last executing test programs: 5.002456197s ago: executing program 0 (id=12935): exit(0x5) exit(0x4) exit(0xff) exit(0x1) io_setup(0x2, &(0x7f0000000540)) 2.47683293s ago: executing program 1 (id=12944): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000680)="bff3b04532ee88437fbbe0b8daea2ffdeec98cbb4db92ae5ef8ddcaf5409c96a745a1ce6c973630b2d63dd5e8a517ee8b1d3143ae79182d457d36d5ceef88000eb63de44074a1ea03f406fb0c4f12d690fb239e8118ac8cd2a16f3f65fcca5a2d3793c13", 0x64}], 0x1) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000240)={0x4020, 0x7, 0x9, 0x200e, 0x8, "ae4137031f10be64"}) 2.156264164s ago: executing program 1 (id=12945): mq_unlink(&(0x7f0000000440)='.,--^@@+\x00') 1.599262964s ago: executing program 1 (id=12946): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)="cb", 0x1}], 0x1, &(0x7f0000000440)=[{0x10, 0x1, 0x2}], 0x10}, 0x8000) 1.500777551s ago: executing program 0 (id=12947): r0 = syz_open_dev$I2C(&(0x7f00000002c0), 0x8c, 0x41) ioctl$I2C_RDWR(r0, 0x707, &(0x7f0000001c80)={&(0x7f0000001c40)=[{0x9d2a, 0xa7, 0x5, &(0x7f0000001900)="4e1630ea28"}, {0x8, 0xba31, 0x0, 0x0}], 0x100000000000002a}) 1.323942984s ago: executing program 1 (id=12948): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0xc, 0x4, 0x7ffcfffc}]}) r0 = fsopen(&(0x7f00000000c0)='sysfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 1.200304423s ago: executing program 0 (id=12949): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x89fb, &(0x7f0000000000)={'bond0\x00'}) 1.020249656s ago: executing program 1 (id=12950): creat(&(0x7f0000000080)='./file0\x00', 0x12a) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) rt_sigqueueinfo(0x0, 0x45, &(0x7f0000000140)={0x17, 0x5, 0x6f7}) 1.008173047s ago: executing program 0 (id=12951): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f00000032c0)="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", 0x2000, &(0x7f0000006300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) preadv(r0, &(0x7f0000000780)=[{&(0x7f0000000080)=""/197, 0xc5}], 0x1, 0x200003, 0x5) read$FUSE(r0, &(0x7f0000008400)={0x2020}, 0xd00) 408.570751ms ago: executing program 1 (id=12952): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010026bd7000fcdbdf251c"], 0x14}, 0x1, 0x0, 0x0, 0x8844}, 0x48804) 310.482358ms ago: executing program 0 (id=12953): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f00000004c0)=""/4096, 0x18) getdents(r0, &(0x7f0000000080)=""/70, 0x46) 0s ago: executing program 0 (id=12955): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x80000) recvmsg$inet_nvme(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)=""/126, 0x7e}, {0x0}], 0x2}, 0x100) kernel console output (not intermixed with test programs): lass=blk_file permissive=1 [ 3837.567669][ T29] audit: type=1400 audit(3837.450:67970): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3837.814436][ T29] audit: type=1400 audit(3837.700:67971): avc: denied { read write } for pid=5644 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3837.814839][ T29] audit: type=1400 audit(3837.700:67972): avc: denied { open } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3837.815185][ T29] audit: type=1400 audit(3837.700:67973): avc: denied { ioctl } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3838.159338][ T29] audit: type=1400 audit(3838.050:67974): avc: denied { read write } for pid=9075 comm="syz.0.12070" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3838.168881][ T29] audit: type=1400 audit(3838.050:67975): avc: denied { open } for pid=9075 comm="syz.0.12070" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3838.236573][ T29] audit: type=1400 audit(3838.090:67976): avc: denied { ioctl } for pid=9075 comm="syz.0.12070" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3838.344852][ T29] audit: type=1400 audit(3838.220:67977): avc: denied { read write } for pid=5644 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3842.594439][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 3842.594674][ T29] audit: type=1400 audit(3842.480:68037): avc: denied { read write } for pid=5644 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3842.604316][ T29] audit: type=1400 audit(3842.480:68038): avc: denied { open } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3842.617377][ T29] audit: type=1400 audit(3842.510:68039): avc: denied { ioctl } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3842.854399][ T29] audit: type=1400 audit(3842.740:68040): avc: denied { read write } for pid=5644 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3842.900156][ T29] audit: type=1400 audit(3842.770:68041): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3842.918890][ T29] audit: type=1400 audit(3842.770:68042): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3842.919427][ T29] audit: type=1400 audit(3842.770:68043): avc: denied { ioctl } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3842.919563][ T29] audit: type=1400 audit(3842.770:68044): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3843.281109][ T29] audit: type=1400 audit(3843.170:68045): avc: denied { read write } for pid=5644 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3843.295790][ T29] audit: type=1400 audit(3843.170:68046): avc: denied { open } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3845.702916][ T9135] sock: sock_timestamping_bind_phc: sock not bind to device [ 3846.131786][ T9137] netlink: 80 bytes leftover after parsing attributes in process `syz.0.12097'. [ 3847.607566][ T29] kauditd_printk_skb: 76 callbacks suppressed [ 3847.612205][ T29] audit: type=1400 audit(3847.430:68123): avc: denied { read write } for pid=9151 comm="syz.1.12104" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3847.630174][ T29] audit: type=1400 audit(3847.500:68124): avc: denied { open } for pid=9151 comm="syz.1.12104" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3847.630713][ T29] audit: type=1400 audit(3847.500:68125): avc: denied { ioctl } for pid=9151 comm="syz.1.12104" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3847.757104][ T29] audit: type=1400 audit(3847.640:68126): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3847.759627][ T29] audit: type=1400 audit(3847.650:68127): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3847.762684][ T29] audit: type=1400 audit(3847.650:68128): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3847.829639][ T29] audit: type=1400 audit(3847.710:68129): avc: denied { read write } for pid=5644 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3847.855432][ T29] audit: type=1400 audit(3847.740:68130): avc: denied { read write open } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3847.855859][ T29] audit: type=1400 audit(3847.740:68131): avc: denied { ioctl } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3847.895230][ T29] audit: type=1400 audit(3847.770:68132): avc: denied { map_create } for pid=9156 comm="syz.1.12106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3849.829720][ T9177] netlink: 40 bytes leftover after parsing attributes in process `syz.0.12114'. [ 3850.228598][ T9181] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12116'. [ 3852.096650][ T9200] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=29 sclass=netlink_audit_socket pid=9200 comm=syz.0.12125 [ 3852.621365][ T29] kauditd_printk_skb: 163 callbacks suppressed [ 3852.621882][ T29] audit: type=1400 audit(3852.510:68296): avc: denied { read write } for pid=5644 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3852.632529][ T29] audit: type=1400 audit(3852.520:68297): avc: denied { read write open } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3852.675025][ T29] audit: type=1400 audit(3852.560:68298): avc: denied { ioctl } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3852.771743][ T29] audit: type=1400 audit(3852.660:68299): avc: denied { search } for pid=9172 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3852.931506][ T29] audit: type=1400 audit(3852.820:68300): avc: denied { create } for pid=9207 comm="syz.0.12129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3853.073399][ T29] audit: type=1400 audit(3852.960:68301): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3853.087177][ T29] audit: type=1400 audit(3852.980:68302): avc: denied { module_request } for pid=9207 comm="syz.0.12129" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3853.095866][ T29] audit: type=1400 audit(3852.980:68303): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3853.096383][ T29] audit: type=1400 audit(3852.980:68304): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3853.630715][ T29] audit: type=1400 audit(3853.520:68305): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3853.861144][ T9216] tmpfs: Unsupported parameter 'mpol' [ 3857.674932][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 3857.675337][ T29] audit: type=1400 audit(3857.560:68376): avc: denied { read write } for pid=5644 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3857.680303][ T29] audit: type=1400 audit(3857.570:68377): avc: denied { read write open } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3857.718695][ T29] audit: type=1400 audit(3857.590:68378): avc: denied { ioctl } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3857.918404][ T29] audit: type=1400 audit(3857.810:68379): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3857.950036][ T29] audit: type=1400 audit(3857.820:68380): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3857.962497][ T29] audit: type=1400 audit(3857.840:68381): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3858.123295][ T29] audit: type=1400 audit(3857.950:68382): avc: denied { create } for pid=9253 comm="syz.0.12149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3858.190130][ T29] audit: type=1400 audit(3858.080:68383): avc: denied { write } for pid=9253 comm="syz.0.12149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3858.315844][ T29] audit: type=1400 audit(3858.200:68384): avc: denied { read write } for pid=5644 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3858.365829][ T29] audit: type=1400 audit(3858.240:68385): avc: denied { read write open } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3862.712577][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 3862.712917][ T29] audit: type=1400 audit(3862.600:68448): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3862.737714][ T29] audit: type=1400 audit(3862.630:68449): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3862.745371][ T29] audit: type=1400 audit(3862.640:68450): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3862.789110][ T29] audit: type=1400 audit(3862.680:68451): avc: denied { map_create } for pid=9297 comm="syz.0.12167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3862.843492][ T29] audit: type=1400 audit(3862.720:68452): avc: denied { map_read map_write } for pid=9297 