last executing test programs: 2.155003043s ago: executing program 1 (id=5699): r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$P9_RVERSION(r0, 0x0, 0x0) 1.948379931s ago: executing program 0 (id=5700): r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 1.844831089s ago: executing program 1 (id=5701): r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) 1.665242645s ago: executing program 0 (id=5702): r0 = socket(0x10, 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0x5451, 0x0) 1.216607474s ago: executing program 0 (id=5703): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$VHOST_VDPA_GET_VRING_GROUP(r0, 0xc008af7b, 0x0) 1.188429546s ago: executing program 1 (id=5704): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x142, 0x0) read$dsp(r0, 0x0, 0x0) 964.003866ms ago: executing program 0 (id=5705): r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x5452, &(0x7f0000000200)) 957.754746ms ago: executing program 1 (id=5706): r0 = socket$nl_route(0x10, 0x3, 0x0) write$P9_RGETLOCK(r0, 0x0, 0x0) 705.198028ms ago: executing program 0 (id=5707): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f00000000c0), 0x40002, 0x0) write$yama_ptrace_scope(r0, &(0x7f0000002900)='3\x00', 0x2) 595.150498ms ago: executing program 1 (id=5708): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f0000000280)) 354.711889ms ago: executing program 0 (id=5709): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0}}, 0x0) 0s ago: executing program 1 (id=5710): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x5451, 0x0) kernel console output (not intermixed with test programs): 537.070:13855): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 537.160907][ T28] audit: type=1400 audit(537.080:13856): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 537.163169][ T28] audit: type=1400 audit(537.090:13857): avc: denied { read } for pid=10977 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 537.255561][ T28] audit: type=1400 audit(537.180:13858): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 537.258104][ T28] audit: type=1400 audit(537.180:13859): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 537.267571][ T28] audit: type=1400 audit(537.180:13860): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 537.382083][ T28] audit: type=1400 audit(537.300:13861): avc: denied { read } for pid=10979 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 537.459886][ T28] audit: type=1400 audit(537.380:13862): avc: denied { read } for pid=10980 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 537.481255][ T28] audit: type=1400 audit(537.400:13863): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 541.622774][T11042] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11042 comm=syz.0.3581 [ 542.148992][ T28] kauditd_printk_skb: 140 callbacks suppressed [ 542.149484][ T28] audit: type=1400 audit(542.070:14004): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 542.153591][ T28] audit: type=1400 audit(542.080:14005): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 542.159681][ T28] audit: type=1400 audit(542.080:14006): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 542.200795][ T28] audit: type=1400 audit(542.120:14007): avc: denied { read } for pid=11049 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 542.239207][ T28] audit: type=1400 audit(542.160:14008): avc: denied { read } for pid=11049 comm="syz.0.3585" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 542.284562][ T28] audit: type=1400 audit(542.210:14009): avc: denied { read open } for pid=11049 comm="syz.0.3585" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 542.314776][ T28] audit: type=1400 audit(542.240:14010): avc: denied { ioctl } for pid=11049 comm="syz.0.3585" path="/dev/sequencer" dev="devtmpfs" ino=721 ioctlcmd=0x943d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 542.464553][ T28] audit: type=1400 audit(542.390:14011): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 542.470776][ T28] audit: type=1400 audit(542.390:14012): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 542.481053][ T28] audit: type=1400 audit(542.400:14013): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 545.738560][T11096] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1542 sclass=netlink_audit_socket pid=11096 comm=syz.1.3609 [ 547.172778][ T28] kauditd_printk_skb: 153 callbacks suppressed [ 547.173978][ T28] audit: type=1400 audit(547.100:14167): avc: denied { read } for pid=11116 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 547.242433][ T28] audit: type=1400 audit(547.170:14168): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 547.254583][ T28] audit: type=1400 audit(547.180:14169): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 547.281249][ T28] audit: type=1400 audit(547.200:14170): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 547.329311][ T28] audit: type=1400 audit(547.250:14171): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 547.334295][ T28] audit: type=1400 audit(547.260:14172): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 547.335989][ T28] audit: type=1400 audit(547.260:14173): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 547.413027][ T28] audit: type=1400 audit(547.340:14174): avc: denied { read } for pid=11119 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 547.467095][ T28] audit: type=1400 audit(547.390:14175): avc: denied { read } for pid=11120 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 547.510795][ T28] audit: type=1400 audit(547.430:14176): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 552.321501][ T28] kauditd_printk_skb: 145 callbacks suppressed [ 552.322548][ T28] audit: type=1400 audit(552.240:14322): avc: denied { read } for pid=11190 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 552.366248][ T28] audit: type=1400 audit(552.290:14323): avc: denied { read } for pid=11190 comm="syz.1.3656" name="audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 552.368847][ T28] audit: type=1400 audit(552.290:14324): avc: denied { read open } for pid=11190 comm="syz.1.3656" path="/dev/audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 552.386870][ T28] audit: type=1400 audit(552.310:14325): avc: denied { ioctl } for pid=11190 comm="syz.1.3656" path="/dev/audio1" dev="devtmpfs" ino=732 ioctlcmd=0x5005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 552.515819][ T28] audit: type=1400 audit(552.440:14326): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 552.518636][ T28] audit: type=1400 audit(552.440:14327): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 552.521706][ T28] audit: type=1400 audit(552.440:14328): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 552.713393][ T28] audit: type=1400 audit(552.640:14329): avc: denied { read } for pid=11192 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 552.859355][ T28] audit: type=1400 audit(552.780:14330): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 552.871006][ T28] audit: type=1400 audit(552.790:14331): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 557.339759][ T28] kauditd_printk_skb: 115 callbacks suppressed [ 557.341383][ T28] audit: type=1400 audit(557.260:14447): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 557.355066][ T28] audit: type=1400 audit(557.280:14448): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 557.367952][ T28] audit: type=1400 audit(557.290:14449): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 557.396789][ T28] audit: type=1400 audit(557.320:14450): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 557.399813][ T28] audit: type=1400 audit(557.320:14451): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 557.416803][ T28] audit: type=1400 audit(557.340:14452): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 557.514580][ T28] audit: type=1400 audit(557.440:14453): avc: denied { read } for pid=11246 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 557.597375][ T28] audit: type=1400 audit(557.500:14454): avc: denied { read } for pid=11247 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 557.622328][ T28] audit: type=1400 audit(557.550:14455): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 557.626156][ T28] audit: type=1400 audit(557.550:14456): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 562.364005][ T28] kauditd_printk_skb: 158 callbacks suppressed [ 562.371338][ T28] audit: type=1400 audit(562.290:14615): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 562.377279][ T28] audit: type=1400 audit(562.290:14616): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 562.386649][ T28] audit: type=1400 audit(562.290:14617): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 562.498180][ T28] audit: type=1400 audit(562.420:14618): avc: denied { read } for pid=11324 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 562.519384][ T28] audit: type=1400 audit(562.440:14619): avc: denied { read } for pid=11325 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 562.574077][ T28] audit: type=1400 audit(562.500:14620): avc: denied { create } for pid=11325 comm="syz.1.3723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 562.594908][ T28] audit: type=1400 audit(562.520:14621): avc: denied { lock } for pid=11325 comm="syz.1.3723" path="socket:[27910]" dev="sockfs" ino=27910 