040547][ T29] audit: type=1400 audit(84.960:81): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 85.049084][ T29] audit: type=1400 audit(84.970:82): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.mQVVYe/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.059476][ T29] audit: type=1400 audit(84.980:83): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 85.070992][ T29] audit: type=1400 audit(84.990:84): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.mQVVYe/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 85.074495][ T29] audit: type=1400 audit(84.990:85): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/syzkaller.mQVVYe/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2169 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 85.095491][ T29] audit: type=1400 audit(85.010:86): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 85.110172][ T29] audit: type=1400 audit(85.030:87): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 85.113427][ T29] audit: type=1400 audit(85.030:88): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="gadgetfs" ino=3249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 85.123279][ T29] audit: type=1400 audit(85.040:89): avc: denied { mount } for pid=3100 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 85.141091][ T29] audit: type=1400 audit(85.060:90): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 85.157303][ T1322] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.158435][ T1322] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.158860][ T1322] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.159094][ T1322] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.228402][ T3100] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.510826][ T3731] Zero length message leads to an empty skb [ 87.209752][ T3763] syz.1.28 (3763): drop_caches: 0 [ 87.569466][ T3779] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3779 comm=syz.0.36 [ 90.102477][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 90.105852][ T29] audit: type=1400 audit(90.020:122): avc: denied { create } for pid=3884 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 90.125590][ T29] audit: type=1400 audit(90.040:123): avc: denied { setopt } for pid=3884 comm="syz.0.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 90.766693][ T29] audit: type=1400 audit(90.690:124): avc: denied { create } for pid=3912 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 90.772352][ T29] audit: type=1400 audit(90.690:125): avc: denied { ioctl } for pid=3912 comm="syz.0.103" path="socket:[3633]" dev="sockfs" ino=3633 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 91.099591][ T29] audit: type=1400 audit(91.020:126): avc: denied { create } for pid=3927 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 91.197835][ T29] audit: type=1400 audit(91.120:127): avc: denied { getattr } for pid=3931 comm="syz.1.112" path="pid:[4026532646]" dev="nsfs" ino=4026532646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 92.517119][ T29] audit: type=1400 audit(92.440:128): avc: denied { create } for pid=3989 comm="syz.0.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 92.597772][ T29] audit: type=1400 audit(92.520:129): avc: denied { create } for pid=3992 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 92.605983][ T29] audit: type=1400 audit(92.530:130): avc: denied { setopt } for pid=3992 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 92.980776][ T29] audit: type=1400 audit(92.900:131): avc: denied { create } for pid=4008 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 95.512902][ T4109] random: crng reseeded on system resumption [ 96.842672][ T4175] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4175 comm=syz.1.232 [ 98.760789][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 98.763416][ T29] audit: type=1400 audit(98.680:138): avc: denied { create } for pid=4256 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.771879][ T29] audit: type=1400 audit(98.690:139): avc: denied { getopt } for pid=4256 comm="syz.0.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 98.878049][ T29] audit: type=1400 audit(98.800:140): avc: denied { ioctl } for pid=4261 comm="syz.1.275" path="socket:[3054]" dev="sockfs" ino=3054 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 99.311086][ T29] audit: type=1400 audit(99.230:141): avc: denied { ioctl } for pid=4280 comm="syz.0.285" path="socket:[5137]" dev="sockfs" ino=5137 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 99.836668][ T29] audit: type=1400 audit(99.750:142): avc: denied { create } for pid=4302 comm="syz.0.297" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 99.843654][ T29] audit: type=1400 audit(99.760:143): avc: denied { ioctl } for pid=4302 comm="syz.0.297" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5171 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 100.018085][ T4311] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4311 comm=syz.0.300 [ 100.765337][ T4340] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4340 comm=syz.1.314 [ 101.393942][ T4366] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4366 comm=syz.1.327 [ 101.851509][ T29] audit: type=1400 audit(101.770:144): avc: denied { mounton } for pid=4382 comm="syz.1.335" path="/167/file0" dev="tmpfs" ino=866 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 101.853637][ T29] audit: type=1400 audit(101.770:145): avc: denied { mount } for pid=4382 comm="syz.1.335" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 101.873746][ T29] audit: type=1400 audit(101.790:146): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 104.773227][ T29] audit: type=1400 audit(104.690:147): avc: denied { create } for pid=4498 comm="syz.0.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 104.780254][ T29] audit: type=1400 audit(104.700:148): avc: denied { write } for pid=4498 comm="syz.0.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 105.697619][ T29] audit: type=1400 audit(105.620:149): avc: denied { create } for pid=4535 comm="syz.1.408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 105.706033][ T29] audit: type=1400 audit(105.620:150): avc: denied { ioctl } for pid=4535 comm="syz.1.408" path="socket:[5525]" dev="sockfs" ino=5525 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 106.027565][ T29] audit: type=1400 audit(105.950:151): avc: denied { accept } for pid=4553 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 106.224504][ T29] audit: type=1400 audit(106.140:152): avc: denied { create } for pid=4560 comm="syz.0.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 106.713762][ T4580] SELinux: Context system_u:object_r:ldconfig_cache_t:s0 is not valid (left unmapped). [ 106.721557][ T29] audit: type=1400 audit(106.640:153): avc: denied { relabelto } for pid=4579 comm="syz.0.435" name="cgroup.procs" dev="cgroup" ino=43 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:ldconfig_cache_t:s0" [ 106.721955][ T29] audit: type=1400 audit(106.640:154): avc: denied { associate } for pid=4579 comm="syz.0.435" name="cgroup.procs" dev="cgroup" ino=43 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 srawcon="system_u:object_r:ldconfig_cache_t:s0" [ 107.941335][ T29] audit: type=1400 audit(107.860:155): avc: denied { create } for pid=4633 comm="syz.0.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 109.602248][ T4710] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=4710 comm=syz.1.497 [ 110.678170][ T4750] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1540 sclass=netlink_route_socket pid=4750 comm=syz.0.516 [ 112.075369][ T29] audit: type=1400 audit(111.990:156): avc: denied { create } for pid=4805 comm="syz.0.