comm="syz.0.12167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3862.867745][ T29] audit: type=1400 audit(3862.760:68453): avc: denied { prog_load } for pid=9297 comm="syz.0.12167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3862.881224][ T29] audit: type=1400 audit(3862.770:68454): avc: denied { bpf } for pid=9297 comm="syz.0.12167" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3862.881761][ T29] audit: type=1400 audit(3862.770:68455): avc: denied { perfmon } for pid=9297 comm="syz.0.12167" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3862.973249][ T29] audit: type=1400 audit(3862.840:68456): avc: denied { read write } for pid=5644 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3863.008588][ T29] audit: type=1400 audit(3862.880:68457): avc: denied { open } for pid=5644 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3863.350984][ T38] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3863.498733][ T38] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3863.618143][ T38] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3863.750441][ T38] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3864.626986][ T38] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3864.646004][ T38] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3864.661392][ T38] bond0 (unregistering): Released all slaves [ 3864.794589][ T38] hsr_slave_0: left promiscuous mode [ 3864.836809][ T38] hsr_slave_1: left promiscuous mode [ 3864.876099][ T38] veth1_macvtap: left promiscuous mode [ 3864.885448][ T38] veth0_macvtap: left promiscuous mode [ 3864.887024][ T38] veth1_vlan: left promiscuous mode [ 3867.723202][ T29] kauditd_printk_skb: 116 callbacks suppressed [ 3867.724434][ T29] audit: type=1400 audit(3867.610:68574): avc: denied { search } for pid=9353 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3867.742351][ T29] audit: type=1400 audit(3867.630:68575): avc: denied { getattr } for pid=9353 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3867.756057][ T29] audit: type=1400 audit(3867.650:68576): avc: denied { search } for pid=9353 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3867.757393][ T29] audit: type=1400 audit(3867.650:68577): avc: denied { getattr } for pid=9353 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3867.771331][ T29] audit: type=1400 audit(3867.660:68578): avc: denied { write } for pid=9353 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3867.798680][ T29] audit: type=1400 audit(3867.690:68579): avc: denied { write open } for pid=9353 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3867.803578][ T29] audit: type=1400 audit(3867.690:68580): avc: denied { getattr } for pid=9353 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3867.810376][ T29] audit: type=1400 audit(3867.700:68581): avc: denied { ioctl } for pid=9353 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3867.929788][ T29] audit: type=1400 audit(3867.820:68582): avc: denied { module_request } for pid=9303 comm="syz-executor" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3868.116633][ T29] audit: type=1400 audit(3868.000:68583): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3872.680002][ T9303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3872.708756][ T9303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3872.816630][ T29] kauditd_printk_skb: 120 callbacks suppressed [ 3872.816992][ T29] audit: type=1400 audit(3872.710:68704): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3872.834568][ T29] audit: type=1400 audit(3872.720:68705): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3872.835017][ T29] audit: type=1400 audit(3872.720:68706): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3872.850532][ T29] audit: type=1400 audit(3872.740:68707): avc: denied { module_request } for pid=9303 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3873.014799][ T29] audit: type=1400 audit(3872.900:68708): avc: denied { search } for pid=9488 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3873.028350][ T29] audit: type=1400 audit(3872.920:68709): avc: denied { read } for pid=9488 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3873.028815][ T29] audit: type=1400 audit(3872.920:68710): avc: denied { open } for pid=9488 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3873.041908][ T29] audit: type=1400 audit(3872.930:68711): avc: denied { search } for pid=9488 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3873.042495][ T29] audit: type=1400 audit(3872.930:68712): avc: denied { search } for pid=9488 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3873.042590][ T29] audit: type=1400 audit(3872.930:68713): avc: denied { search } for pid=9488 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3876.633700][ T9303] hsr_slave_0: entered promiscuous mode [ 3876.656848][ T9303] hsr_slave_1: entered promiscuous mode [ 3878.037952][ T29] kauditd_printk_skb: 152 callbacks suppressed [ 3878.038229][ T29] audit: type=1400 audit(3877.930:68866): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3878.040103][ T29] audit: type=1400 audit(3877.930:68867): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3878.040428][ T29] audit: type=1400 audit(3877.930:68868): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3878.083413][ T29] audit: type=1400 audit(3877.970:68869): avc: denied { create } for pid=9303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3878.097274][ T29] audit: type=1400 audit(3877.990:68870): avc: denied { write } for pid=9303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3878.099246][ T29] audit: type=1400 audit(3877.990:68871): avc: denied { read } for pid=9303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3878.099987][ T9303] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 3878.159428][ T9303] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 3878.194531][ T29] audit: type=1400 audit(3878.080:68872): avc: denied { name_bind } for pid=9681 comm="syz.1.12198" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3878.209310][ T9303] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 3878.217355][ T29] audit: type=1400 audit(3878.110:68873): avc: denied { node_bind } for pid=9681 comm="syz.1.12198" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3878.243673][ T9303] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 3878.327273][ T29] audit: type=1400 audit(3878.220:68874): avc: denied { create } for pid=9303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3878.330040][ T29] audit: type=1400 audit(3878.220:68875): avc: denied { write } for pid=9303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3878.582835][ T9687] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12199'. [ 3882.230580][ T9303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3882.663655][ T9723] team_slave_1: entered promiscuous mode [ 3882.676654][ T9723] team_slave_1: entered allmulticast mode [ 3883.046228][ T29] kauditd_printk_skb: 186 callbacks suppressed [ 3883.058349][ T29] audit: type=1400 audit(3882.930:69062): avc: denied { search } for pid=9725 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3883.058767][ T29] audit: type=1400 audit(3882.950:69063): avc: denied { search } for pid=9725 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3883.059311][ T29] audit: type=1400 audit(3882.950:69064): avc: denied { search } for pid=9725 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3883.059611][ T29] audit: type=1400 audit(3882.950:69065): avc: denied { read open } for pid=9725 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3883.059829][ T29] audit: type=1400 audit(3882.950:69066): avc: denied { getattr } for pid=9725 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3883.087714][ T29] audit: type=1400 audit(3882.980:69067): avc: denied { search } for pid=9725 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3883.089977][ T29] audit: type=1400 audit(3882.980:69068): avc: denied { search } for pid=9725 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3883.092036][ T29] audit: type=1400 audit(3882.980:69069): avc: denied { search } for pid=9725 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3883.105408][ T29] audit: type=1400 audit(3882.980:69070): avc: denied { read open } for pid=9725 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3883.107605][ T29] audit: type=1400 audit(3882.980:69071): avc: denied { getattr } for pid=9725 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3884.091422][ T9736] tmpfs: Unsupported parameter 'mpol' [ 3886.338935][ T9757] netlink: 112 bytes leftover after parsing attributes in process `syz.1.12217'. [ 3888.058181][ T29] kauditd_printk_skb: 280 callbacks suppressed [ 3888.058561][ T29] audit: type=1400 audit(3887.950:69352): avc: denied { search } for pid=9772 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3888.058817][ T29] audit: type=1400 audit(3887.950:69353): avc: denied { search } for pid=9772 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3888.058917][ T29] audit: type=1400 audit(3887.950:69354): avc: denied { search } for pid=9772 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3888.067591][ T29] audit: type=1400 audit(3887.960:69356): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3888.075097][ T29] audit: type=1400 audit(3887.950:69355): avc: denied { read open } for pid=9772 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3888.080074][ T29] audit: type=1400 audit(3887.970:69357): avc: denied { getattr } for pid=9772 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3888.088750][ T29] audit: type=1400 audit(3887.980:69358): avc: denied { search } for pid=9772 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3888.089413][ T29] audit: type=1400 audit(3887.980:69360): avc: denied { search } for pid=9772 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3888.089878][ T29] audit: type=1400 audit(3887.980:69361): avc: denied { search } for pid=9772 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3888.090092][ T29] audit: type=1400 audit(3887.980:69362): avc: denied { search } for pid=9772 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3892.738331][ T9806] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12227'. [ 3893.089042][ T29] kauditd_printk_skb: 162 callbacks suppressed [ 3893.089475][ T29] audit: type=1400 audit(3892.980:69524): avc: denied { module_request } for pid=9303 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3893.108382][ T29] audit: type=1400 audit(3893.000:69525): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3893.109691][ T29] audit: type=1400 audit(3893.000:69526): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3893.109855][ T29] audit: type=1400 audit(3893.000:69527): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3893.130916][ T29] audit: type=1400 audit(3893.010:69528): avc: denied { search } for pid=9804 