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 562.656761][ T28] audit: type=1400 audit(562.580:14622): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 562.659340][ T28] audit: type=1400 audit(562.580:14623): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 562.674781][ T28] audit: type=1400 audit(562.590:14624): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 567.445449][ T28] kauditd_printk_skb: 159 callbacks suppressed [ 567.445811][ T28] audit: type=1400 audit(567.370:14784): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 567.465275][ T28] audit: type=1400 audit(567.390:14785): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 567.482268][ T28] audit: type=1400 audit(567.400:14786): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 567.482617][ T28] audit: type=1400 audit(567.400:14787): avc: denied { read } for pid=11405 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 567.623869][ T28] audit: type=1400 audit(567.550:14788): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 567.629054][ T28] audit: type=1400 audit(567.550:14789): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 567.651061][ T28] audit: type=1400 audit(567.570:14790): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 567.654316][ T28] audit: type=1400 audit(567.580:14791): avc: denied { read } for pid=11407 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 567.746486][ T28] audit: type=1400 audit(567.670:14792): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 567.751332][ T28] audit: type=1400 audit(567.670:14793): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 567.963172][T11412] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11412 comm=syz.1.3762 [ 569.697310][T11440] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11440 comm=syz.1.3777 [ 569.898963][T11442] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11442 comm=syz.0.3778 [ 572.490041][ T28] kauditd_printk_skb: 155 callbacks suppressed [ 572.494184][ T28] audit: type=1400 audit(572.410:14949): avc: denied { read } for pid=11478 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 572.520919][ T28] audit: type=1400 audit(572.440:14950): avc: denied { read } for pid=11477 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 572.557730][ T28] audit: type=1400 audit(572.480:14951): avc: denied { read } for pid=11477 comm="syz.0.3800" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 572.569743][ T28] audit: type=1400 audit(572.480:14952): avc: denied { read open } for pid=11477 comm="syz.0.3800" path="net:[4026532747]" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 572.576381][ T28] audit: type=1400 audit(572.500:14953): avc: denied { create } for pid=11477 comm="syz.0.3800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 572.589310][ T28] audit: type=1400 audit(572.510:14954): avc: denied { write } for pid=11477 comm="syz.0.3800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 572.636517][ T28] audit: type=1400 audit(572.560:14955): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 572.641927][ T28] audit: type=1400 audit(572.560:14956): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 572.643879][ T28] audit: type=1400 audit(572.570:14957): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 572.696276][ T28] audit: type=1400 audit(572.620:14958): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 577.537574][ T28] kauditd_printk_skb: 163 callbacks suppressed [ 577.538143][ T28] audit: type=1400 audit(577.460:15122): avc: denied { read } for pid=11554 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 577.559866][ T28] audit: type=1400 audit(577.480:15123): avc: denied { read } for pid=11555 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 577.587619][ T28] audit: type=1400 audit(577.510:15124): avc: denied { read } for pid=11554 comm="syz.1.3835" name="card0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 577.589588][ T28] audit: type=1400 audit(577.510:15125): avc: denied { read open } for pid=11554 comm="syz.1.3835" path="/dev/dri/card0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 577.604573][ T28] audit: type=1400 audit(577.530:15126): avc: denied { ioctl } for pid=11554 comm="syz.1.3835" path="/dev/dri/card0" dev="devtmpfs" ino=614 ioctlcmd=0x640d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 577.646714][ T28] audit: type=1400 audit(577.570:15127): avc: denied { create } for pid=11555 comm="syz.0.3834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 577.651370][ T28] audit: type=1400 audit(577.580:15128): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 577.654563][ T28] audit: type=1400 audit(577.580:15129): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 577.658064][ T28] audit: type=1400 audit(577.580:15130): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 577.665589][ T28] audit: type=1400 audit(577.590:15131): avc: denied { ioctl } for pid=11555 comm="syz.0.3834" path="socket:[27448]" dev="sockfs" ino=27448 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 582.554956][ T28] kauditd_printk_skb: 153 callbacks suppressed [ 582.555325][ T28] audit: type=1400 audit(582.480:15285): avc: denied { read } for pid=11620 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 582.559464][ T28] audit: type=1400 audit(582.480:15286): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 582.581552][ T28] audit: type=1400 audit(582.500:15287): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 582.582028][ T28] audit: type=1400 audit(582.500:15288): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 582.718446][ T28] audit: type=1400 audit(582.640:15289): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 582.729350][ T28] audit: type=1400 audit(582.650:15290): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 582.737995][ T28] audit: type=1400 audit(582.660:15291): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 582.771762][ T28] audit: type=1400 audit(582.700:15292): avc: denied { read } for pid=11622 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 582.880732][ T28] audit: type=1400 audit(582.800:15293): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 582.904666][ T28] audit: type=1400 audit(582.830:15294): avc: denied { read } for pid=11624 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 587.564327][ T28] kauditd_printk_skb: 102 callbacks suppressed [ 587.564655][ T28] audit: type=1400 audit(587.490:15397): avc: denied { read open } for pid=11666 comm="syz.1.3889" path="/dev/dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 587.659332][ T28] audit: type=1400 audit(587.580:15398): avc: denied { read } for pid=11668 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 587.751583][ T28] audit: type=1400 audit(587.660:15399): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 587.752161][ T28] audit: type=1400 audit(587.670:15400): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 587.752523][ T28] audit: type=1400 audit(587.670:15401): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 587.752654][ T28] audit: type=1400 audit(587.670:15402): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 587.784402][ T28] audit: type=1400 audit(587.710:15403): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 587.798368][ T28] audit: type=1400 audit(587.720:15404): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 587.875588][ T28] audit: type=1400 audit(587.800:15405): avc: denied { read } for pid=11670 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 587.962180][ T28] audit: type=1400 audit(587.890:15406): avc: denied { read } for pid=11671 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 588.779387][T11687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11687 comm=syz.0.3899 [ 592.616776][ T28] kauditd_printk_skb: 153 callbacks suppressed [ 592.631307][ T28] audit: type=1400 audit(592.540:15560): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 592.631663][ T28] audit: type=1400 audit(592.550:15561): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 592.651874][ T28] audit: type=1400 audit(592.580:15562): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 592.673612][ T28] audit: type=1400 audit(592.600:15563): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 592.675623][ T28] audit: type=1400 audit(592.600:15564): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 592.677555][ T28] audit: type=1400 audit(592.600:15565): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 592.813168][ T28] audit: type=1400 audit(592.740:15566): avc: denied { read } for pid=11742 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 592.844621][ T28] audit: type=1400 audit(592.770:15567): avc: denied { read } for pid=11743 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 592.890613][ T28] audit: type=1400 audit(592.810:15568): avc: denied { read } for pid=11743 comm="syz.1.3928" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 592.914562][ T28] audit: type=1400 audit(592.840:15569): avc: denied { read open } for pid=11743 comm="syz.1.3928" path="/dev/ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 595.178324][T11772] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11772 comm=syz.1.3941 [ 597.677497][ T28] kauditd_printk_skb: 140 callbacks suppressed [ 