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 112.083980][ T29] audit: type=1400 audit(112.000:157): avc: denied { getopt } for pid=4805 comm="syz.0.545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 113.481965][ T4833] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4833 comm=syz.0.558 [ 114.457884][ T4874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4874 comm=syz.1.578 [ 116.699500][ T4966] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4966 comm=syz.0.624 [ 117.099199][ T4984] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4984 comm=syz.0.634 [ 117.128202][ T29] audit: type=1400 audit(117.050:158): avc: denied { write } for pid=4983 comm="syz.1.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.656327][ T29] audit: type=1400 audit(118.580:159): avc: denied { setopt } for pid=5054 comm="syz.0.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 119.520987][ T5095] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5095 comm=syz.0.688 [ 119.620908][ T29] audit: type=1400 audit(119.540:160): avc: denied { setopt } for pid=5100 comm="syz.1.692" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.632004][ T29] audit: type=1400 audit(120.550:161): avc: denied { create } for pid=5142 comm="syz.0.716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 120.641674][ T29] audit: type=1400 audit(120.560:162): avc: denied { setopt } for pid=5142 comm="syz.0.716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 122.322245][ T29] audit: type=1400 audit(122.240:163): avc: denied { setopt } for pid=5217 comm="syz.0.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 122.418558][ T5222] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5222 comm=syz.1.750 [ 123.156876][ T5255] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5255 comm=syz.0.766 [ 123.409288][ T29] audit: type=1400 audit(123.330:164): avc: denied { map_create } for pid=5260 comm="syz.0.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 123.411113][ T29] audit: type=1400 audit(123.330:165): avc: denied { bpf } for pid=5260 comm="syz.0.772" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 127.125751][ T3047] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 127.276310][ T3047] usb 1-1: Using ep0 maxpacket: 16 [ 127.293592][ T3047] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 127.293997][ T3047] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 127.294327][ T3047] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 127.294548][ T3047] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x2 has invalid maxpacket 0 [ 127.305829][ T3047] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 127.322874][ T3047] usb 1-1: New USB device found, idVendor=2040, idProduct=b138, bcdDevice= 1.42 [ 127.323133][ T3047] usb 1-1: New USB device strings: Mfr=4, Product=0, SerialNumber=0 [ 127.323371][ T3047] usb 1-1: Manufacturer: syz [ 127.333029][ T3047] usb 1-1: config 0 descriptor?? [ 127.675777][ T3047] rc_core: IR keymap rc-hauppauge not found [ 127.676175][ T3047] Registered IR keymap rc-empty [ 127.678014][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.695631][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.717914][ T3047] rc rc0: Conexant Hybrid TV (cx231xx) MCE IR no TX as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0 [ 127.720698][ T3047] input: Conexant Hybrid TV (cx231xx) MCE IR no TX as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/rc/rc0/input6 [ 127.731270][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.746692][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.765788][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.785722][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.810572][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.826170][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.846199][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.866061][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.885787][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.916163][ T3047] mceusb 1-1:0.0: Error: mce write submit urb error = -90 [ 127.937509][ T3047] mceusb 1-1:0.0: Registered   with mce emulator interface version 1 [ 127.937848][ T3047] mceusb 1-1:0.0: 2 tx ports (0x0 cabled) and 2 rx sensors (0x0 active) [ 127.956133][ T3047] usb 1-1: USB disconnect, device number 2 [ 128.033533][ T29] audit: type=1400 audit(127.950:166): avc: denied { getopt } for pid=5419 comm="syz.0.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 128.529058][ T29] audit: type=1400 audit(128.450:167): avc: denied { getopt } for pid=5443 comm="syz.0.848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 129.886203][ T29] audit: type=1400 audit(129.800:168): avc: denied { sys_module } for pid=5495 comm="syz.0.874" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 130.194146][ T5512] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5512 comm=syz.1.881 [ 130.881915][ T5540] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=5540 comm=syz.0.894 [ 130.929731][ T29] audit: type=1400 audit(130.850:169): avc: denied { ioctl } for pid=5541 comm="syz.1.897" path="socket:[8628]" dev="sockfs" ino=8628 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 132.116750][ T5590] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=512 sclass=netlink_tcpdiag_socket pid=5590 comm=syz.1.921 [ 132.704499][ T29] audit: type=1400 audit(132.620:170): avc: granted { setsecparam } for pid=5618 comm="syz.0.933" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 132.981961][ T5632] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=771 sclass=netlink_route_socket pid=5632 comm=syz.0.940 [ 133.485224][ T29] audit: type=1400 audit(133.400:171): avc: granted { setsecparam } for pid=5654 comm="syz.1.952" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 133.716589][ T29] audit: type=1400 audit(133.640:172): avc: denied { ioctl } for pid=5664 comm="syz.0.959" path="socket:[8843]" dev="sockfs" ino=8843 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 133.781456][ T29] audit: type=1400 audit(133.700:173): avc: denied { read } for pid=5667 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 133.809335][ T5668] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=771 sclass=netlink_route_socket pid=5668 comm=syz.1.956 [ 133.834405][ T29] audit: type=1400 audit(133.750:174): avc: denied { sys_module } for pid=5664 comm="syz.0.959" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 133.836599][ T29] audit: type=1400 audit(133.760:175): avc: denied { module_request } for pid=5664 comm="syz.0.959" kmod="" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 133.868400][ T29] audit: type=1400 audit(133.790:176): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 133.869334][ T29] audit: type=1400 audit(133.790:177): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 133.870152][ T29] audit: type=1400 audit(133.790:178): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 133.963907][ T29] audit: type=1400 audit(133.880:179): avc: denied { read } for pid=5671 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 133.971292][ T29] audit: type=1400 audit(133.890:180): avc: denied { read } for pid=5670 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 135.868062][ T5735] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5735 comm=syz.1.991 [ 136.788382][ T5771] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 138.540695][ T29] kauditd_printk_skb: 251 callbacks suppressed [ 138.540910][ T29] audit: type=1400 audit(138.460:432): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 138.541736][ T29] audit: type=1400 audit(138.460:433): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 138.542898][ T29] audit: type=1400 audit(138.460:434): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 138.595927][ T29] audit: type=1400 audit(138.510:435): avc: denied { read } for pid=5848 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 138.606203][ T29] audit: type=1400 audit(138.530:436): avc: denied { read } for pid=5849 