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3893.175647][ T29] audit: type=1400 audit(3893.060:69529): avc: denied { search } for pid=9804 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3893.176307][ T29] audit: type=1400 audit(3893.060:69530): avc: denied { search } for pid=9804 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3893.176392][ T29] audit: type=1400 audit(3893.060:69531): avc: denied { search } for pid=9804 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3893.241874][ T29] audit: type=1400 audit(3893.130:69532): avc: denied { search } for pid=9812 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3893.242344][ T29] audit: type=1400 audit(3893.130:69533): avc: denied { search } for pid=9812 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3894.925218][ T9303] veth0_vlan: entered promiscuous mode [ 3895.065102][ T9303] veth1_vlan: entered promiscuous mode [ 3895.361589][ T9303] veth0_macvtap: entered promiscuous mode [ 3895.457147][ T9303] veth1_macvtap: entered promiscuous mode [ 3895.721951][ T52] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3895.722758][ T52] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3895.722917][ T52] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3895.723038][ T52] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3898.099959][ T29] kauditd_printk_skb: 294 callbacks suppressed [ 3898.100388][ T29] audit: type=1400 audit(3897.990:69828): avc: denied { create } for pid=9867 comm="syz.0.12246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3898.125140][ T29] audit: type=1400 audit(3898.010:69829): avc: denied { ioctl } for pid=9867 comm="syz.0.12246" path="socket:[102261]" dev="sockfs" ino=102261 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3898.219377][ T29] audit: type=1400 audit(3898.110:69830): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3898.219827][ T29] audit: type=1400 audit(3898.110:69831): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3898.220268][ T29] audit: type=1400 audit(3898.110:69832): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3898.247641][ T29] audit: type=1400 audit(3898.140:69833): avc: denied { map_create } for pid=9869 comm="syz.1.12247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3898.248001][ T29] audit: type=1400 audit(3898.140:69834): avc: denied { bpf } for pid=9869 comm="syz.1.12247" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3898.304693][ T29] audit: type=1400 audit(3898.190:69835): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3898.306058][ T29] audit: type=1400 audit(3898.200:69836): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3898.325525][ T29] audit: type=1400 audit(3898.210:69837): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3899.037168][ T9877] netlink: 'syz.0.12250': attribute type 10 has an invalid length. [ 3899.037889][ T9877] netlink: 4 bytes leftover after parsing attributes in process `syz.0.12250'. [ 3903.206063][ T29] kauditd_printk_skb: 75 callbacks suppressed [ 3903.206553][ T29] audit: type=1400 audit(3903.090:69913): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3903.221929][ T29] audit: type=1400 audit(3903.110:69914): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3903.222618][ T29] audit: type=1400 audit(3903.110:69915): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3903.255595][ T29] audit: type=1400 audit(3903.140:69916): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3903.275055][ T29] audit: type=1400 audit(3903.160:69917): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3903.275726][ T29] audit: type=1400 audit(3903.160:69918): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3903.451168][ T29] audit: type=1400 audit(3903.340:69919): avc: denied { read } for pid=9921 comm="syz.0.12268" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3903.451617][ T29] audit: type=1400 audit(3903.340:69920): avc: denied { open } for pid=9921 comm="syz.0.12268" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3903.517658][ T29] audit: type=1400 audit(3903.410:69921): avc: denied { create } for pid=9922 comm="syz.1.12269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3903.523050][ T29] audit: type=1400 audit(3903.410:69922): avc: denied { setopt } for pid=9922 comm="syz.1.12269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3904.156740][ T9928] batadv_slave_1: entered promiscuous mode [ 3904.169908][ T9928] batadv_slave_1: left promiscuous mode [ 3908.511824][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 3908.512393][ T29] audit: type=1400 audit(3908.400:70013): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3908.512683][ T29] audit: type=1400 audit(3908.400:70014): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3908.512903][ T29] audit: type=1400 audit(3908.400:70015): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3908.793410][ T9980] bond2: (slave team_slave_1): Device is not bonding slave [ 3908.794499][ T9980] bond2: option active_slave: invalid value (team_slave_1) [ 3908.838296][ T9980] bond2 (unregistering): Released all slaves [ 3909.045267][ T29] audit: type=1400 audit(3908.930:70016): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3909.128087][ T29] audit: type=1400 audit(3909.010:70017): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3909.128641][ T29] audit: type=1400 audit(3909.010:70018): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3909.365197][ T29] audit: type=1400 audit(3909.250:70019): avc: denied { bpf } for pid=10047 comm="syz.1.12295" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3909.464436][ T29] audit: type=1400 audit(3909.350:70020): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3909.464734][ T29] audit: type=1400 audit(3909.350:70021): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3909.464970][ T29] audit: type=1400 audit(3909.350:70022): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3910.028749][T10052] netlink: 48 bytes leftover after parsing attributes in process `syz.1.12298'. [ 3911.091676][T10064] netlink: 56 bytes leftover after parsing attributes in process `syz.0.12302'. [ 3913.642104][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 3913.642440][ T29] audit: type=1400 audit(3913.520:70095): avc: denied { watch } for pid=10088 comm="syz.1.12314" path="/proc/464/task" dev="proc" ino=103550 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 3913.760020][ T29] audit: type=1400 audit(3913.650:70096): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3913.761446][ T29] audit: type=1400 audit(3913.650:70097): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3913.768066][ T29] audit: type=1400 audit(3913.650:70098): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3914.434713][ T29] audit: type=1400 audit(3914.310:70099): avc: denied { prog_load } for pid=10090 comm="syz.1.12315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3914.437247][ T29] audit: type=1400 audit(3914.320:70100): avc: denied { bpf } for pid=10090 comm="syz.1.12315" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3914.441893][ T29] audit: type=1400 audit(3914.330:70101): avc: denied { perfmon } for pid=10090 comm="syz.1.12315" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3914.538383][ T29] audit: type=1400 audit(3914.430:70102): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3914.547878][ T29] audit: type=1400 audit(3914.440:70103): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3914.551351][ T29] audit: type=1400 audit(3914.440:70104): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3918.684670][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 3918.685843][ T29] audit: type=1400 audit(3918.570:70191): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3918.686175][ T29] audit: type=1400 audit(3918.570:70192): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3918.686250][ T29] audit: type=1400 audit(3918.570:70193): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3918.732819][ T29] audit: type=1400 audit(3918.620:70194): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3918.747188][ T29] audit: type=1400 audit(3918.620:70195): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3918.747572][ T29] audit: type=1400 audit(3918.640:70196): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3918.931875][ T29] audit: type=1400 audit(3918.800:70197): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3918.932381][ T29] audit: type=1400 audit(3918.820:70198): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3918.932462][ T29] audit: type=1400 audit(3918.820:70199): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3918.949044][ T29] audit: type=1400 audit(3918.840:70200): avc: denied { create } for pid=10134 comm="syz.0.12333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3923.809036][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 3923.809427][ T29] audit: type=1400 audit(3923.700:70307): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3923.818356][ T29] audit: type=1400 audit(3923.710:70308): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3923.818831][ T29] audit: type=1400 audit(3923.710:70309): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3924.250795][ T29] audit: type=1400 audit(3924.140:70310): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3924.265743][ T29] audit: type=1400 audit(3924.140:70311): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3924.266353][ T29] audit: type=1400 audit(3924.150:70312): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3924.836567][ T29] audit: type=1400 audit(3924.730:70313): avc: denied { prog_load } for pid=10199 comm="syz.0.12358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3924.838376][ T29] audit: type=1400 audit(3924.730:70314): avc: denied { bpf } for pid=10199 comm="syz.0.12358" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3924.922310][ T29] audit: type=1400 audit(3924.810:70315): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3924.922684][ T29] audit: type=1400 audit(3924.810:70316): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3928.372130][T10237] netlink: 100 bytes leftover after parsing attributes in process `syz.1.12373'. [ 3928.372659][T10237] netlink: 140 bytes leftover after parsing attributes in process `syz.1.12373'. [ 3928.870960][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 3928.871570][ T29] audit: type=1400 audit(3928.760:70380): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3928.871731][ T29] audit: type=1400 audit(3928.760:70381): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3928.888183][ T29] audit: type=1400 audit(3928.760:70382): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3929.213351][ T29] audit: type=1400 audit(3929.100:70383): avc: denied { name_bind } for pid=10240 comm="syz.1.12375" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 3929.244972][ T29] audit: type=1400 