597.677877][ T28] audit: type=1400 audit(597.600:15710): avc: denied { read } for pid=11809 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 597.769408][ T28] audit: type=1400 audit(597.690:15711): avc: denied { read } for pid=11811 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 597.778058][ T28] audit: type=1400 audit(597.700:15712): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 597.791185][ T28] audit: type=1400 audit(597.710:15713): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 597.791681][ T28] audit: type=1400 audit(597.710:15714): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 597.905882][ T28] audit: type=1400 audit(597.830:15715): avc: denied { read } for pid=11813 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 597.939498][ T28] audit: type=1400 audit(597.860:15716): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 597.950706][ T28] audit: type=1400 audit(597.870:15717): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 597.951069][ T28] audit: type=1400 audit(597.870:15718): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 598.116417][ T28] audit: type=1400 audit(598.040:15719): avc: denied { read } for pid=11816 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 602.257414][T11860] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1794 sclass=netlink_audit_socket pid=11860 comm=syz.0.3988 [ 602.743845][ T28] kauditd_printk_skb: 110 callbacks suppressed [ 602.750714][ T28] audit: type=1400 audit(602.670:15830): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 602.772864][ T28] audit: type=1400 audit(602.690:15831): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 602.773226][ T28] audit: type=1400 audit(602.690:15832): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 602.812534][ T28] audit: type=1400 audit(602.740:15833): avc: denied { read } for pid=11868 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 602.928319][ T28] audit: type=1400 audit(602.850:15834): avc: denied { read } for pid=11870 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 602.943816][ T28] audit: type=1400 audit(602.860:15835): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 602.945848][ T28] audit: type=1400 audit(602.870:15836): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 602.951224][ T28] audit: type=1400 audit(602.870:15837): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 603.023754][ T28] audit: type=1400 audit(602.950:15838): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 603.028193][ T28] audit: type=1400 audit(602.950:15839): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 603.169376][T11874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=11874 comm=syz.0.3991 [ 607.833469][ T28] kauditd_printk_skb: 146 callbacks suppressed [ 607.833856][ T28] audit: type=1400 audit(607.760:15986): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 607.842169][ T28] audit: type=1400 audit(607.770:15987): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 607.847175][ T28] audit: type=1400 audit(607.770:15988): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 607.943056][ T28] audit: type=1400 audit(607.870:15989): avc: denied { read } for pid=11940 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 607.982901][ T28] audit: type=1400 audit(607.910:15990): avc: denied { read } for pid=11940 comm="syz.0.4025" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 607.986621][ T28] audit: type=1400 audit(607.910:15991): avc: denied { read open } for pid=11940 comm="syz.0.4025" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 608.003461][ T28] audit: type=1400 audit(607.920:15992): avc: denied { read } for pid=11941 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 608.026418][ T28] audit: type=1400 audit(607.940:15993): avc: denied { ioctl } for pid=11940 comm="syz.0.4025" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 608.120842][ T28] audit: type=1400 audit(608.030:15994): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 608.121385][ T28] audit: type=1400 audit(608.040:15995): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 612.848238][ T28] kauditd_printk_skb: 144 callbacks suppressed [ 612.848617][ T28] audit: type=1400 audit(612.770:16140): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 612.859150][ T28] audit: type=1400 audit(612.780:16141): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 612.859589][ T28] audit: type=1400 audit(612.780:16142): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 612.906944][ T28] audit: type=1400 audit(612.830:16143): avc: denied { read } for pid=12008 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 613.002081][ T28] audit: type=1400 audit(612.930:16144): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 613.005554][ T28] audit: type=1400 audit(612.930:16145): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 613.038578][ T28] audit: type=1400 audit(612.960:16146): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 613.067285][ T28] audit: type=1400 audit(612.990:16147): avc: denied { read } for pid=12010 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 613.146403][ T28] audit: type=1400 audit(613.070:16148): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 613.161076][ T28] audit: type=1400 audit(613.080:16149): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 616.362216][T12065] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=12065 comm=syz.0.4087 [ 617.901193][ T28] kauditd_printk_skb: 174 callbacks suppressed [ 617.901659][ T28] audit: type=1400 audit(617.820:16324): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.901937][ T28] audit: type=1400 audit(617.820:16325): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.924878][ T28] audit: type=1400 audit(617.850:16326): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.928290][ T28] audit: type=1400 audit(617.850:16327): avc: denied { read } for pid=12088 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 617.956452][ T28] audit: type=1400 audit(617.880:16328): avc: denied { read } for pid=12088 comm="syz.1.4100" name="audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 617.973679][ T28] audit: type=1400 audit(617.900:16329): avc: denied { read open } for pid=12088 comm="syz.1.4100" path="/dev/audio1" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 617.978337][ T28] audit: type=1400 audit(617.900:16330): avc: denied { ioctl } for pid=12088 comm="syz.1.4100" path="/dev/audio1" dev="devtmpfs" ino=732 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 618.625538][ T28] audit: type=1400 audit(618.550:16331): avc: denied { read } for pid=12090 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 618.642436][ T28] audit: type=1400 audit(618.570:16332): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 618.649095][ T28] audit: type=1400 audit(618.570:16333): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 622.911305][ T28] kauditd_printk_skb: 114 callbacks suppressed [ 622.911625][ T28] audit: type=1400 audit(622.840:16448): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 622.914557][ T28] audit: type=1400 audit(622.840:16449): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.005686][ T28] audit: type=1400 audit(622.930:16450): avc: denied { read } for pid=12146 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 623.060687][ T28] audit: type=1400 audit(622.980:16451): avc: denied { read } for pid=12147 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 623.116445][ T28] audit: type=1400 audit(623.040:16452): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.122776][ T28] audit: type=1400 audit(623.040:16453): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.125330][ T28] audit: type=1400 audit(623.050:16454): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.188429][ T28] audit: type=1400 audit(623.110:16455): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.201224][ T28] audit: type=1400 audit(623.120:16456): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.201614][ T28] audit: type=1400 audit(623.120:16457): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.351566][T12167] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12167 comm=syz.1.4137 [ 627.945978][ T28] kauditd_printk_skb: 164 callbacks suppressed [ 627.946392][ T28] audit: type=1400 audit(627.870:16622): avc: denied { read } for pid=12225 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 628.030680][ T28] audit: type=1400 audit(627.950:16623): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 628.032827][ T28] audit: type=1400 audit(627.950:16624): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 628.033220][ T28] audit: type=1400 audit(627.950:16625): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 628.204376][ T28] audit: type=1400 audit(628.130:16626): avc: denied { read } for pid=12227 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 628.315402][ T28] audit: type=1400 audit(628.240:16627): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 628.315631][ T28] audit: type=1400 audit(628.240:16628): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 628.318596][ T28] audit: type=1400 audit(628.240:16629): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 628.462254][ T28] audit: type=1400 audit(628.390:16630): avc: denied { read } for pid=12229 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 628.547242][ T28] audit: type=1400 audit(628.460:16631): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 632.965352][ T28] kauditd_printk_skb: 245 callbacks suppressed [ 632.965758][ T28] audit: type=1400 audit(632.890:16877): avc: denied { read open } for pid=12273 comm="syz.1.4188" path="net:[4026532657]" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 632.995907][ T28] audit: type=1400 audit(632.920:16878): avc: denied { create } for pid=12273 comm="syz.1.4188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 633.031855][ T28] audit: type=1400 audit(632.960:16879): avc: denied { write } for pid=12273 comm="syz.1.4188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 633.131722][ T28] audit: type=1400 audit(633.040:16880): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.139677][ T28] audit: type=1400 audit(633.060:16881): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.146305][ T28] audit: type=1400 audit(633.070:16882): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.158864][ T28] audit: type=1400 audit(633.080:16883): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.194456][ T28] audit: type=1400 audit(633.120:16884): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.267126][ T28] audit: type=1400 audit(633.190:16885): avc: denied { search } for pid=12275 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 633.273726][ T28] audit: type=1400 audit(633.190:16886): avc: denied { search } for pid=12275 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 635.431647][T12310] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12310 comm=syz.0.4204 [ 635.517649][T12311] raw_sendmsg: syz.1.4206 forgot to set AF_INET. Fix it! [ 635.763636][T12315] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12315 comm=syz.1.4208 [ 638.064200][ T28] kauditd_printk_skb: 156 callbacks suppressed [ 638.065278][ T28] audit: type=1400 audit(637.990:17043): avc: denied { read } for pid=12348 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 638.096455][ T28] audit: type=1400 audit(638.020:17044): avc: denied { read write } for pid=12348 comm="syz.0.4225" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 638.100628][ T28] audit: type=1400 audit(638.020:17045): avc: denied { read write open } for pid=12348 comm="syz.0.4225" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 638.153593][ T28] audit: type=1400 audit(638.080:17046): avc: denied { read } for pid=12350 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 638.186254][ T28] audit: type=1400 audit(638.110:17047): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.189704][ T28] audit: type=1400 audit(638.110:17048): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.193892][ T28] audit: type=1400 audit(638.120:17049): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.290462][ T28] audit: type=1400 audit(638.210:17050): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.293296][ T28] audit: type=1400 audit(638.220:17051): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.309665][ T28] audit: type=1400 audit(638.230:17052): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 639.474971][T12371] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12371 comm=syz.1.4236 [ 643.077365][ T28] kauditd_printk_skb: 159 callbacks suppressed [ 643.086903][ T28] audit: type=1400 audit(643.000:17212): avc: denied { read } for pid=12427 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 643.132640][ T28] audit: type=1400 audit(643.060:17213): avc: denied { read } for pid=12428 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 643.209342][ T28] audit: type=1400 audit(643.130:17214): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.226197][ T28] audit: type=1400 audit(643.150:17215): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.233625][ T28] audit: type=1400 audit(643.150:17216): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.280790][ T28] audit: type=1400 audit(643.200:17217): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.290928][ T28] audit: type=1400 audit(643.210:17218): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.293202][ T28] audit: type=1400 audit(643.210:17219): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.389771][ T28] audit: type=1400 audit(643.310:17220): avc: denied { read } for pid=12431 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 643.511436][ T28] audit: type=1400 audit(643.420:17221): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 644.414064][T12448] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=12448 comm=syz.1.4274 [ 645.607618][T12466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12466 comm=syz.0.4286 [ 648.167396][ T28] kauditd_printk_skb: 147 callbacks suppressed [ 648.167906][ T28] audit: type=1400 audit(648.080:17369): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.183001][ T28] audit: type=1400 audit(648.110:17370): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.212286][ T28] audit: type=1400 audit(648.120:17371): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.436944][ T28] audit: type=1400 audit(648.360:17372): avc: denied { read } for pid=12503 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 648.488889][ T28] audit: type=1400 audit(648.410:17373): avc: denied { read open } for pid=12503 comm="syz.1.4301" path="net:[4026532657]" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 648.518012][ T28] audit: type=1400 audit(648.440:17374): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.527348][ T28] audit: type=1400 audit(648.450:17375): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.536313][ T28] audit: type=1400 audit(648.460:17376): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.561155][ T28] audit: type=1400 audit(648.480:17377): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.576493][ T28] audit: type=1400 audit(648.500:17378): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.176469][ T28] kauditd_printk_skb: 151 callbacks suppressed [ 653.176827][ T28] audit: type=1400 audit(653.100:17530): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.180721][ T28] audit: type=1400 audit(653.100:17531): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.280792][ T28] audit: type=1400 audit(653.190:17532): avc: denied { read } for pid=12569 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 653.299159][ T28] audit: type=1400 audit(653.220:17533): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.311172][ T28] audit: type=1400 audit(653.230:17534): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.328633][ T28] audit: type=1400 audit(653.250:17535): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.384909][ T28] audit: type=1400 audit(653.310:17536): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.390657][ T28] audit: type=1400 audit(653.310:17537): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.409242][ T28] audit: type=1400 audit(653.330:17538): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 653.462148][ T28] audit: type=1400 audit(653.390:17539): avc: denied { read } for pid=12571 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 658.197178][ T28] kauditd_printk_skb: 163 callbacks suppressed [ 658.197570][ T28] audit: type=1400 audit(658.120:17703): avc: denied { ioctl } for pid=12639 comm="syz.0.4368" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 658.227548][ T28] audit: type=1400 audit(658.150:17704): avc: denied { read } for pid=12644 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 658.251063][ T43] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 658.257002][ T28] audit: type=1400 audit(658.180:17705): avc: denied { create } for pid=12644 comm="syz.1.4369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 658.324342][ T28] audit: type=1400 audit(658.220:17706): avc: denied { ioctl } for pid=12639 comm="syz.0.4368" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 658.347312][ T28] audit: type=1400 audit(658.270:17707): avc: denied { ioctl } for pid=12639 comm="syz.0.4368" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 658.347765][ T28] audit: type=1400 audit(658.270:17708): avc: denied { ioctl } for pid=12639 comm="syz.0.4368" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 658.352541][ T28] audit: type=1400 audit(658.280:17709): avc: denied { lock } for pid=12644 comm="syz.1.4369" path="socket:[31372]" dev="sockfs" ino=31372 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 658.405504][ T28] audit: type=1400 audit(658.330:17710): avc: denied { ioctl } for pid=12639 comm="syz.0.4368" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 658.445162][ T28] audit: type=1400 audit(658.370:17711): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 658.448998][ T28] audit: type=1400 audit(658.370:17712): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 658.481373][ T43] usb 1-1: Using ep0 maxpacket: 8 [ 658.622129][ T43] usb 1-1: config 179 has an invalid interface number: 65 but max is 0 [ 658.622481][ T43] usb 1-1: config 179 has no interface number 0 [ 658.622593][ T43] usb 1-1: config 179 interface 65 altsetting 12 endpoint 0xF has an invalid bInterval 63, changing to 9 [ 658.622671][ T43] usb 1-1: config 179 interface 65 altsetting 12 