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 138.622600][ T29] audit: type=1400 audit(138.540:437): avc: denied { read } for pid=5848 comm="syz.1.1047" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 138.623866][ T29] audit: type=1400 audit(138.540:438): avc: denied { open } for pid=5848 comm="syz.1.1047" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 138.628660][ T29] audit: type=1400 audit(138.550:439): avc: denied { ioctl } for pid=5848 comm="syz.1.1047" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x640f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 138.637851][ T29] audit: type=1400 audit(138.560:440): avc: denied { allowed } for pid=5849 comm="syz.0.1051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 138.651365][ T29] audit: type=1400 audit(138.570:441): avc: denied { create } for pid=5849 comm="syz.0.1051" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 143.548796][ T29] kauditd_printk_skb: 255 callbacks suppressed [ 143.548987][ T29] audit: type=1400 audit(143.470:697): avc: denied { read } for pid=6028 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 143.555633][ T29] audit: type=1400 audit(143.470:698): avc: denied { read } for pid=6029 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 143.622594][ T29] audit: type=1400 audit(143.540:699): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 143.623741][ T29] audit: type=1400 audit(143.540:700): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 143.625918][ T29] audit: type=1400 audit(143.540:701): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 143.663802][ T29] audit: type=1400 audit(143.580:702): avc: denied { read } for pid=6032 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 143.717557][ T29] audit: type=1400 audit(143.640:703): avc: denied { read } for pid=6034 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 143.761983][ T29] audit: type=1400 audit(143.680:704): avc: denied { read } for pid=6035 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 143.805283][ T29] audit: type=1400 audit(143.720:705): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 143.805665][ T29] audit: type=1400 audit(143.720:706): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 145.905637][ T6116] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6116 comm=syz.0.1180 [ 148.640568][ T29] kauditd_printk_skb: 277 callbacks suppressed [ 148.643209][ T29] audit: type=1400 audit(148.560:984): avc: denied { read } for pid=6226 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 148.749622][ T29] audit: type=1400 audit(148.660:985): avc: denied { read } for pid=6228 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 148.851806][ T29] audit: type=1400 audit(148.770:986): avc: denied { read } for pid=6230 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 148.943886][ T29] audit: type=1400 audit(148.860:987): avc: denied { read } for pid=6232 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 149.038756][ T29] audit: type=1400 audit(148.960:988): avc: denied { read } for pid=6234 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 149.067363][ T29] audit: type=1400 audit(148.990:989): avc: denied { create } for pid=6234 comm="syz.0.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 149.071394][ T29] audit: type=1400 audit(148.990:990): avc: denied { write } for pid=6234 comm="syz.0.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 149.141260][ T29] audit: type=1400 audit(149.060:991): avc: denied { read } for pid=6236 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 149.229086][ T29] audit: type=1400 audit(149.150:992): avc: denied { read } for pid=6238 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 149.252276][ T6239] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6239 comm=syz.0.1241 [ 149.313473][ T29] audit: type=1400 audit(149.230:993): avc: denied { read } for pid=6240 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 152.411023][ T6337] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=6337 comm=syz.0.1290 [ 153.654029][ T29] kauditd_printk_skb: 191 callbacks suppressed [ 153.655857][ T29] audit: type=1400 audit(153.570:1185): avc: denied { read } for pid=6381 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 153.717190][ T29] audit: type=1400 audit(153.640:1186): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 153.723199][ T29] audit: type=1400 audit(153.640:1187): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 153.723319][ T29] audit: type=1400 audit(153.640:1188): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 153.749255][ T29] audit: type=1400 audit(153.660:1189): avc: denied { read } for pid=6384 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 153.769662][ T29] audit: type=1400 audit(153.690:1190): avc: denied { read } for pid=6384 comm="syz.0.1314" name="userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 153.771393][ T29] audit: type=1400 audit(153.690:1191): avc: denied { open } for pid=6384 comm="syz.0.1314" path="/dev/userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 153.775939][ T29] audit: type=1400 audit(153.700:1192): avc: denied { setattr } for pid=6384 comm="syz.0.1314" name="userio" dev="devtmpfs" ino=694 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 153.801841][ T29] audit: type=1400 audit(153.720:1193): avc: denied { read } for pid=6385 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 153.820267][ T29] audit: type=1400 audit(153.740:1194): avc: denied { read write } for pid=6385 comm="syz.1.1315" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 154.558412][ T6418] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6418 comm=syz.0.1330 [ 158.132875][ T6502] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6502 comm=syz.1.1372 [ 158.655661][ T29] kauditd_printk_skb: 195 callbacks suppressed [ 158.657142][ T29] audit: type=1400 audit(158.570:1390): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 158.680247][ T29] audit: type=1400 audit(158.600:1391): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 158.689622][ T29] audit: type=1400 audit(158.610:1392): avc: denied { read } for pid=6521 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.757500][ T29] audit: type=1400 audit(158.680:1393): avc: denied { read } for pid=6523 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.791485][ T29] audit: type=1400 audit(158.710:1394): avc: denied { read } for pid=6524 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.842810][ T29] audit: type=1400 audit(158.760:1395): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 158.845794][ T29] audit: type=1400 audit(158.760:1396): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 158.849953][ T29] audit: type=1400 audit(158.760:1397): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 158.916135][ T29] audit: type=1400 audit(158.810:1398): avc: denied { read } for pid=6527 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 158.958035][ T29] audit: type=1400 audit(158.880:1399): avc: denied { read } for pid=6529 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 160.405596][ T3707] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 160.584519][ T3707] usb 1-1: config 1 interface 0 altsetting 64 bulk endpoint 0x1 has invalid maxpacket 64 [ 160.585505][ T3707] usb 1-1: config 1 interface 0 altsetting 64 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 160.593349][ T3707] usb 1-1: config 1 interface 0 has no altsetting 0 [ 160.631388][ T3707] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 160.631663][ T3707] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 160.631935][ T3707] usb 1-1: Product: syz [ 160.631977][ T3707] usb 1-1: Manufacturer: syz [ 160.632069][ T3707] usb 1-1: SerialNumber: syz [ 160.649598][ T6575] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 161.088940][ T3707] usb 1-1: USB disconnect, device