audit(3929.120:70384): avc: denied { node_bind } for pid=10240 comm="syz.1.12375" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 3929.442832][ T29] audit: type=1400 audit(3929.330:70385): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3929.443358][ T29] audit: type=1400 audit(3929.330:70386): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3929.479171][ T29] audit: type=1400 audit(3929.360:70387): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3930.009290][ T29] audit: type=1400 audit(3929.900:70388): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3930.009964][ T29] audit: type=1400 audit(3929.900:70389): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3931.809605][T10256] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12381'. [ 3933.190709][T10268] tmpfs: Unsupported parameter 'mpol' [ 3934.004784][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 3934.005258][ T29] audit: type=1400 audit(3933.890:70449): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3934.005590][ T29] audit: type=1400 audit(3933.890:70450): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3934.035729][ T29] audit: type=1400 audit(3933.920:70451): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3934.523091][ T29] audit: type=1400 audit(3934.410:70452): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3934.532448][ T29] audit: type=1400 audit(3934.420:70453): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3934.615232][ T29] audit: type=1400 audit(3934.430:70454): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3935.145105][ T29] audit: type=1400 audit(3935.030:70455): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3935.145610][ T29] audit: type=1400 audit(3935.030:70456): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3935.146017][ T29] audit: type=1400 audit(3935.030:70457): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3935.475725][ T29] audit: type=1400 audit(3935.370:70458): avc: denied { write } for pid=10279 comm="syz.1.12393" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3938.337342][T10309] netlink: 20 bytes leftover after parsing attributes in process `syz.1.12407'. [ 3938.351928][T10309] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12407'. [ 3939.052760][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 3939.053103][ T29] audit: type=1400 audit(3938.940:70541): avc: denied { create } for pid=10318 comm="syz.1.12412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3939.131844][ T29] audit: type=1400 audit(3939.020:70543): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3939.158220][ T29] audit: type=1400 audit(3939.050:70544): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3939.166171][ T29] audit: type=1400 audit(3938.990:70542): avc: denied { write } for pid=10318 comm="syz.1.12412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3939.166600][ T29] audit: type=1400 audit(3939.050:70545): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3939.289028][ T29] audit: type=1400 audit(3939.170:70546): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3939.294723][ T29] audit: type=1400 audit(3939.180:70547): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3939.313408][ T29] audit: type=1400 audit(3939.190:70548): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3939.436329][ T29] audit: type=1400 audit(3939.330:70549): avc: denied { mounton } for pid=10322 comm="syz.0.12413" path="/72/file0" dev="tmpfs" ino=381 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3939.437767][T10323] tmpfs: Unsupported parameter 'mpol' [ 3939.712977][ T29] audit: type=1400 audit(3939.580:70550): avc: denied { create } for pid=10324 comm="syz.1.12414" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3940.014825][T10327] batadv_slave_1: entered promiscuous mode [ 3940.033056][T10326] batadv_slave_1: left promiscuous mode [ 3940.962762][T10341] netlink: 8 bytes leftover after parsing attributes in process `syz.0.12419'. [ 3940.963380][T10341] netlink: 8 bytes leftover after parsing attributes in process `syz.0.12419'. [ 3943.009383][T10363] netlink: 32 bytes leftover after parsing attributes in process `syz.1.12429'. [ 3944.214976][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 3944.215556][ T29] audit: type=1400 audit(3944.090:70623): avc: denied { create } for pid=10371 comm="syz.0.12432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3944.226518][ T29] audit: type=1400 audit(3944.110:70624): avc: denied { read } for pid=10372 comm="syz.1.12433" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3944.235116][ T29] audit: type=1400 audit(3944.120:70625): avc: denied { open } for pid=10372 comm="syz.1.12433" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3944.238412][ T29] audit: type=1400 audit(3944.120:70626): avc: denied { connect } for pid=10371 comm="syz.0.12432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3944.370775][ T29] audit: type=1400 audit(3944.250:70627): avc: denied { ioctl } for pid=10372 comm="syz.1.12433" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b72 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3944.514808][ T29] audit: type=1400 audit(3944.400:70628): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3944.517607][ T29] audit: type=1400 audit(3944.400:70629): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3944.517744][ T29] audit: type=1400 audit(3944.400:70630): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3944.887537][ T29] audit: type=1400 audit(3944.780:70631): avc: denied { write } for pid=10376 comm="syz.1.12435" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3944.887976][ T29] audit: type=1400 audit(3944.780:70632): avc: denied { open } for pid=10376 comm="syz.1.12435" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3945.691162][T10388] netlink: 8 bytes leftover after parsing attributes in process `syz.0.12438'. [ 3949.227172][ T29] kauditd_printk_skb: 89 callbacks suppressed [ 3949.227471][ T29] audit: type=1400 audit(3949.120:70722): avc: denied { bpf } for pid=10429 comm="syz.1.12459" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3949.257204][ T29] audit: type=1400 audit(3949.150:70723): avc: denied { unmount } for pid=9303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 3949.260959][ T29] audit: type=1400 audit(3949.150:70724): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3949.265380][ T29] audit: type=1400 audit(3949.160:70725): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3949.269100][ T29] audit: type=1400 audit(3949.160:70726): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3949.301804][ T29] audit: type=1400 audit(3949.190:70727): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3949.302105][ T29] audit: type=1400 audit(3949.190:70728): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3949.334560][ T29] audit: type=1400 audit(3949.210:70729): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3949.619294][ T29] audit: type=1400 audit(3949.510:70730): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3949.625787][ T29] audit: type=1400 audit(3949.520:70731): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3954.221588][T10460] IPv6: NLM_F_CREATE should be specified when creating new route [ 3954.329876][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 3954.331466][ T29] audit: type=1400 audit(3954.220:70775): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3954.358361][ T29] audit: type=1400 audit(3954.250:70776): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3954.360930][ T29] audit: type=1400 audit(3954.250:70777): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3954.531857][ T29] audit: type=1400 audit(3954.420:70778): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3954.536529][ T29] audit: type=1400 audit(3954.430:70779): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3954.555402][ T29] audit: type=1400 audit(3954.440:70780): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3954.731232][T10465] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12472'. [ 3954.924713][ T29] audit: type=1400 audit(3954.810:70781): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3954.926131][ T29] audit: type=1400 audit(3954.820:70782): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3954.927373][ T29] audit: type=1400 audit(3954.820:70783): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3955.001426][ T29] audit: type=1400 audit(3954.890:70784): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3959.376233][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 3959.376485][ T29] audit: type=1400 audit(3959.260:70875): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3959.376622][ T29] audit: type=1400 audit(3959.260:70876): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3959.376780][ T29] audit: type=1400 audit(3959.260:70877): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3959.409914][ T29] audit: type=1400 audit(3959.290:70878): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3959.416504][ T29] audit: type=1400 audit(3959.290:70879): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3959.856249][ T29] audit: type=1400 audit(3959.750:70880): avc: denied { block_suspend } for pid=10514 comm="syz.0.12497" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3959.929688][ T29] audit: type=1400 audit(3959.820:70881): avc: denied { block_suspend } for pid=10514 comm="syz.0.12497" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3960.019896][ T29] audit: type=1400 audit(3959.910:70882): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3960.020362][ T29] audit: type=1400 audit(3959.910:70883): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3960.058052][ T29] audit: type=1400 audit(3959.940:70884): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3964.633328][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 3964.634705][ T29] audit: type=1400 audit(3964.520:70957): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3964.635839][ T29] audit: type=1400 audit(3964.530:70958): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3964.656082][ T29] audit: type=1400 audit(3964.540:70959): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3964.738443][ T29] audit: type=1400 audit(3964.630:70960): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3964.739507][ T29] audit: type=1400 audit(3964.630:70961): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3964.740625][ T29] audit: type=1400 audit(3964.630:70962): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3964.975450][ T29] audit: type=1400 audit(3964.850:70963): avc: denied { create } for pid=10566 comm="syz.0.12518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3964.988082][ T29] audit: type=1400 audit(3964.880:70964): avc: denied { prog_load } for pid=10567 comm="syz.1.12519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3964.991433][ T29] audit: type=1400 