endpoint 0xF has invalid maxpacket 57605, setting to 1024 [ 658.622778][ T43] usb 1-1: config 179 interface 65 altsetting 12 endpoint 0x83 has an invalid bInterval 52, changing to 9 [ 658.622828][ T43] usb 1-1: config 179 interface 65 altsetting 12 endpoint 0x83 has invalid maxpacket 8241, setting to 1024 [ 658.622920][ T43] usb 1-1: config 179 interface 65 altsetting 12 has 2 endpoint descriptors, different from the interface descriptor's value: 23 [ 658.623003][ T43] usb 1-1: config 179 interface 65 has no altsetting 0 [ 658.623091][ T43] usb 1-1: New USB device found, idVendor=12ab, idProduct=0004, bcdDevice= 0.00 [ 658.623132][ T43] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 658.803415][ T43] input: Honey Bee Xbox360 dancepad as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:179.65/input/input5 [ 659.221209][ C1] xpad 1-1:179.65: xpad_irq_out - usb_submit_urb failed with result -19 [ 659.227458][ T43] usb 1-1: USB disconnect, device number 4 [ 662.770668][T12723] SELinux: syz.0.4395 (12723) wrote to checkreqprot. This is no longer supported. [ 663.297785][ T28] kauditd_printk_skb: 144 callbacks suppressed [ 663.303267][ T28] audit: type=1400 audit(663.220:17857): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.309141][ T28] audit: type=1400 audit(663.220:17858): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.327444][ T28] audit: type=1400 audit(663.230:17859): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.401472][ T28] audit: type=1400 audit(663.330:17860): avc: denied { read } for pid=12730 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 663.514084][ T28] audit: type=1400 audit(663.440:17861): avc: denied { read } for pid=12732 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 663.580819][ T28] audit: type=1400 audit(663.500:17862): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.603240][ T28] audit: type=1400 audit(663.530:17863): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.611307][ T28] audit: type=1400 audit(663.530:17864): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.629797][ T28] audit: type=1400 audit(663.550:17865): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 663.638211][ T28] audit: type=1400 audit(663.560:17866): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 664.437112][T12746] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12746 comm=syz.0.4407 [ 668.363457][ T28] kauditd_printk_skb: 133 callbacks suppressed [ 668.370542][ T28] audit: type=1400 audit(668.290:18000): avc: denied { read } for pid=12797 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 668.489335][ T28] audit: type=1400 audit(668.410:18001): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 668.494921][ T28] audit: type=1400 audit(668.420:18002): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 668.510955][ T28] audit: type=1400 audit(668.430:18003): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 668.513076][ T28] audit: type=1400 audit(668.430:18004): avc: denied { read } for pid=12799 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 668.640921][ T28] audit: type=1400 audit(668.560:18005): avc: denied { read } for pid=12801 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 668.649521][ T28] audit: type=1400 audit(668.570:18006): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 668.668680][ T28] audit: type=1400 audit(668.590:18007): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 668.715116][ T28] audit: type=1400 audit(668.610:18008): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 668.731183][ T28] audit: type=1400 audit(668.650:18009): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 673.402221][ T28] kauditd_printk_skb: 139 callbacks suppressed [ 673.402666][ T28] audit: type=1400 audit(673.330:18149): avc: denied { read } for pid=12869 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 673.419046][ T28] audit: type=1400 audit(673.340:18150): avc: denied { read } for pid=12868 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 673.525406][ T28] audit: type=1400 audit(673.450:18151): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 673.529723][ T28] audit: type=1400 audit(673.450:18152): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 673.534957][ T28] audit: type=1400 audit(673.460:18153): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 673.568636][ T28] audit: type=1400 audit(673.490:18154): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 673.573993][ T28] audit: type=1400 audit(673.500:18155): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 673.597042][ T28] audit: type=1400 audit(673.520:18156): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 673.690995][ T28] audit: type=1400 audit(673.610:18157): avc: denied { read } for pid=12873 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 673.708125][ T28] audit: type=1400 audit(673.630:18158): avc: denied { read } for pid=12872 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 678.679826][ T28] kauditd_printk_skb: 170 callbacks suppressed [ 678.680887][ T28] audit: type=1400 audit(678.600:18329): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 678.683901][ T28] audit: type=1400 audit(678.610:18330): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 678.687504][ T28] audit: type=1400 audit(678.610:18331): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 678.718447][ T28] audit: type=1400 audit(678.640:18332): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 678.721613][ T28] audit: type=1400 audit(678.650:18333): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 678.727007][ T28] audit: type=1400 audit(678.650:18334): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 678.836221][ T28] audit: type=1400 audit(678.760:18335): avc: denied { read } for pid=12951 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 678.920712][ T28] audit: type=1400 audit(678.830:18336): avc: denied { read } for pid=12953 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 678.924313][ T28] audit: type=1400 audit(678.850:18337): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 678.934345][ T28] audit: type=1400 audit(678.860:18338): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 680.635725][T12984] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=12984 comm=syz.1.4524 [ 682.395208][T13012] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=13012 comm=syz.1.4539 [ 682.876584][T13018] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13018 comm=syz.0.4541 [ 683.739878][ T28] kauditd_printk_skb: 175 callbacks suppressed [ 683.741019][ T28] audit: type=1400 audit(683.660:18514): avc: denied { read } for pid=13029 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 683.769056][ T28] audit: type=1400 audit(683.690:18515): avc: denied { read } for pid=13030 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 683.855986][ T28] audit: type=1400 audit(683.780:18516): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 683.858488][ T28] audit: type=1400 audit(683.780:18517): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 683.878386][ T28] audit: type=1400 audit(683.790:18518): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 683.913435][ T28] audit: type=1400 audit(683.840:18519): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 683.918147][ T28] audit: type=1400 audit(683.840:18520): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 683.936802][ T28] audit: type=1400 audit(683.860:18521): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 684.029632][ T28] audit: type=1400 audit(683.950:18522): avc: denied { read } for pid=13033 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 684.116904][ T28] audit: type=1400 audit(684.040:18523): avc: denied { read } for pid=13035 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 688.772842][ T28] kauditd_printk_skb: 156 callbacks suppressed [ 688.773100][ T28] audit: type=1400 audit(688.700:18680): avc: denied { read } for pid=13103 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 688.837992][ T28] audit: type=1400 audit(688.760:18681): avc: denied { read } for pid=13104 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 688.855881][ T28] audit: type=1400 audit(688.780:18682): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 688.860760][ T28] audit: type=1400 audit(688.780:18683): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 688.867677][ T28] audit: type=1400 audit(688.790:18684): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 688.970910][ T28] audit: type=1400 audit(688.890:18685): avc: denied { read } for pid=13107 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 689.046902][ T28] audit: type=1400 audit(688.970:18686): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 689.053460][ T28] audit: type=1400 audit(688.980:18687): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 689.068134][ T28] audit: type=1400 audit(688.990:18688): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 689.118845][ T28] audit: type=1400 audit(689.040:18689): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 693.808954][ T28] kauditd_printk_skb: 149 callbacks suppressed [ 693.810448][ T28] audit: type=1400 audit(693.730:18839): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 693.815489][ T28] audit: type=1400 