number 3 [ 163.672641][ T29] kauditd_printk_skb: 266 callbacks suppressed [ 163.673079][ T29] audit: type=1400 audit(163.590:1666): avc: denied { read } for pid=6704 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 163.693023][ T29] audit: type=1400 audit(163.610:1667): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.695635][ T29] audit: type=1400 audit(163.610:1668): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.697907][ T29] audit: type=1400 audit(163.620:1669): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.738528][ T29] audit: type=1400 audit(163.660:1670): avc: denied { read } for pid=6706 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 163.756869][ T29] audit: type=1400 audit(163.680:1671): avc: denied { read write } for pid=6706 comm="syz.1.1467" name="comedi0" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 163.758747][ T29] audit: type=1400 audit(163.680:1672): avc: denied { open } for pid=6706 comm="syz.1.1467" path="/dev/comedi0" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 163.766811][ T29] audit: type=1400 audit(163.680:1673): avc: denied { ioctl } for pid=6706 comm="syz.1.1467" path="/dev/comedi0" dev="devtmpfs" ino=711 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 163.781209][ T29] audit: type=1400 audit(163.700:1674): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.786306][ T29] audit: type=1400 audit(163.710:1675): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.802644][ T29] kauditd_printk_skb: 164 callbacks suppressed [ 168.803102][ T29] audit: type=1400 audit(168.720:1840): avc: denied { read } for pid=6824 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 168.894996][ T29] audit: type=1400 audit(168.810:1841): avc: denied { read } for pid=6826 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 168.933041][ T29] audit: type=1400 audit(168.850:1842): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.936401][ T29] audit: type=1400 audit(168.860:1843): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.939091][ T29] audit: type=1400 audit(168.860:1844): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 169.025348][ T29] audit: type=1400 audit(168.940:1845): avc: denied { read } for pid=6828 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 169.062896][ T29] audit: type=1400 audit(168.980:1846): avc: denied { read } for pid=6829 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 169.150974][ T29] audit: type=1400 audit(169.070:1847): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 169.151368][ T29] audit: type=1400 audit(169.070:1848): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 169.173557][ T29] audit: type=1400 audit(169.090:1849): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 171.479434][ T6857] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=6857 comm=syz.1.1540 [ 173.809891][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 173.810947][ T29] audit: type=1400 audit(173.730:1928): avc: denied { read } for pid=6882 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.846959][ T29] audit: type=1400 audit(173.770:1929): avc: denied { read } for pid=6882 comm="syz.0.1553" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 173.849320][ T29] audit: type=1400 audit(173.770:1930): avc: denied { open } for pid=6882 comm="syz.0.1553" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 173.856906][ T29] audit: type=1400 audit(173.780:1931): avc: denied { create } for pid=6882 comm="syz.0.1553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 173.872858][ T29] audit: type=1400 audit(173.790:1932): avc: denied { write } for pid=6882 comm="syz.0.1553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 173.891464][ T29] audit: type=1400 audit(173.810:1933): avc: denied { read } for pid=6884 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.981356][ T29] audit: type=1400 audit(173.900:1934): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.985878][ T29] audit: type=1400 audit(173.900:1935): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.990836][ T29] audit: type=1400 audit(173.900:1936): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 174.067687][ T29] audit: type=1400 audit(173.990:1937): avc: denied { read } for pid=6886 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.813024][ T6901] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=263 sclass=netlink_audit_socket pid=6901 comm=syz.0.1562 [ 178.818101][ T29] kauditd_printk_skb: 217 callbacks suppressed [ 178.818486][ T29] audit: type=1400 audit(178.740:2155): avc: denied { read } for pid=7032 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.903278][ T29] audit: type=1400 audit(178.820:2156): avc: denied { read } for pid=7034 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.971973][ T29] audit: type=1400 audit(178.890:2157): avc: denied { read } for pid=7037 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.985454][ T29] audit: type=1400 audit(178.900:2158): avc: denied { create } for pid=7037 comm="syz.0.1629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.029935][ T29] audit: type=1400 audit(178.950:2159): avc: denied { read } for pid=7040 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 179.054337][ T29] audit: type=1400 audit(178.970:2160): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 179.071172][ T29] audit: type=1400 audit(178.990:2161): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 179.083019][ T29] audit: type=1400 audit(179.000:2162): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 179.130573][ T29] audit: type=1400 audit(179.050:2163): avc: denied { read } for pid=7042 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 179.147889][ T29] audit: type=1400 audit(179.070:2164): avc: denied { create } for pid=7042 comm="syz.0.1631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 182.045838][ T7130] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7130 comm=syz.1.1675 [ 183.836871][ T29] kauditd_printk_skb: 214 callbacks suppressed [ 183.845967][ T29] audit: type=1400 audit(183.760:2379): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.846357][ T29] audit: type=1400 audit(183.760:2380): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.846572][ T29] audit: type=1400 audit(183.760:2381): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.913815][ T29] audit: type=1400 audit(183.830:2382): avc: denied { read } for pid=7187 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 183.914224][ T29] audit: type=1400 audit(183.830:2383): avc: denied { read } for pid=7188 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 184.001304][ T29] audit: type=1400 audit(183.920:2384): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 184.002618][ T29] audit: type=1400 audit(183.920:2385): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 184.003554][ T29] audit: type=1400 audit(183.920:2386): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 184.055843][ T29] audit: type=1400 audit(183.970:2387): avc: denied { read } for pid=7191 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 184.078491][ T29] audit: type=1400 audit(184.000:2388): avc: denied { read } for pid=7191 comm="syz.1.1705" name="dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 184.767909][ T7215] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=7215 comm=syz.1.1718 [ 186.627522][ T7286] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7286 comm=syz.1.1754 [ 188.852515][ T29] kauditd_printk_skb: 254 callbacks suppressed [ 188.852744][ T29] audit: type=1400 audit(188.770:2643): avc: denied { read append } for pid=7365 comm="syz.1.1793" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 188.853366][ T29] audit: type=1400 audit(188.770:2644): avc: denied { open } for pid=7365 comm="syz.1.1793" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 188.857814][ T29] audit: type=1400 