audit(3964.880:70965): avc: denied { bpf } for pid=10567 comm="syz.1.12519" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3965.006156][ T29] audit: type=1400 audit(3964.900:70966): avc: denied { perfmon } for pid=10567 comm="syz.1.12519" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3969.784749][ T29] kauditd_printk_skb: 71 callbacks suppressed [ 3969.788047][ T29] audit: type=1400 audit(3969.660:71038): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3969.790523][ T29] audit: type=1400 audit(3969.660:71039): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3969.803591][ T29] audit: type=1400 audit(3969.680:71040): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3970.231748][ T29] audit: type=1400 audit(3970.120:71041): avc: denied { create } for pid=10612 comm="syz.1.12536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3970.242933][ T29] audit: type=1400 audit(3970.130:71042): avc: denied { getopt } for pid=10612 comm="syz.1.12536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3970.366675][ T29] audit: type=1400 audit(3970.260:71043): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3970.399335][ T29] audit: type=1400 audit(3970.270:71044): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3970.402813][ T29] audit: type=1400 audit(3970.290:71045): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3970.636548][ T29] audit: type=1400 audit(3970.510:71046): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3970.639341][ T29] audit: type=1400 audit(3970.530:71047): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3971.019102][T10621] netlink: 56 bytes leftover after parsing attributes in process `syz.0.12540'. [ 3974.642445][T10659] A link change request failed with some changes committed already. Interface veth0_macvtap may have been left with an inconsistent configuration, please check. [ 3975.173688][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 3975.174482][ T29] audit: type=1400 audit(3975.060:71114): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3975.184996][ T29] audit: type=1400 audit(3975.080:71115): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3975.185426][ T29] audit: type=1400 audit(3975.080:71116): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3975.207016][ T29] audit: type=1400 audit(3975.090:71117): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3975.207969][ T29] audit: type=1400 audit(3975.100:71118): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3975.223233][ T29] audit: type=1400 audit(3975.110:71119): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3975.680285][ T29] audit: type=1400 audit(3975.570:71120): avc: denied { read write } for pid=10665 comm="syz.1.12560" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3975.705681][ T29] audit: type=1400 audit(3975.600:71121): avc: denied { open } for pid=10665 comm="syz.1.12560" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3975.710102][ T29] audit: type=1400 audit(3975.600:71122): avc: denied { map } for pid=10665 comm="syz.1.12560" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3975.989455][ T29] audit: type=1400 audit(3975.880:71123): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3980.438303][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 3980.438955][ T29] audit: type=1400 audit(3980.330:71148): avc: denied { create } for pid=10686 comm="syz.1.12569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3980.548339][ T29] audit: type=1400 audit(3980.440:71149): avc: denied { write } for pid=10686 comm="syz.1.12569" path="socket:[105039]" dev="sockfs" ino=105039 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3980.686186][ T29] audit: type=1400 audit(3980.580:71150): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3980.696768][ T29] audit: type=1400 audit(3980.590:71151): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3980.703369][ T29] audit: type=1400 audit(3980.590:71152): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3980.718660][ T29] audit: type=1400 audit(3980.590:71153): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3980.730572][ T29] audit: type=1400 audit(3980.610:71154): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3980.731017][ T29] audit: type=1400 audit(3980.610:71155): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3980.968031][ T29] audit: type=1400 audit(3980.860:71156): avc: denied { write } for pid=10690 comm="syz.1.12571" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 3981.020513][ T29] audit: type=1400 audit(3980.900:71157): avc: denied { create } for pid=10691 comm="syz.0.12572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3985.447397][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 3985.447804][ T29] audit: type=1400 audit(3985.340:71254): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3985.448065][ T29] audit: type=1400 audit(3985.340:71255): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3985.448301][ T29] audit: type=1400 audit(3985.340:71256): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3985.518674][ T29] audit: type=1400 audit(3985.390:71257): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3985.585447][ T29] audit: type=1400 audit(3985.410:71258): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3985.644997][ T29] audit: type=1400 audit(3985.490:71259): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3985.864700][ T29] audit: type=1400 audit(3985.750:71260): avc: denied { create } for pid=10747 comm="syz.0.12598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3986.017671][ T29] audit: type=1400 audit(3985.910:71261): avc: denied { setopt } for pid=10747 comm="syz.0.12598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3986.110706][ T29] audit: type=1400 audit(3986.000:71262): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3986.129894][ T29] audit: type=1400 audit(3986.000:71263): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3990.600370][ T29] kauditd_printk_skb: 85 callbacks suppressed [ 3990.601720][ T29] audit: type=1400 audit(3990.490:71349): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3990.619444][ T29] audit: type=1400 audit(3990.510:71350): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3990.623055][ T29] audit: type=1400 audit(3990.510:71351): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3990.732784][ T29] audit: type=1400 audit(3990.620:71352): avc: denied { create } for pid=10798 comm="syz.1.12622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3990.758265][ T29] audit: type=1400 audit(3990.650:71353): avc: denied { write } for pid=10798 comm="syz.1.12622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3990.770702][ T29] audit: type=1400 audit(3990.660:71354): avc: denied { read } for pid=10798 comm="syz.1.12622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3990.828363][ T29] audit: type=1400 audit(3990.720:71355): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3990.838232][ T29] audit: type=1400 audit(3990.730:71356): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3990.841465][ T29] audit: type=1400 audit(3990.730:71357): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3991.044420][ T29] audit: type=1400 audit(3990.920:71358): avc: denied { create } for pid=10800 comm="syz.1.12623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3995.634956][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 3995.635432][ T29] audit: type=1400 audit(3995.520:71432): avc: denied { create } for pid=10844 comm="syz.1.12643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3995.652928][ T29] audit: type=1400 audit(3995.540:71433): avc: denied { bind } for pid=10844 comm="syz.1.12643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3995.658798][ T29] audit: type=1400 audit(3995.550:71434): avc: denied { module_request } for pid=10844 comm="syz.1.12643" kmod="crypto-sha3-224-generic" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3995.924907][ T29] audit: type=1400 audit(3995.820:71435): avc: denied { module_request } for pid=10844 comm="syz.1.12643" kmod="crypto-sha3-224-generic-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3996.161614][ T29] audit: type=1400 audit(3996.050:71436): avc: denied { accept } for pid=10844 comm="syz.1.12643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3996.271208][ T29] audit: type=1400 audit(3996.160:71437): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3996.276496][ T29] audit: type=1400 audit(3996.160:71438): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3996.313240][ T29] audit: type=1400 audit(3996.160:71439): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3996.704987][ T29] audit: type=1400 audit(3996.560:71440): avc: denied { create } for pid=10850 comm="syz.1.12644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3996.721873][ T29] audit: type=1400 audit(3996.610:71441): avc: denied { write } for pid=10850 comm="syz.1.12644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4000.735722][ T29] kauditd_printk_skb: 75 callbacks suppressed [ 4000.758626][ T29] audit: type=1400 audit(4000.630:71517): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4000.759494][ T29] audit: type=1400 audit(4000.640:71518): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4000.759580][ T29] audit: type=1400 audit(4000.640:71519): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4000.791770][ T29] audit: type=1400 audit(4000.680:71520): avc: denied { map_create } for pid=10890 comm="syz.0.12661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4000.828423][ T29] audit: type=1400 audit(4000.720:71521): avc: denied { bpf } for pid=10890 comm="syz.0.12661" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4000.831131][ T29] audit: type=1400 audit(4000.720:71522): avc: denied { map_read map_write } for pid=10890 comm="syz.0.12661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4001.020215][ T29] audit: type=1400 audit(4000.910:71523): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4001.049228][ T29] audit: type=1400 audit(4000.940:71524): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4001.052309][ T29] audit: type=1400 audit(4000.940:71525): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4001.095122][ T29] audit: type=1400 audit(4000.970:71526): avc: denied { create } for pid=10892 comm="syz.1.12662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4005.908656][ T29] kauditd_printk_skb: 105 callbacks suppressed [ 4005.909192][ T29] audit: type=1400 audit(4005.800:71632): avc: denied { create } for pid=10947 comm="syz.1.12688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4005.928875][ T29] audit: type=1400 audit(4005.820:71633): avc: denied { setopt } for pid=10947 comm="syz.1.12688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4005.942481][ T29] audit: type=1400 audit(4005.830:71634): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4005.955321][ T29] audit: type=1400 audit(4005.850:71635): avc: denied { bind } for pid=10947 comm="syz.1.12688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4005.964603][ T29] audit: type=1400 audit(4005.850:71636): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4005.969171][ T29] audit: type=1400 audit(4005.850:71637): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4006.163721][ T29] audit: type=1400 audit(4006.050:71638): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4006.167509][ T29] audit: type=1400 audit(4006.060:71639): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4006.176478][ T29] audit: type=1400 audit(4006.070:71640): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4006.474731][ T29] audit: type=1400 audit(4006.360:71641): avc: denied { read } for pid=10950 comm="syz.1.12690" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4011.122769][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 4011.123179][ T29] audit: type=1400 audit(4011.010:71700): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4011.201586][ T29] audit: type=1400 audit(4011.090:71701): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4011.202054][ T29] audit: type=1400 audit(4011.090:71702): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4011.474592][ T29] audit: type=1400 audit(4011.360:71703): avc: denied { create } for pid=10980 comm="syz.1.12703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4011.498238][ T29] audit: type=1400 audit(4011.390:71704): avc: denied { write } for pid=10980 comm="syz.1.12703" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4011.592299][ T29] audit: type=1400 audit(4011.480:71705): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4011.595440][ T29] audit: type=1400 audit(4011.480:71706): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4011.613618][ T29] audit: type=1400 audit(4011.480:71707): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4012.115294][ T29] audit: type=1400 audit(4012.000:71708): avc: denied { write } for pid=10982 comm="syz.1.12704" name="event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4012.118438][ T29] audit: type=1400 audit(4012.000:71709): avc: denied { open } for pid=10982 comm="syz.1.12704" path="/dev/input/event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4013.227555][T10989] batadv_slave_1: entered promiscuous mode [ 4013.273255][T10989] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12707'. [ 4013.313577][T10988] batadv_slave_1: left promiscuous mode [ 4016.083579][T11015] netlink: 32 bytes leftover after parsing attributes in process `syz.1.12721'. [ 4016.151436][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 4016.151853][ T29] audit: type=1400 audit(4016.040:71774): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4016.191168][ T29] audit: type=1400 audit(4016.070:71775): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4016.196383][ T29] audit: type=1400 audit(4016.080:71776): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4016.405096][ T29] audit: type=1400 audit(4016.290:71777): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4016.405538][ T29] audit: type=1400 audit(4016.290:71778): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4016.405984][ T29] audit: type=1400 audit(4016.290:71779): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4016.888109][ T29] audit: type=1400 audit(4016.780:71780): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4016.891075][ T29] audit: type=1400 audit(4016.780:71781): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4016.895460][ T29] audit: type=1400 audit(4016.780:71782): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4017.084625][ T29] audit: type=1400 audit(4016.960:71783): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4021.410223][ T29] kauditd_printk_skb: 76 callbacks suppressed [ 4021.410806][ T29] audit: type=1400 audit(4021.300:71860): avc: denied { write } for pid=11067 comm="syz.0.12746" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4021.411086][ T29] audit: type=1400 audit(4021.300:71861): avc: denied { open } for pid=11067 comm="syz.0.12746" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4021.417396][ T29] audit: type=1400 audit(4021.300:71862): avc: denied { create } for pid=11067 comm="syz.0.12746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4021.446988][ T29] audit: type=1400 audit(4021.330:71863): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4021.452481][ T29] audit: type=1400 audit(4021.340:71864): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4021.459752][ T29] audit: type=1400 audit(4021.350:71865): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4021.483177][ T29] audit: type=1400 audit(4021.370:71866): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4021.486678][ T29] audit: type=1400 audit(4021.370:71867): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4021.489709][ T29] audit: type=1400 audit(4021.370:71868): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4021.944447][ T29] audit: type=1400 audit(4021.830:71869): avc: denied { create } for pid=11071 comm="syz.1.12747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4022.367896][T11075] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12749'. [ 4024.641931][T11092] bond1: option active_slave: mode dependency failed, not supported in mode broadcast(3) [ 4024.671122][T11092] bond1 (unregistering): Released all slaves [ 4026.477457][ T29] kauditd_printk_skb: 76 callbacks suppressed [ 4026.478692][ T29] audit: type=1400 audit(4026.370:71946): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4026.480803][ T29] audit: type=1400 audit(4026.370:71947): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4026.482799][ T29] audit: type=1400 audit(4026.370:71948): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4026.515209][ T29] audit: type=1400 audit(4026.400:71949): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4026.515633][ T29] audit: type=1400 audit(4026.400:71950): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4026.692467][ T29] audit: type=1400 audit(4026.580:71951): avc: denied { read write } for pid=11181 comm="syz.1.12769" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4026.706465][ T29] audit: type=1400 audit(4026.600:71952): avc: denied { open } for pid=11180 comm="syz.0.12770" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4026.732064][ T29] audit: type=1400 audit(4026.620:71953): avc: denied { ioctl } for pid=11181 comm="syz.1.12769" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4026.751190][ T29] audit: type=1400 audit(4026.640:71954): avc: denied { ioctl } for pid=11181 comm="syz.1.12769" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4026.807459][ T29] audit: type=1400 audit(4026.700:71955): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4031.568614][ T29] kauditd_printk_skb: 91 callbacks suppressed [ 4031.568990][ T29] audit: type=1400 audit(4031.460:72047): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4031.602376][ T29] audit: type=1400 audit(4031.490:72048): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4031.605391][ T29] audit: type=1400 audit(4031.490:72049): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4031.832979][ T29] audit: type=1400 audit(4031.720:72050): avc: denied { sys_module } for pid=11227 comm="syz.0.12792" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4031.847144][ T29] audit: type=1400 audit(4031.740:72051): avc: denied { module_request } for pid=11227 comm="syz.0.12792" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4031.996730][ T29] audit: type=1400 audit(4031.890:72052): avc: denied { write } for pid=11227 comm="syz.0.12792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4032.025888][ T29] audit: type=1400 audit(4031.920:72053): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4032.029770][ T29] audit: type=1400 audit(4031.920:72054): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4032.032201][ T29] audit: type=1400 audit(4031.920:72055): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4032.165992][ T29] audit: type=1400 audit(4032.050:72056): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4036.930424][ T29] kauditd_printk_skb: 80 callbacks suppressed [ 4036.930818][ T29] audit: type=1400 audit(4036.820:72137): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4036.931093][ T29] audit: type=1400 audit(4036.820:72138): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4036.938309][ T29] audit: type=1400 audit(4036.830:72139): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4037.765945][ T29] audit: type=1400 audit(4037.650:72140): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4037.770323][ T29] audit: type=1400 audit(4037.660:72141): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4037.790355][ T29] audit: type=1400 audit(4037.660:72142): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4038.037551][ T29] audit: type=1400 audit(4037.930:72143): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4038.045065][ T29] audit: type=1400 audit(4037.930:72144): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4038.045529][ T29] audit: type=1400 audit(4037.930:72145): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4038.346523][ T29] audit: type=1400 audit(4038.220:72146): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4039.503413][T11335] cgroup: name respecified [ 4042.246385][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 4042.246842][ T29] audit: type=1400 audit(4042.130:72193): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4042.247106][ T29] audit: type=1400 audit(4042.130:72194): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4042.247352][ T29] audit: type=1400 audit(4042.130:72195): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4042.407372][ T29] audit: type=1400 audit(4042.300:72196): avc: denied { map_create } for pid=11349 comm="syz.1.12829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4042.578648][ T29] audit: type=1400 audit(4042.470:72197): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4042.586011][ T29] audit: type=1400 audit(4042.480:72198): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4042.594236][ T29] audit: type=1400 audit(4042.480:72199): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4042.944620][ T29] audit: type=1400 audit(4042.830:72200): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4042.947962][ T29] audit: type=1400 audit(4042.840:72201): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4042.955053][ T29] audit: type=1400 audit(4042.850:72202): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4047.258428][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 4047.258851][ T29] audit: type=1400 audit(4047.150:72249): avc: denied { ioctl } for pid=11379 comm="syz.1.12844" path="socket:[106343]" dev="sockfs" ino=106343 ioctlcmd=0x8936 