audit(693.740:18840): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 693.823520][ T28] audit: type=1400 audit(693.750:18841): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 693.959840][ T28] audit: type=1400 audit(693.880:18842): avc: denied { read } for pid=13177 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 693.972178][ T28] audit: type=1400 audit(693.900:18843): avc: denied { read } for pid=13178 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 694.020648][ T28] audit: type=1400 audit(693.940:18844): avc: denied { create } for pid=13177 comm="syz.0.4622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 694.087167][ T28] audit: type=1400 audit(694.010:18845): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 694.093005][ T28] audit: type=1400 audit(694.020:18846): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 694.101159][ T28] audit: type=1400 audit(694.020:18847): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 694.157088][ T28] audit: type=1400 audit(694.080:18848): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 696.134689][T13211] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13211 comm=syz.0.4639 [ 698.844852][ T28] kauditd_printk_skb: 162 callbacks suppressed [ 698.846878][ T28] audit: type=1400 audit(698.770:19011): avc: denied { setattr } for pid=13244 comm="syz.1.4655" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 698.933373][ T28] audit: type=1400 audit(698.860:19012): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 698.945033][ T28] audit: type=1400 audit(698.870:19013): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 699.001837][ T28] audit: type=1400 audit(698.930:19014): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 699.041987][ T28] audit: type=1400 audit(698.970:19015): avc: denied { read } for pid=13246 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 699.591166][ T28] audit: type=1400 audit(699.510:19016): avc: denied { read } for pid=13248 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 699.601332][ T28] audit: type=1400 audit(699.520:19017): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 699.601680][ T28] audit: type=1400 audit(699.520:19018): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 699.601916][ T28] audit: type=1400 audit(699.520:19019): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 699.951864][ T28] audit: type=1400 audit(699.880:19020): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 703.925163][ T28] kauditd_printk_skb: 51 callbacks suppressed [ 703.930840][ T28] audit: type=1400 audit(703.850:19072): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 703.932874][ T28] audit: type=1400 audit(703.850:19073): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 703.934669][ T28] audit: type=1400 audit(703.850:19074): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 703.948098][ T28] audit: type=1400 audit(703.870:19075): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 703.968794][ T28] audit: type=1400 audit(703.890:19076): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 703.975068][ T28] audit: type=1400 audit(703.900:19077): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 704.084628][ T28] audit: type=1400 audit(704.010:19078): avc: denied { read } for pid=13278 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 704.109771][T13280] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13280 comm=syz.0.4670 [ 704.129634][ T28] audit: type=1400 audit(704.050:19079): avc: denied { read } for pid=13279 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 704.194904][ T28] audit: type=1400 audit(704.120:19080): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 704.197320][ T28] audit: type=1400 audit(704.120:19081): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 708.512833][T13343] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13343 comm=syz.1.4703 [ 708.946319][ T28] kauditd_printk_skb: 142 callbacks suppressed [ 708.955764][ T28] audit: type=1400 audit(708.870:19224): avc: denied { read } for pid=13348 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 709.052188][ T28] audit: type=1400 audit(708.980:19225): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 709.054546][ T28] audit: type=1400 audit(708.980:19226): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 709.066421][ T28] audit: type=1400 audit(708.980:19227): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 709.109283][ T28] audit: type=1400 audit(709.030:19228): avc: denied { read } for pid=13350 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 709.244968][ T28] audit: type=1400 audit(709.170:19229): avc: denied { read } for pid=13352 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 709.249899][ T28] audit: type=1400 audit(709.170:19230): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 709.261099][ T28] audit: type=1400 audit(709.180:19231): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 709.275342][ T28] audit: type=1400 audit(709.200:19232): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 709.345262][ T28] audit: type=1400 audit(709.270:19233): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 718.847108][ T28] kauditd_printk_skb: 66 callbacks suppressed [ 718.851078][ T28] audit: type=1400 audit(718.770:19300): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 718.853077][ T28] audit: type=1400 audit(718.770:19301): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 718.861021][ T28] audit: type=1400 audit(718.780:19302): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 718.919311][ T28] audit: type=1400 audit(718.840:19303): avc: denied { read } for pid=13386 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 719.024134][ T28] audit: type=1400 audit(718.950:19304): avc: denied { read } for pid=13388 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 719.076483][ T28] audit: type=1400 audit(719.000:19305): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 719.082419][ T28] audit: type=1400 audit(719.010:19306): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 719.087830][ T28] audit: type=1400 audit(719.010:19307): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 719.139917][ T28] audit: type=1400 audit(719.060:19308): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 719.145026][ T28] audit: type=1400 audit(719.070:19309): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 723.890702][ T28] kauditd_printk_skb: 155 callbacks suppressed [ 723.891024][ T28] audit: type=1400 audit(723.810:19465): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 723.895826][ T28] audit: type=1400 audit(723.820:19466): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 723.897627][ T28] audit: type=1400 audit(723.820:19467): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 723.932546][ T28] audit: type=1400 audit(723.860:19468): avc: denied { read } for pid=13462 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 723.975067][ T28] audit: type=1400 audit(723.900:19469): avc: denied { create } for pid=13462 comm="syz.1.4763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 723.997458][ T28] audit: type=1400 audit(723.920:19470): avc: denied { getopt } for pid=13462 comm="syz.1.4763" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 724.065604][ T28] audit: type=1400 audit(723.990:19471): avc: denied { read } for pid=13464 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 724.079774][ T28] audit: type=1400 audit(724.000:19472): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 724.101848][ T28] audit: type=1400 audit(724.010:19473): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 724.102776][ T28] audit: type=1400 audit(724.010:19474): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 728.969549][ T28] kauditd_printk_skb: 152 callbacks suppressed [ 728.970590][ T28] audit: type=1400 audit(728.890:19627): avc: denied { read } for pid=13536 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 729.002131][ T28] audit: type=1400 audit(728.920:19628): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 729.002565][ T28] audit: type=1400 audit(728.920:19629): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 729.013112][ T28] audit: type=1400 audit(728.930:19630): avc: denied { read } for pid=13536 comm="syz.0.4800" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 729.021060][ T28] audit: type=1400 audit(728.940:19631): avc: denied { read open } for pid=13536 comm="syz.0.4800" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 729.033178][ T28] audit: type=1400 audit(728.960:19632): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 729.094630][ T28] audit: type=1400 audit(729.020:19633): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 729.101253][ T28] audit: type=1400 audit(729.020:19634): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 729.103184][ T28] audit: type=1400 audit(729.020:19635): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 729.208050][ T28] audit: type=1400 audit(729.130:19636): avc: denied { read } for pid=13538 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 730.073405][T13551] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13551 comm=syz.1.4807 [ 734.012731][ T28] kauditd_printk_skb: 178 callbacks suppressed [ 734.013048][ T28] audit: type=1400 