audit(188.780:2645): avc: denied { ioctl } for pid=7365 comm="syz.1.1793" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54e2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 188.871197][ T29] audit: type=1400 audit(188.790:2646): avc: denied { read } for pid=7366 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 188.881596][ T29] audit: type=1400 audit(188.800:2647): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.883071][ T29] audit: type=1400 audit(188.800:2648): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.883861][ T29] audit: type=1400 audit(188.800:2649): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.910998][ T29] audit: type=1400 audit(188.830:2650): avc: denied { create } for pid=7366 comm="syz.0.1794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 188.961163][ T29] audit: type=1400 audit(188.880:2651): avc: denied { read } for pid=7369 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 189.012332][ T29] audit: type=1400 audit(188.930:2652): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 189.870475][ T7396] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7396 comm=syz.0.1811 [ 193.946002][ T29] kauditd_printk_skb: 201 callbacks suppressed [ 193.947248][ T29] audit: type=1400 audit(193.860:2854): avc: denied { read } for pid=7520 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 194.009647][ T29] audit: type=1400 audit(193.930:2855): avc: denied { read } for pid=7522 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 194.060196][ T29] audit: type=1400 audit(193.980:2856): avc: denied { read } for pid=7524 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 194.080552][ T29] audit: type=1400 audit(194.000:2857): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 194.082467][ T29] audit: type=1400 audit(194.000:2858): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 194.084497][ T29] audit: type=1400 audit(194.000:2859): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 194.165699][ T29] audit: type=1400 audit(194.080:2860): avc: denied { read } for pid=7526 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 194.182991][ T29] audit: type=1400 audit(194.100:2861): avc: denied { create } for pid=7526 comm="syz.0.1871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 194.191232][ T29] audit: type=1400 audit(194.110:2862): avc: denied { ioctl } for pid=7526 comm="syz.0.1871" path="socket:[14128]" dev="sockfs" ino=14128 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 194.241664][ T29] audit: type=1400 audit(194.160:2863): avc: denied { read } for pid=7528 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 198.965254][ T29] kauditd_printk_skb: 195 callbacks suppressed [ 198.969378][ T29] audit: type=1400 audit(198.880:3059): avc: denied { read } for pid=7668 comm="syz.0.1942" name="midi2" dev="devtmpfs" ino=739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 198.971113][ T29] audit: type=1400 audit(198.890:3060): avc: denied { open } for pid=7668 comm="syz.0.1942" path="/dev/midi2" dev="devtmpfs" ino=739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 199.013274][ T29] audit: type=1400 audit(198.930:3061): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 199.016558][ T29] audit: type=1400 audit(198.940:3062): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 199.024487][ T29] audit: type=1400 audit(198.940:3063): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 199.076538][ T29] audit: type=1400 audit(199.000:3064): avc: denied { read } for pid=7670 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 199.084268][ T29] audit: type=1400 audit(199.000:3065): avc: denied { read } for pid=7671 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 199.134011][ T29] audit: type=1400 audit(199.050:3066): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 199.137587][ T29] audit: type=1400 audit(199.060:3067): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 199.146507][ T29] audit: type=1400 audit(199.070:3068): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 200.587076][ T7721] binfmt_misc: register: failed to install interpreter file ./file0 [ 202.418366][ T7790] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7790 comm=syz.1.2002 [ 204.072178][ T29] kauditd_printk_skb: 256 callbacks suppressed [ 204.072414][ T29] audit: type=1400 audit(203.990:3325): avc: denied { read write } for pid=7848 comm="syz.1.2031" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 204.095169][ T29] audit: type=1400 audit(204.010:3326): avc: denied { read write open } for pid=7848 comm="syz.1.2031" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 204.123300][ T29] audit: type=1400 audit(204.040:3327): avc: denied { read } for pid=7850 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 204.166574][ T29] audit: type=1400 audit(204.080:3328): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 204.166798][ T29] audit: type=1400 audit(204.080:3329): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 204.169117][ T29] audit: type=1400 audit(204.080:3330): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 204.269991][ T29] audit: type=1400 audit(204.180:3331): avc: denied { read } for pid=7852 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 204.292598][ T29] audit: type=1400 audit(204.210:3332): avc: denied { read write } for pid=7852 comm="syz.1.2033" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 204.297315][ T29] audit: type=1400 audit(204.210:3333): avc: denied { open } for pid=7852 comm="syz.1.2033" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 204.406139][ T29] audit: type=1400 audit(204.330:3334): avc: denied { read } for pid=7854 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 206.663735][ T7944] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7944 comm=syz.1.2079 [ 209.128428][ T29] kauditd_printk_skb: 207 callbacks suppressed [ 209.128748][ T29] audit: type=1400 audit(209.050:3542): avc: denied { read } for pid=8010 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 209.226444][ T29] audit: type=1400 audit(209.150:3543): avc: denied { read } for pid=8012 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 209.326876][ T29] audit: type=1400 audit(209.250:3544): avc: denied { read } for pid=8014 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 209.349109][ T29] audit: type=1400 audit(209.270:3545): avc: denied { read } for pid=8014 comm="syz.0.2114" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 209.349529][ T29] audit: type=1400 audit(209.270:3546): avc: denied { open } for pid=8014 comm="syz.0.2114" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 209.351679][ T29] audit: type=1400 audit(209.270:3547): avc: denied { create } for pid=8014 comm="syz.0.2114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 209.360363][ T29] audit: type=1400 audit(209.280:3548): avc: denied { write } for pid=8014 comm="syz.0.2114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 209.436107][ T29] audit: type=1400 audit(209.360:3549): avc: denied { read } for pid=8016 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 209.519119][ T29] audit: type=1400 audit(209.440:3550): avc: denied { read } for pid=8018 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 209.625923][ T29] audit: type=1400 audit(209.550:3551): avc: denied { read } for pid=8020 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 209.748422][ T8023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5134 sclass=netlink_route_socket pid=8023 comm=syz.0.2118 [ 210.328683][ T8035] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2124'. [ 212.193161][ T8099] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8099 comm=syz.0.2156 [ 214.156166][ T29] kauditd_printk_skb: 204 callbacks suppressed [ 214.159207][ T29] audit: type=1400 audit(214.080:3756): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 