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4047.328335][ T29] audit: type=1400 audit(4047.220:72250): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4047.331533][ T29] audit: type=1400 audit(4047.220:72251): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4047.335823][ T29] audit: type=1400 audit(4047.220:72252): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4047.537767][T11382] netlink: 20 bytes leftover after parsing attributes in process `syz.1.12845'. [ 4047.590321][ T29] audit: type=1400 audit(4047.480:72253): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4047.592603][ T29] audit: type=1400 audit(4047.480:72254): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4047.600590][ T29] audit: type=1400 audit(4047.480:72255): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4047.921230][ T29] audit: type=1400 audit(4047.810:72256): avc: denied { prog_load } for pid=11383 comm="syz.1.12846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4047.925713][ T29] audit: type=1400 audit(4047.820:72257): avc: denied { bpf } for pid=11383 comm="syz.1.12846" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4047.935376][ T29] audit: type=1400 audit(4047.820:72258): avc: denied { perfmon } for pid=11383 comm="syz.1.12846" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4048.232303][T11386] veth0_to_bond: entered promiscuous mode [ 4052.340090][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 4052.340586][ T29] audit: type=1400 audit(4052.230:72303): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4052.372545][ T29] audit: type=1400 audit(4052.260:72304): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4052.373161][ T29] audit: type=1400 audit(4052.260:72305): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4052.469589][T11408] ptrace attach of "/syz-executor exec"[11409] was attempted by "/syz-executor exec"[11408] [ 4052.517533][ T29] audit: type=1400 audit(4052.410:72306): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4052.517956][ T29] audit: type=1400 audit(4052.410:72307): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4052.518051][ T29] audit: type=1400 audit(4052.410:72308): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4052.713377][ T29] audit: type=1400 audit(4052.600:72309): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4052.715403][ T29] audit: type=1400 audit(4052.600:72310): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4052.718475][ T29] audit: type=1400 audit(4052.610:72311): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4052.739019][ T29] audit: type=1400 audit(4052.630:72312): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4057.450848][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 4057.451263][ T29] audit: type=1400 audit(4057.340:72409): avc: denied { module_request } for pid=11456 comm="syz.0.12881" kmod="crypto-sha224-ssse3-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4057.508860][ T29] audit: type=1400 audit(4057.380:72410): avc: denied { create } for pid=11461 comm="syz.1.12883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4057.510942][ T29] audit: type=1400 audit(4057.400:72411): avc: denied { write } for pid=11461 comm="syz.1.12883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4057.514811][ T29] audit: type=1400 audit(4057.400:72412): avc: denied { read } for pid=11461 comm="syz.1.12883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4057.524296][ T29] audit: type=1400 audit(4057.410:72413): avc: denied { create } for pid=11461 comm="syz.1.12883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4057.529592][ T29] audit: type=1400 audit(4057.420:72414): avc: denied { write } for pid=11461 comm="syz.1.12883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4057.548981][ T29] audit: type=1400 audit(4057.440:72415): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4057.564781][ T29] audit: type=1400 audit(4057.460:72416): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4057.575141][ T29] audit: type=1400 audit(4057.460:72417): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4057.697903][ T29] audit: type=1400 audit(4057.590:72418): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4060.893324][T11489] netlink: 40 bytes leftover after parsing attributes in process `syz.1.12895'. [ 4062.865754][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 4062.882641][ T29] audit: type=1400 audit(4062.760:72468): avc: denied { create } for pid=11497 comm="syz.1.12898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4062.905536][ T29] audit: type=1400 audit(4062.800:72469): avc: denied { bind } for pid=11497 comm="syz.1.12898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4062.953009][ T29] audit: type=1400 audit(4062.840:72470): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4062.956370][ T29] audit: type=1400 audit(4062.840:72471): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4062.965116][ T29] audit: type=1400 audit(4062.840:72472): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4063.028615][ T29] audit: type=1400 audit(4062.910:72473): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4063.045865][ T29] audit: type=1400 audit(4062.910:72474): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4063.046320][ T29] audit: type=1400 audit(4062.910:72475): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4063.194490][ T29] audit: type=1400 audit(4063.070:72476): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4063.194821][ T29] audit: type=1400 audit(4063.080:72477): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4065.673128][T11527] tmpfs: Unsupported parameter 'mpol' [ 4067.123270][T11540] IPv6: NLM_F_CREATE should be specified when creating new route [ 4067.147574][T11540] IPv6: Can't replace route, no match found [ 4068.019608][ T29] kauditd_printk_skb: 94 callbacks suppressed [ 4068.027484][ T29] audit: type=1400 audit(4067.910:72572): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4068.039138][ T29] audit: type=1400 audit(4067.930:72573): avc: denied { read write open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4068.070557][ T29] audit: type=1400 audit(4067.950:72574): avc: denied { ioctl } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4068.154901][ T29] audit: type=1400 audit(4068.030:72575): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4068.155433][ T29] audit: type=1400 audit(4068.030:72576): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4068.195189][ T29] audit: type=1400 audit(4068.080:72577): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4068.329919][ T29] audit: type=1400 audit(4068.220:72578): avc: denied { create } for pid=11555 comm="syz.1.12927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4068.350788][ T29] audit: type=1400 audit(4068.240:72579): avc: denied { setopt } for pid=11555 comm="syz.1.12927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4068.421000][ T29] audit: type=1400 audit(4068.310:72580): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4068.425999][ T29] audit: type=1400 audit(4068.310:72581): avc: denied { open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4068.593636][T11558] netlink: 40 bytes leftover after parsing attributes in process `syz.1.12928'. [ 4068.606396][T11558] netlink: 40 bytes leftover after parsing attributes in process `syz.1.12928'. [ 4068.610390][T11558] netlink: 40 bytes leftover after parsing attributes in process `syz.1.12928'. [ 4068.612889][T11558] netlink: 40 bytes leftover after parsing attributes in process `syz.1.12928'. [ 4071.899025][T11593] netlink: 'syz.1.12943': attribute type 2 has an invalid length. [ 4071.901391][T11593] netlink: 36 bytes leftover after parsing attributes in process `syz.1.12943'. [ 4071.904687][T11593] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 4073.065780][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 4073.066271][ T29] audit: type=1400 audit(4072.950:72652): avc: denied { create } for pid=11598 comm="syz.1.12946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4073.089102][ T29] audit: type=1400 audit(4072.980:72653): avc: denied { write } for pid=11598 comm="syz.1.12946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4073.139932][ T29] audit: type=1400 audit(4073.030:72654): avc: denied { write } for pid=11599 comm="syz.0.12947" name="i2c-0" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4073.140384][ T29] audit: type=1400 audit(4073.030:72655): avc: denied { open } for pid=11599 comm="syz.0.12947" path="/dev/i2c-0" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4073.152312][ T29] audit: type=1400 audit(4073.040:72656): avc: denied { ioctl } for pid=11599 comm="syz.0.12947" path="/dev/i2c-0" dev="devtmpfs" ino=701 ioctlcmd=0x707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4073.167182][ T29] audit: type=1400 audit(4073.060:72657): avc: denied { read write } for pid=8218 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4073.171311][ T29] audit: type=1400 audit(4073.060:72658): avc: denied { read write open } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4073.171919][ T29] audit: type=1400 audit(4073.060:72659): avc: denied { ioctl } for pid=8218 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4073.239840][ T29] audit: type=1400 audit(4073.130:72660): avc: denied { read write } for pid=9303 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4073.240309][ T29] audit: type=1400 audit(4073.130:72661): avc: denied { open } for pid=9303 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4074.489996][T15687] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4074.647961][T15687] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4074.818713][T15687] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4074.820747][ T30] INFO: task kworker/0:17:30302 blocked for more than 430 seconds. [ 4074.820987][ T30] Tainted: G L syzkaller #0 [ 4074.821054][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4074.821228][ T30] task:kworker/0:17 state:D stack:0 pid:30302 tgid:30302 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 4074.821625][ T30] Workqueue: events bpf_prog_free_deferred [ 4074.821807][ T30] Call trace: [ 4074.821903][ T30] [<81aa9bbc>] (__schedule) from [<81aaae4c>] (schedule+0x2c/0x134) [ 4074.822015][ T30] r10:dfb9dd84 r9:00000000 r8:60000013 r7:dfb9dd8c r6:829172e8 r5:83ec0c00 [ 4074.822129][ T30] r4:83ec0c00 [ 4074.822160][ T30] [<81aaae20>] (schedule) from [<81aaafd8>] (schedule_preempt_disabled+0x18/0x24) [ 4074.822221][ T30] r5:83ec0c00 r4:829172e4 [ 4074.822242][ T30] [<81aaafc0>] (schedule_preempt_disabled) from [<81aae5a0>] (__mutex_lock.constprop.0+0x584/0xf10) [ 4074.822297][ T30] [<81aae01c>] (__mutex_lock.constprop.0) from [<81aaf000>] (__mutex_lock_slowpath+0x14/0x18) [ 4074.822364][ T30] r10:8280c7e4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 [ 4074.822385][ T30] r4:00000000 [ 