audit(733.940:19815): avc: denied { read } for pid=13614 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 734.106339][ T28] audit: type=1400 audit(734.030:19816): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 734.106796][ T28] audit: type=1400 audit(734.030:19817): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 734.107154][ T28] audit: type=1400 audit(734.030:19818): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 734.166581][ T28] audit: type=1400 audit(734.090:19819): avc: denied { read } for pid=13616 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 734.246284][ T28] audit: type=1400 audit(734.160:19820): avc: denied { read } for pid=13618 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 734.317034][ T28] audit: type=1400 audit(734.240:19821): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 734.325268][ T28] audit: type=1400 audit(734.250:19822): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 734.337817][ T28] audit: type=1400 audit(734.260:19823): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 734.375972][ T28] audit: type=1400 audit(734.300:19824): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.111318][ T28] kauditd_printk_skb: 160 callbacks suppressed [ 739.111714][ T28] audit: type=1400 audit(739.030:19985): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.121257][ T28] audit: type=1400 audit(739.030:19986): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.123344][ T28] audit: type=1400 audit(739.040:19987): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.232129][ T28] audit: type=1400 audit(739.160:19988): avc: denied { read } for pid=13692 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 739.269587][ T28] audit: type=1400 audit(739.190:19989): avc: denied { read } for pid=13693 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 739.371972][ T28] audit: type=1400 audit(739.290:19990): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.374051][ T28] audit: type=1400 audit(739.290:19991): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.389809][ T28] audit: type=1400 audit(739.310:19992): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.423261][ T28] audit: type=1400 audit(739.350:19993): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.426025][ T28] audit: type=1400 audit(739.350:19994): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 741.646531][T13728] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13728 comm=syz.1.4896 [ 744.120812][ T28] kauditd_printk_skb: 158 callbacks suppressed [ 744.136758][ T28] audit: type=1400 audit(744.040:20153): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 744.161125][ T28] audit: type=1400 audit(744.080:20154): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 744.162956][ T28] audit: type=1400 audit(744.080:20155): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 744.164762][ T28] audit: type=1400 audit(744.090:20156): avc: denied { read } for pid=13768 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.285004][ T28] audit: type=1400 audit(744.210:20157): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 744.287277][ T28] audit: type=1400 audit(744.210:20158): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 744.300760][ T28] audit: type=1400 audit(744.220:20159): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 744.360805][ T28] audit: type=1400 audit(744.280:20160): avc: denied { read } for pid=13770 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.462293][ T28] audit: type=1400 audit(744.390:20161): avc: denied { read } for pid=13772 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.468429][ T28] audit: type=1400 audit(744.390:20162): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.139317][ T28] kauditd_printk_skb: 158 callbacks suppressed [ 749.147789][ T28] audit: type=1400 audit(749.060:20321): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.149763][ T28] audit: type=1400 audit(749.070:20322): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.170640][ T28] audit: type=1400 audit(749.070:20323): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.218925][ T28] audit: type=1400 audit(749.140:20324): avc: denied { read } for pid=13849 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 749.321097][ T28] audit: type=1400 audit(749.240:20325): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.325473][ T28] audit: type=1400 audit(749.250:20326): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.329994][ T28] audit: type=1400 audit(749.250:20327): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.382421][ T28] audit: type=1400 audit(749.310:20328): avc: denied { read } for pid=13851 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 749.432638][ T28] audit: type=1400 audit(749.360:20329): avc: denied { create } for pid=13851 comm="syz.0.4957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 749.462806][ T28] audit: type=1400 audit(749.390:20330): avc: denied { read } for pid=13853 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 754.144201][ T28] kauditd_printk_skb: 157 callbacks suppressed [ 754.145166][ T28] audit: type=1400 audit(754.070:20488): avc: denied { ioctl } for pid=13922 comm="syz.1.4992" path="/dev/fb1" dev="devtmpfs" ino=763 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 754.226826][ T28] audit: type=1400 audit(754.150:20489): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.230971][ T28] audit: type=1400 audit(754.150:20490): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.263824][ T28] audit: type=1400 audit(754.190:20491): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.285314][ T28] audit: type=1400 audit(754.210:20492): avc: denied { read } for pid=13925 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 754.366126][ T28] audit: type=1400 audit(754.290:20493): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.371177][ T28] audit: type=1400 audit(754.300:20494): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.375732][ T28] audit: type=1400 audit(754.300:20495): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.484528][ T28] audit: type=1400 audit(754.410:20496): avc: denied { read } for pid=13927 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 754.521121][ T28] audit: type=1400 audit(754.440:20497): avc: denied { read } for pid=13928 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 755.770747][T13948] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13948 comm=syz.1.5003 [ 759.165296][ T28] kauditd_printk_skb: 146 callbacks suppressed [ 759.165547][ T28] audit: type=1400 audit(759.090:20644): avc: denied { read } for pid=13997 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 759.208575][ T28] audit: type=1400 audit(759.130:20645): avc: denied { read } for pid=13998 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 759.297902][ T28] audit: type=1400 audit(759.220:20646): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.308129][ T28] audit: type=1400 audit(759.230:20647): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.317008][ T28] audit: type=1400 audit(759.230:20648): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.382919][ T28] audit: type=1400 audit(759.310:20649): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.391453][ T28] audit: type=1400 audit(759.310:20650): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.392073][ T28] audit: type=1400 audit(759.320:20651): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.506934][ T28] audit: type=1400 audit(759.430:20652): avc: denied { read } for pid=14002 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 759.523887][ T28] audit: type=1400 audit(759.430:20653): avc: denied { read } for pid=14001 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 764.211616][ T28] kauditd_printk_skb: 144 callbacks suppressed [ 764.211910][ T28] audit: type=1400 audit(764.140:20798): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.214881][ T28] audit: type=1400 audit(764.140:20799): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.224895][ T28] audit: type=1400 audit(764.150:20800): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.240736][ T28] audit: type=1400 audit(764.160:20801): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.260619][ T28] audit: type=1400 audit(764.170:20802): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.261014][ T28] audit: type=1400 audit(764.170:20803): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.365693][ T28] audit: type=1400 audit(764.290:20804): avc: denied { read } for pid=14073 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 764.369051][ T28] audit: type=1400 audit(764.290:20805): avc: denied { read } for pid=14072 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 764.453777][ T28] audit: type=1400 audit(764.380:20806): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.457073][ T28] audit: type=1400 audit(764.380:20807): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.232907][ T28] kauditd_printk_skb: 176 callbacks suppressed [ 769.233228][ T28] audit: type=1400 audit(769.160:20984): avc: denied { read } for pid=14152 comm="syz.0.5103" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 769.244886][ T28] audit: type=1400 audit(769.170:20985): avc: denied { read open } for pid=14152 