214.160792][ T29] audit: type=1400 audit(214.080:3757): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 214.162381][ T29] audit: type=1400 audit(214.080:3758): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 214.229948][ T29] audit: type=1400 audit(214.150:3759): avc: denied { read } for pid=8174 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 214.268816][ T29] audit: type=1400 audit(214.190:3760): avc: denied { read } for pid=8175 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 214.283533][ T29] audit: type=1400 audit(214.200:3761): avc: denied { create } for pid=8175 comm="syz.0.2193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 214.289668][ T29] audit: type=1400 audit(214.210:3762): avc: denied { ioctl } for pid=8175 comm="syz.0.2193" path="socket:[16339]" dev="sockfs" ino=16339 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 214.307266][ T29] audit: type=1400 audit(214.230:3763): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 214.315486][ T29] audit: type=1400 audit(214.230:3764): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 214.317080][ T29] audit: type=1400 audit(214.230:3765): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 219.170257][ T29] kauditd_printk_skb: 244 callbacks suppressed [ 219.170745][ T29] audit: type=1400 audit(219.090:4010): avc: denied { write } for pid=8347 comm="syz.1.2281" name="vcs1" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 219.189479][ T29] audit: type=1400 audit(219.110:4011): avc: denied { write open } for pid=8347 comm="syz.1.2281" path="/dev/vcs1" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 219.244145][ T29] audit: type=1400 audit(219.160:4012): avc: denied { read } for pid=8350 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 219.250254][ T29] audit: type=1400 audit(219.160:4013): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 219.253017][ T29] audit: type=1400 audit(219.170:4014): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 219.259358][ T29] audit: type=1400 audit(219.180:4015): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 219.341075][ T29] audit: type=1400 audit(219.260:4016): avc: denied { read } for pid=8352 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 219.365158][ T29] audit: type=1400 audit(219.280:4017): avc: denied { prog_load } for pid=8352 comm="syz.1.2286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 219.369739][ T29] audit: type=1400 audit(219.290:4018): avc: denied { bpf } for pid=8352 comm="syz.1.2286" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 219.397769][ T29] audit: type=1400 audit(219.320:4019): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 221.539535][ T8429] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8429 comm=syz.1.2321 [ 221.978402][ T8445] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8445 comm=syz.0.2327 [ 224.183203][ T29] kauditd_printk_skb: 235 callbacks suppressed [ 224.186266][ T29] audit: type=1400 audit(224.100:4255): avc: denied { read } for pid=8514 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 224.200566][ T29] audit: type=1400 audit(224.120:4256): avc: denied { read } for pid=8515 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 224.236933][ T29] audit: type=1400 audit(224.160:4257): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 224.237355][ T29] audit: type=1400 audit(224.160:4258): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 224.241068][ T29] audit: type=1400 audit(224.160:4259): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 224.291752][ T29] audit: type=1400 audit(224.210:4260): avc: denied { read } for pid=8518 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 224.372949][ T29] audit: type=1400 audit(224.290:4261): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 224.373439][ T29] audit: type=1400 audit(224.290:4262): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 224.379360][ T29] audit: type=1400 audit(224.300:4263): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 224.411207][ T29] audit: type=1400 audit(224.330:4264): avc: denied { read } for pid=8520 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 226.887310][ T8623] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8623 comm=syz.1.2421 [ 227.262575][ T8637] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8637 comm=syz.0.2425 [ 229.194103][ T29] kauditd_printk_skb: 258 callbacks suppressed [ 229.194395][ T29] audit: type=1400 audit(229.110:4523): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 229.195541][ T29] audit: type=1400 audit(229.120:4524): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 229.196952][ T29] audit: type=1400 audit(229.120:4525): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 229.246292][ T29] audit: type=1400 audit(229.160:4526): avc: denied { read } for pid=8704 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 229.264247][ T29] audit: type=1400 audit(229.180:4527): avc: denied { read } for pid=8705 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 229.311601][ T29] audit: type=1400 audit(229.230:4528): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 229.312738][ T29] audit: type=1400 audit(229.230:4529): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 229.313623][ T29] audit: type=1400 audit(229.230:4530): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 229.377479][ T29] audit: type=1400 audit(229.300:4531): avc: denied { read } for pid=8708 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 229.445359][ T29] audit: type=1400 audit(229.360:4532): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 230.250501][ T8736] binfmt_misc: register: failed to install interpreter file ./file0 [ 234.218163][ T29] kauditd_printk_skb: 236 callbacks suppressed [ 234.225819][ T29] audit: type=1400 audit(234.140:4769): avc: denied { read } for pid=8867 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 234.252590][ T29] audit: type=1400 audit(234.170:4770): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 234.254455][ T29] audit: type=1400 audit(234.170:4771): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 234.256382][ T29] audit: type=1400 audit(234.170:4772): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 234.316230][ T29] audit: type=1400 audit(234.240:4773): avc: denied { read } for pid=8870 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 234.378226][ T29] audit: type=1400 audit(234.300:4774): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 234.379908][ T29] audit: type=1400 audit(234.300:4775): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 234.381372][ T29] audit: type=1400 audit(234.300:4776): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 234.387419][ T29] audit: type=1400 audit(234.310:4777): avc: denied { read } for pid=8872 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 234.482801][ T29] audit: type=1400 audit(234.400:4778): avc: denied { read } for pid=8875 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 235.114233][ T8897] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8897 comm=syz.0.2552 [ 235.910648][ T8923] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=8923 comm=syz.1.2567 [ 239.325349][ T29] kauditd_printk_skb: 235 callbacks suppressed [ 239.327838][ T29] audit: type=1400 audit(239.240:5014): avc: denied { read } for pid=9024 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 239.785201][ T29] audit: type=1400 audit(239.700:5015): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 239.795341][ T29] audit: type=1400 audit(239.710:5016): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 239.795594][ T29] audit: type=1400 audit(239.710:5017): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 240.048243][ T29] audit: type=1400 audit(239.960:5019): avc: denied { read } for pid=9027 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 240.048591][ T29] audit: type=1400 audit(239.960:5018): avc: denied { read } for pid=9026 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 240.236292][ T29] audit: type=1400 audit(240.160:5020): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 240.236598][ T29] audit: type=1400 audit(240.160:5021): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 240.245410][ T29] audit: type=1400 audit(240.160:5022): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 240.460120][ T29] audit: type=1400 audit(240.380:5024): avc: denied { read } for pid=9031 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 241.649496][ T9071] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5134 sclass=netlink_route_socket pid=9071 comm=syz.1.2640 [ 244.351821][ T29] kauditd_printk_skb: 84 callbacks suppressed [ 244.357639][ T29] audit: type=1400 audit(244.270:5108): avc: denied { read } for pid=9080 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 244.407460][ T29] audit: type=1400 audit(244.330:5109): avc: denied { read } for pid=9082 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 244.434340][ T29] audit: type=1400 audit(244.350:5110): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.442365][ T29] audit: type=1400 audit(244.360:5111): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.442760][ T29] audit: type=1400 audit(244.360:5112): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.502490][ T29] audit: type=1400 audit(244.420:5113): avc: denied { read } for pid=9084 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 244.529486][ T29] audit: type=1400 audit(244.450:5114): avc: denied { read } for pid=9085 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 244.555398][ T29] audit: type=1400 audit(244.460:5115): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.555898][ T29] audit: type=1400 audit(244.460:5116): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.555980][ T29] audit: type=1400 audit(244.460:5117): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 249.375308][ T29] kauditd_printk_skb: 233 callbacks suppressed [ 249.379587][ T29] audit: type=1400 audit(249.290:5351): avc: denied { read } for pid=9250 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.385986][ T29] audit: type=1400 audit(249.300:5352): avc: denied { read } for pid=9251 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.443162][ T29] audit: type=1400 audit(249.360:5353): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 249.444160][ T29] audit: type=1400 audit(249.360:5354): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 249.448309][ T29] audit: type=1400 audit(249.370:5355): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 249.511545][ T29] audit: type=1400 audit(249.430:5356): avc: denied { read } for pid=9255 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.526248][ T29] audit: type=1400 audit(249.440:5357): avc: denied { read } for pid=9254 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.593805][ T29] audit: type=1400 audit(249.510:5358): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 249.599054][ T29] audit: type=1400 audit(249.510:5359): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 249.601757][ T29] audit: type=1400 audit(249.520:5360): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.391417][ T29] kauditd_printk_skb: 230 callbacks suppressed [ 254.392567][ T29] audit: type=1400 audit(254.310:5591): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.394237][ T29] audit: type=1400 audit(254.310:5592): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.396402][ T29] audit: type=1400 audit(254.310:5593): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.407033][ T29] audit: type=1400 audit(254.330:5594): avc: denied { read } for pid=9456 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 254.462932][ T29] audit: type=1400 audit(254.380:5595): avc: denied { read } for pid=9458 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 254.532003][ T29] audit: type=1400 audit(254.450:5596): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.533699][ T29] audit: type=1400 audit(254.450:5597): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.537171][ T29] audit: type=1400 audit(254.450:5598): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.544437][ T29] audit: type=1400 audit(254.460:5599): avc: denied { read } for pid=9460 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 254.612590][ T29] audit: type=1400 audit(254.530:5600): avc: denied { read } for pid=9462 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 255.407129][ T9491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1537 sclass=netlink_route_socket pid=9491 comm=syz.1.2830 [ 256.620780][ T9532] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1537 sclass=netlink_route_socket pid=9532 comm=syz.0.2847 [ 259.433850][ T29] kauditd_printk_skb: 241 callbacks suppressed [ 259.434217][ T29] audit: type=1400 audit(259.350:5842): avc: denied { read } for pid=9639 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 259.497823][ T29] audit: type=1400 audit(259.420:5843): avc: denied { read } for pid=9641 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 259.502102][ T29] audit: type=1400 audit(259.420:5844): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 259.502467][ T29] audit: type=1400 audit(259.420:5845): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 259.514285][ T29] audit: type=1400 audit(259.430:5846): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 259.517992][ T29] audit: type=1400 audit(259.440:5847): avc: denied { write } for pid=9641 comm="syz.0.2907" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 259.519125][ T29] audit: type=1400 audit(259.440:5848): avc: denied { write open } for pid=9641 comm="syz.0.2907" path="/dev/sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 259.602253][ T29] audit: type=1400 audit(259.520:5849): avc: denied { read } for pid=9644 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 259.602653][ T29] audit: type=1400 audit(259.520:5850): avc: denied { read } for pid=9643 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 259.671591][ T29] audit: type=1400 audit(259.590:5851): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 261.091783][ T9698] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 264.440189][ T29] kauditd_printk_skb: 286 callbacks suppressed [ 264.440597][ T29] audit: type=1400 audit(264.360:6138): avc: denied { read } for pid=9823 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 264.474077][ T29] audit: type=1400 audit(264.390:6139): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 264.475267][ T29] audit: type=1400 audit(264.390:6140): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 264.475490][ T29] audit: type=1400 audit(264.390:6141): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 264.482650][ T29] audit: type=1400 audit(264.400:6142): avc: denied { read } for pid=9824 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 264.518071][ T29] audit: type=1400 audit(264.440:6143): avc: denied { read } for pid=9827 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 264.535492][ T29] audit: type=1400 audit(264.450:6144): avc: denied { create } for pid=9827 comm="syz.1.2997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 264.536032][ T29] audit: type=1400 audit(264.450:6145): avc: denied { getopt } for pid=9827 comm="syz.1.2997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 264.549451][ T29] audit: type=1400 audit(264.470:6146): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 264.549923][ T29] audit: type=1400 audit(264.470:6147): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 265.606583][ T1810] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 265.766016][ T1810] usb 1-1: Using ep0 maxpacket: 16 [ 265.784286][ T1810] usb 1-1: unable to get BOS descriptor or