4074.822404][ T30] [<81aaefec>] (__mutex_lock_slowpath) from [<81aaf040>] (mutex_lock+0x3c/0x40) [ 4074.822460][ T30] [<81aaf004>] (mutex_lock) from [<804f0fc8>] (_vm_unmap_aliases+0x5c/0x238) [ 4074.822517][ T30] [<804f0f6c>] (_vm_unmap_aliases) from [<804f4cac>] (vfree+0x16c/0x210) [ 4074.822606][ T30] r10:83018405 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:862440c0 [ 4074.822638][ T30] r4:00000000 [ 4074.822678][ T30] [<804f4b40>] (vfree) from [<805607dc>] (execmem_free+0x30/0x50) [ 4074.822753][ T30] r9:83016170 r8:83ec0c00 r7:00000000 r6:83018400 r5:00001000 r4:7f22e000 [ 4074.822773][ T30] [<805607ac>] (execmem_free) from [<803ca91c>] (bpf_jit_free_exec+0x10/0x14) [ 4074.822829][ T30] r5:00001000 r4:e02af000 [ 4074.822848][ T30] [<803ca90c>] (bpf_jit_free_exec) from [<803cacfc>] (bpf_jit_free+0x64/0xe0) [ 4074.822921][ T30] [<803cac98>] (bpf_jit_free) from [<803cbc1c>] (bpf_prog_free_deferred+0x140/0x158) [ 4074.822996][ T30] r5:85f21794 r4:85a67380 [ 4074.823016][ T30] [<803cbadc>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8) [ 4074.823083][ T30] r7:dddcfb40 r6:83018400 r5:85f21794 r4:85a67380 [ 4074.823104][ T30] [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394) [ 4074.823170][ T30] r10:61c88647 r9:83ec0c00 r8:82804d80 r7:85a673ac r6:dddcfb40 r5:dddcfb60 [ 4074.823197][ T30] r4:85a67380 [ 4074.823216][ T30] [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c) [ 4074.823281][ T30] r10:00000000 r9:85a67380 r8:802777a8 r7:df971e68 r6:85a67700 r5:83ec0c00 [ 4074.823305][ T30] r4:00000001 [ 4074.823322][ T30] [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4074.823370][ T30] Exception stack(0xdfb9dfb0 to 0xdfb9dff8) [ 4074.823402][ T30] dfa0: 00000000 00000000 00000000 00000000 [ 4074.823439][ T30] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4074.823471][ T30] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4074.823509][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 [ 4074.823533][ T30] r4:86274ac0 [ 4074.838502][ T30] INFO: task kworker/0:17:30302 is blocked on a mutex likely owned by task kworker/1:46:6906. [ 4074.838701][ T30] task:kworker/1:46 state:R running task stack:0 pid:6906 tgid:6906 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 4074.838909][ T30] Workqueue: events bpf_prog_free_deferred [ 4074.839020][ T30] Call trace: [ 4074.839289][ T30] [<81aa9bbc>] (__schedule) from [<81aab284>] (preempt_schedule_irq+0x40/0xa8) [ 4074.839383][ T30] r10:8280c838 r9:83ef3000 r8:80200c04 r7:ea839d5c r6:ffffffff r5:83ef3000 [ 4074.839408][ T30] r4:00000000 [ 4074.839427][ T30] [<81aab244>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 4074.839509][ T30] Exception stack(0xea839d28 to 0xea839d70) [ 4074.839552][ T30] 9d20: 8df29000 ea88b000 00000001 802394d0 82ace620 82acf264 [ 4074.839607][ T30] 9d40: 7f00d000 ea88b000 00000000 00000001 8280c838 ea839d9c ea88b000 ea839d78 [ 4074.839641][ T30] 9d60: 8023043c 802394e8 80000113 ffffffff [ 4074.839669][ T30] r5:80000113 r4:802394e8 [ 4074.839687][ T30] [<802303dc>] (flush_tlb_kernel_range) from [<804f0d7c>] (__purge_vmap_area_lazy+0x260/0x450) [ 4074.839759][ T30] [<804f0b1c>] (__purge_vmap_area_lazy) from [<804f1154>] (_vm_unmap_aliases+0x1e8/0x238) [ 4074.839827][ T30] r10:00000000 r9:ea839dc0 r8:00000000 r7:ffffffff r6:00000008 r5:ea839e08 [ 4074.839849][ T30] r4:ea839dc0 [ 4074.839866][ T30] [<804f0f6c>] (_vm_unmap_aliases) from [<804f4cac>] (vfree+0x16c/0x210) [ 4074.839943][ T30] r10:83018605 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:861a1880 [ 4074.839967][ T30] r4:00000000 [ 4074.839986][ T30] [<804f4b40>] (vfree) from [<805607dc>] (execmem_free+0x30/0x50) [ 4074.840059][ T30] r9:83016170 r8:83ef3000 r7:00000000 r6:83018600 r5:00001000 r4:7f003000 [ 4074.840122][ T30] [<805607ac>] (execmem_free) from [<803ca91c>] (bpf_jit_free_exec+0x10/0x14) [ 4074.840195][ T30] r5:00001000 r4:dfd95000 [ 4074.840216][ T30] [<803ca90c>] (bpf_jit_free_exec) from [<803cacfc>] (bpf_jit_free+0x64/0xe0) [ 4074.840300][ T30] [<803cac98>] (bpf_jit_free) from [<803cbc1c>] (bpf_prog_free_deferred+0x140/0x158) [ 4074.840378][ T30] r5:8652f794 r4:86243000 [ 4074.840400][ T30] [<803cbadc>] (bpf_prog_free_deferred) from [<80276cec>] (process_one_work+0x1b8/0x4f8) [ 4074.840469][ T30] r7:ddde3b40 r6:83018600 r5:8652f794 r4:86243000 [ 4074.840506][ T30] [<80276b34>] (process_one_work) from [<8027796c>] (worker_thread+0x1c4/0x394) [ 4074.840614][ T30] r10:61c88647 r9:83ef3000 r8:82804d80 r7:8624302c r6:ddde3b40 r5:ddde3b60 [ 4074.840709][ T30] r4:86243000 [ 4074.840734][ T30] [<802777a8>] (worker_thread) from [<8027facc>] (kthread+0x128/0x27c) [ 4074.840807][ T30] r10:00000000 r9:86243000 r8:802777a8 r7:dfcb5e68 r6:86243b00 r5:83ef3000 [ 4074.840827][ T30] r4:00000001 [ 4074.840845][ T30] [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4074.840911][ T30] Exception stack(0xea839fb0 to 0xea839ff8) [ 4074.840956][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 4074.840992][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4074.841094][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4074.841135][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 [ 4074.841180][ T30] r4:85dc26c0 [ 4074.842177][ T30] NMI backtrace for cpu 0 [ 4074.842344][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT [ 4074.842415][ T30] Tainted: [L]=SOFTLOCKUP [ 4074.842433][ T30] Hardware name: ARM-Versatile Express [ 4074.842455][ T30] Call trace: [ 4074.842492][ T30] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 4074.842621][ T30] r7:600e0193 r6:600e0193 r5:822a2694 r4:00000000 [ 4074.842645][ T30] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 4074.842703][ T30] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 4074.842762][ T30] r7:00000000 r6:000e0113 r5:00000000 r4:00000001 [ 4074.842781][ T30] [<8021ed80>] (dump_stack) from [<81a937fc>] (nmi_cpu_backtrace+0x150/0x170) [ 4074.842830][ T30] [<81a936ac>] (nmi_cpu_backtrace) from [<81a9394c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 4074.842886][ T30] r7:00000000 r6:8280c510 r5:8281ad9c r4:ffffffff [ 4074.842941][ T30] [<81a9381c>] (nmi_trigger_cpumask_backtrace) from [<8022fe60>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 4074.843131][ T30] r9:82ac382c r8:8280c690 r7:82804d80 r6:83ec13f0 r5:00007ebc r4:00000048 [ 4074.843198][ T30] [<8022fe48>] (arch_trigger_cpumask_backtrace) from [<81a9b430>] (sys_info+0x68/0xa8) [ 4074.843306][ T30] [<81a9b3c8>] (sys_info) from [<80382f6c>] (watchdog+0x458/0x888) [ 4074.843369][ T30] r5:00007ebc r4:85bacb0c [ 4074.843528][ T30] [<80382b14>] (watchdog) from [<8027facc>] (kthread+0x128/0x27c) [ 4074.843594][ T30] r10:00000000 r9:00000000 r8:80382b14 r7:832a2300 r6:832a2300 r5:832e9800 [ 4074.843635][ T30] r4:00000001 [ 4074.843653][ T30] [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4074.843697][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 4074.843724][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 4074.843755][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4074.844115][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4074.844170][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 [ 4074.844282][ T30] r4:8334a240 [ 4074.846107][ T30] Sending NMI from CPU 0 to CPUs 1: [ 4074.847850][ C1] NMI backtrace for cpu 1 [ 4074.848100][ C1] CPU: 1 UID: 0 PID: 2815 Comm: pr/ttyAMA-1 Tainted: G L syzkaller #0 PREEMPT [ 4074.848168][ C1] Tainted: [L]=SOFTLOCKUP [ 4074.848188][ C1] Hardware name: ARM-Versatile Express [ 4074.848243][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 4074.848353][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 4074.848419][ C1] pc : [<81ab4a90>] lr : [<80aa4664>] psr: 60000013 [ 4074.848464][ C1] sp : eb005eb0 ip : eb005ec0 fp : eb005ebc [ 4074.848501][ C1] r10: 8295971c r9 : 00000001 r8 : 00000000 [ 4074.848547][ C1] r7 : 00000117 r6 : 82959680 r5 : 00000000 r4 : 00000001 [ 4074.848597][ C1] r3 : 00004d73 r2 : 00000000 r1 : 60000013 r0 : 846ae840 [ 4074.848729][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 4074.848808][ C1] Control: 30c5387d Table: 858bc100 DAC: 00000000 [ 4074.848893][ C1] Call trace: [ 4074.848959][ C1] [<81ab4a68>] (_raw_spin_unlock_irqrestore) from [<80aa4664>] (pl011_console_device_unlock+0x20/0x24) [ 4074.849046][ C1] [<80aa4644>] (pl011_console_device_unlock) from [<802e50b0>] (nbcon_emit_one+0x88/0x100) [ 4074.849108][ C1] [<802e5028>] (nbcon_emit_one) from [<802e5330>] (nbcon_kthread_func+0x208/0x2ec) [ 4074.849167][ C1] r6:82ac0104 r5:82959680 r4:83ef0000 [ 4074.849187][ C1] [<802e5128>] (nbcon_kthread_func) from [<8027facc>] (kthread+0x128/0x27c) [ 4074.849256][ C1] r10:00000000 r9:82959680 r8:802e5128 r7:84b1ca80 r6:84b1ca80 r5:83ef0000 [ 4074.849280][ C1] r4:00000001 [ 4074.849300][ C1] [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4074.849352][ C1] Exception stack(0xeb005fb0 to 0xeb005ff8) [ 4074.849391][ C1] 5fa0: 00000000 00000000 00000000 00000000 [ 4074.849427][ C1] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4074.849459][ C1] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4074.849497][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 [ 4074.849517][ C1] r4:84b1b200 [ 4074.906026][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 4074.934305][ T30] CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT [ 4074.941149][ T30] Tainted: [L]=SOFTLOCKUP [ 4074.944332][ T30] Hardware name: ARM-Versatile Express [ 4074.946714][ T30] Call trace: [ 4074.948577][ T30] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 4074.956799][ T30] r7:822a337c r6:00000000 r5:822a2694 r4:00000001 [ 4074.959082][ T30] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 4074.963947][ T30] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 4074.964597][ T30] r7:822a337c r6:832e9800 r5:00000000 r4:82a7cd14 [ 4074.966125][ T30] [<8021ed80>] (dump_stack) from [<802025c4>] (vpanic+0xe0/0x2e4) [ 4074.974390][ T30] [<802024e4>] (vpanic) from [<802027fc>] (trace_suspend_resume+0x0/0xd8) [ 4074.974860][ T30] r7:82804d80 [ 4074.977006][ T30] [<802027c8>] (panic) from [<80382f84>] (watchdog+0x470/0x888) [ 4074.983103][ T30] r3:00000001 r2:00000000 r1:00000000 r0:822a337c [ 4074.984301][ T30] [<80382b14>] (watchdog) from [<8027facc>] (kthread+0x128/0x27c) [ 4074.989297][ T30] r10:00000000 r9:00000000 r8:80382b14 r7:832a2300 r6:832a2300 r5:832e9800 [ 4074.994515][ T30] r4:00000001 [ 4074.996900][ T30] [<8027f9a4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4074.999391][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 4075.004319][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 4075.004954][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4075.005345][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4075.005779][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8027f9a4 [ 4075.006570][ T30] r4:8334a240 [ 4075.015762][ T30] Rebooting in 86400 seconds..