descriptor too short [ 265.793881][ T1810] usb 1-1: config 12 has an invalid interface number: 103 but max is 0 [ 265.794291][ T1810] usb 1-1: config 12 has no interface number 0 [ 265.794984][ T1810] usb 1-1: config 12 interface 103 has no altsetting 0 [ 265.810058][ T1810] usb 1-1: New USB device found, idVendor=1901, idProduct=0197, bcdDevice=f6.d9 [ 265.810584][ T1810] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 265.810847][ T1810] usb 1-1: Product: syz [ 265.811008][ T1810] usb 1-1: Manufacturer: syz [ 265.811155][ T1810] usb 1-1: SerialNumber: syz [ 565.895146][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 565.897597][ C0] rcu: 1-...!: (1 ticks this GP) idle=f44c/1/0x40000002 softirq=23731/23731 fqs=1 [ 565.898238][ C0] rcu: (detected by 0, t=30002 jiffies, g=43093, q=4 ncpus=2) [ 565.899036][ C0] Sending NMI from CPU 0 to CPUs 1: [ 565.900004][ C1] NMI backtrace for cpu 1 [ 565.900606][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 565.900703][ C1] Hardware name: ARM-Versatile Express [ 565.900842][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 565.901306][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 565.901332][ C1] pc : [<81abc000>] lr : [<81abbfcc>] psr: 80000113 [ 565.901389][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 565.901413][ C1] r10: 81c05450 r9 : 840eaa40 r8 : 83eab688 [ 565.901442][ C1] r7 : 840eab68 r6 : 00000000 r5 : 00000001 r4 : 840eab68 [ 565.901468][ C1] r3 : 000078da r2 : 000078db r1 : 00000000 r0 : 00000001 [ 565.901539][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 565.901582][ C1] Control: 30c5387d Table: 84cd5f80 DAC: 00000000 [ 565.901643][ C1] Call trace: frame pointer underflow [ 565.901828][ C1] [<81abbfb4>] (_raw_spin_lock) from [<809c7b2c>] (gpio_mmio_set+0x44/0x80) [ 565.902067][ C1] r5:00000001 r4:840eaa40 [ 565.902139][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 565.902211][ C1] r7:00000000 r6:00000000 r5:00000000 r4:83ff8180 [ 565.902222][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 565.902252][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 565.902305][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:fffff2a8 r6:00000007 r5:00000000 [ 565.902323][ C1] r4:83ff8180 [ 565.902331][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 565.902358][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 565.902385][ C1] r5:83307044 r4:83307044 [ 565.902394][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca4d4>] (led_set_brightness_nosleep+0x38/0x44) [ 565.902428][ C1] r5:83307044 r4:84e22ccc [ 565.902437][ C1] [<809ca49c>] (led_set_brightness_nosleep) from [<809cd538>] (led_heartbeat_function+0x84/0x144) [ 565.902464][ C1] [<809cd4b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 565.902501][ C1] r7:fffff2a8 r6:809cd4b4 r5:84e22ccc r4:83216000 [ 565.902510][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 565.902545][ C1] r9:df805ebc r8:fffff2a8 r7:00000000 r6:809cd4b4 r5:dddd9f00 r4:84e22ccc [ 565.902555][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 565.902592][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000382 r5:00000002 [ 565.902604][ C1] r4:dddd9f00 [ 565.902611][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 565.902642][ C1] r4:82804084 [ 565.902651][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 565.902684][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 565.902722][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 565.902734][ C1] r4:83216000 [ 565.902742][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 565.902774][ C1] r5:8247f0cc r4:826c3a9c [ 565.902783][ C1] [<8025be38>] (irq_exit) from [<81aada64>] (generic_handle_arch_irq+0x7c/0x80) [ 565.902819][ C1] [<81aad9e8>] (generic_handle_arch_irq) from [<81a7da0c>] (call_with_stack+0x1c/0x20) [ 565.902861][ C1] r9:83216000 r8:83eab688 r7:df865e3c r6:ffffffff r5:60000113 r4:809c832c [ 565.902871][ C1] [<81a7d9f0>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 565.902948][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 565.903062][ C1] 5e00: e0287008 00000009 000078da 00000000 e0287008 00000009 [ 565.903097][ C1] 5e20: 00000001 840eab68 83eab688 840eaa40 00000000 df865e6c df865e58 df865e58 [ 565.903115][ C1] 5e40: 809c8328 809c832c 60000113 ffffffff [ 565.903150][ C1] [<809c830c>] (gpio_mmio_write32) from [<809c7b4c>] (gpio_mmio_set+0x64/0x80) [ 565.903201][ C1] r5:00000008 r4:840eaa40 [ 565.903212][ C1] [<809c7ae8>] (gpio_mmio_set) from [<809b82e8>] (gpiochip_set+0x1c/0x44) [ 565.903249][ C1] r7:00000001 r6:00000000 r5:00000003 r4:83ff81bc [ 565.903262][ C1] [<809b82cc>] (gpiochip_set) from [<809babb0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 565.903292][ C1] [<809bab38>] (gpiod_set_raw_value_commit) from [<809bc450>] (gpiod_set_value_nocheck+0x44/0x58) [ 565.903328][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83330418 r5:00000001 [ 565.903342][ C1] r4:83ff81bc [ 565.903350][ C1] [<809bc40c>] (gpiod_set_value_nocheck) from [<809bc4a0>] (gpiod_set_value+0x3c/0x88) [ 565.903379][ C1] [<809bc464>] (gpiod_set_value) from [<809ccc3c>] (gpio_led_set+0x5c/0x60) [ 565.903409][ C1] r5:000000ff r4:83307314 [ 565.903423][ C1] [<809ccbe0>] (gpio_led_set) from [<809ca564>] (led_set_brightness+0x84/0x90) [ 565.903454][ C1] r5:000000ff r4:83307314 [ 565.903467][ C1] [<809ca4e0>] (led_set_brightness) from [<809cc0e4>] (led_trigger_event+0x40/0x58) [ 565.903498][ C1] r5:000000ff r4:83307314 [ 565.903508][ C1] [<809cc0a4>] (led_trigger_event) from [<809cd740>] (ledtrig_cpu+0xac/0xf4) [ 565.903576][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 565.903596][ C1] [<809cd694>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 565.903677][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 565.903698][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 565.903747][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 565.903830][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 565.903856][ C1] r4:00000092 [ 565.903874][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 565.903939][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 565.904053][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 565.923620][ C0] rcu: rcu_preempt kthread starved for 30000 jiffies! g43093 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 565.924119][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 565.924489][ C0] rcu: RCU grace-period kthread stack dump: [ 565.924902][ C0] task:rcu_preempt state:R running task stack:0 pid:15 tgid:15 ppid:2 task_flags:0x208040 flags:0x00000000 [ 565.925668][ C0] Call trace: [ 565.925891][ C0] [<81ab123c>] (__schedule) from [<81ab24e8>] (schedule+0x2c/0x130) [ 565.926270][ C0] r10:00000001 r9:828efccc r8:828efcd8 r7:83213000 r6:83213000 r5:82804d80 [ 565.926589][ C0] r4:83213000 [ 565.926748][ C0] [<81ab24bc>] (schedule) from [<81abac60>] (schedule_timeout+0x8c/0x114) [ 565.927080][ C0] r5:82804d80 r4:fffff2a7 [ 565.927259][ C0] [<81ababd4>] (schedule_timeout) from [<80303f54>] (rcu_gp_fqs_loop+0x150/0x4cc) [ 565.927629][ C0] r6:82804d80 r5:828efb00 r4:00000000 [ 565.927836][ C0] [<80303e04>] (rcu_gp_fqs_loop) from [<80308c00>] (rcu_gp_kthread+0xec/0x18c) [ 565.928212][ C0] r10:df855f4c r9:82804d80 r8:828efb00 r7:828efcda r6:828efccc r5:828efcd8 [ 565.928654][ C0] r4:83213000 [ 565.928805][ C0] [<80308b14>] (rcu_gp_kthread) from [<8027f6fc>] (kthread+0x12c/0x280) [ 565.929107][ C0] r7:830bf080 [ 565.929249][ C0] [<8027f5d0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 565.929588][ C0] Exception stack(0xdf855fb0 to 0xdf855ff8) [ 565.929830][ C0] 5fa0: 00000000 00000000 00000000 00000000 [ 565.930210][ C0] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 565.930510][ C0] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 565.930768][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f5d0 [ 565.931009][ C0] r4:830b7c40