comm="syz.0.5103" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 769.297578][ T28] audit: type=1400 audit(769.220:20986): avc: denied { read } for pid=14154 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 769.318800][ T28] audit: type=1400 audit(769.240:20987): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.350688][ T28] audit: type=1400 audit(769.260:20988): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.361232][ T28] audit: type=1400 audit(769.280:20989): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.439371][ T28] audit: type=1400 audit(769.360:20990): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.463882][ T28] audit: type=1400 audit(769.390:20991): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.477916][ T28] audit: type=1400 audit(769.400:20992): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.489110][ T28] audit: type=1400 audit(769.410:20993): avc: denied { read } for pid=14156 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 774.341033][ T28] kauditd_printk_skb: 169 callbacks suppressed [ 774.341406][ T28] audit: type=1400 audit(774.260:21163): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 774.345494][ T28] audit: type=1400 audit(774.270:21164): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 774.354077][ T28] audit: type=1400 audit(774.280:21165): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 774.417637][ T28] audit: type=1400 audit(774.340:21166): avc: denied { read } for pid=14226 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 774.459127][ T28] audit: type=1400 audit(774.380:21167): avc: denied { read } for pid=14226 comm="syz.0.5147" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 774.483829][ T28] audit: type=1400 audit(774.410:21168): avc: denied { read open } for pid=14226 comm="syz.0.5147" path="net:[4026532747]" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 774.495492][ T28] audit: type=1400 audit(774.420:21169): avc: denied { read } for pid=14228 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 774.506964][ T28] audit: type=1400 audit(774.430:21170): avc: denied { create } for pid=14226 comm="syz.0.5147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 774.539879][ T28] audit: type=1400 audit(774.450:21171): avc: denied { write } for pid=14228 comm="syz.1.5143" name="netlink" dev="proc" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 774.540860][ T28] audit: type=1400 audit(774.450:21172): avc: denied { write } for pid=14228 comm="syz.1.5143" path="/proc/5151/net/netlink" dev="proc" ino=4026532661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 779.395287][ T28] kauditd_printk_skb: 166 callbacks suppressed [ 779.395576][ T28] audit: type=1400 audit(779.320:21339): avc: denied { read } for pid=14310 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 779.479065][ T28] audit: type=1400 audit(779.400:21340): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 779.489904][ T28] audit: type=1400 audit(779.410:21341): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 779.521236][ T28] audit: type=1400 audit(779.440:21342): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 779.536142][ T28] audit: type=1400 audit(779.460:21343): avc: denied { read } for pid=14312 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 779.644722][ T28] audit: type=1400 audit(779.570:21344): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 779.648553][ T28] audit: type=1400 audit(779.570:21345): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 779.669370][ T28] audit: type=1400 audit(779.590:21346): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 779.673558][ T28] audit: type=1400 audit(779.600:21347): avc: denied { read } for pid=14314 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 779.765125][ T28] audit: type=1400 audit(779.690:21348): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 784.456619][ T28] kauditd_printk_skb: 72 callbacks suppressed [ 784.456963][ T28] audit: type=1400 audit(784.380:21421): avc: denied { read } for pid=14344 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 784.532239][ T28] audit: type=1400 audit(784.460:21422): avc: denied { module_request } for pid=14344 comm="syz.0.5199" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 784.720914][ T28] audit: type=1400 audit(784.640:21423): avc: denied { read } for pid=14347 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 785.232659][ T28] audit: type=1400 audit(785.160:21424): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 785.234662][ T28] audit: type=1400 audit(785.160:21425): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 785.260962][ T28] audit: type=1400 audit(785.170:21426): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 785.384386][ T28] audit: type=1400 audit(785.310:21427): avc: denied { sys_module } for pid=14344 comm="syz.0.5199" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 785.387810][ T28] audit: type=1400 audit(785.310:21428): avc: denied { module_request } for pid=14344 comm="syz.0.5199" kmod="" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 785.707047][ T28] audit: type=1400 audit(785.630:21429): avc: denied { read } for pid=14350 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 785.820794][ T28] audit: type=1400 audit(785.740:21430): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 789.525809][ T28] kauditd_printk_skb: 121 callbacks suppressed [ 789.526140][ T28] audit: type=1400 audit(789.450:21552): avc: denied { read } for pid=14404 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 789.553171][ T28] audit: type=1400 audit(789.480:21553): avc: denied { read } for pid=14405 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 789.587857][ T28] audit: type=1400 audit(789.510:21554): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 789.589442][ T28] audit: type=1400 audit(789.510:21555): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 789.597234][ T28] audit: type=1400 audit(789.520:21556): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 789.640534][ T28] audit: type=1400 audit(789.560:21557): avc: denied { write } for pid=14405 comm="syz.1.5228" name="igmp6" dev="proc" ino=4026532707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 789.640854][ T28] audit: type=1400 audit(789.560:21558): avc: denied { write } for pid=14405 comm="syz.1.5228" path="/proc/5235/net/igmp6" dev="proc" ino=4026532707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 789.736924][ T28] audit: type=1400 audit(789.660:21559): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 789.739559][ T28] audit: type=1400 audit(789.660:21560): avc: denied { read } for pid=14408 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 789.753386][ T28] audit: type=1400 audit(789.680:21561): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.573409][ T28] kauditd_printk_skb: 166 callbacks suppressed [ 794.573702][ T28] audit: type=1400 audit(794.500:21728): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.576077][ T28] audit: type=1400 audit(794.500:21729): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.591124][ T28] audit: type=1400 audit(794.500:21730): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.627628][ T28] audit: type=1400 audit(794.550:21731): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.648791][ T28] audit: type=1400 audit(794.570:21732): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.664527][ T28] audit: type=1400 audit(794.590:21733): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.734144][ T28] audit: type=1400 audit(794.660:21734): avc: denied { read } for pid=14491 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 794.848691][ T28] audit: type=1400 audit(794.770:21735): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.853918][ T28] audit: type=1400 audit(794.780:21736): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.863833][ T28] audit: type=1400 audit(794.780:21737): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 795.440800][ T1814] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 795.610990][ T1814] usb 2-1: Using ep0 maxpacket: 32 [ 795.640910][ T1814] usb 2-1: config 0 has no interfaces? [ 795.641300][ T1814] usb 2-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 795.641418][ T1814] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 795.653959][ T1814] usb 2-1: config 0 descriptor?? [ 795.917300][T10701] usb 2-1: USB disconnect, device number 4 [ 799.644595][ T28] kauditd_printk_skb: 157 callbacks suppressed [ 799.644980][ T28] audit: type=1400 audit(799.570:21895): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 799.648658][ T28] audit: type=1400 audit(799.570:21896): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 799.655488][ T28] audit: type=1400 audit(799.580:21897): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 799.740944][ T28] audit: type=1400 audit(799.650:21898): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 799.741439][ T28] audit: type=1400 audit(799.660:21899): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 799.741539][ T28] audit: type=1400 audit(799.660:21900): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 799.871110][ T28] audit: type=1400 audit(799.790:21901): avc: denied { read } for pid=14565 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 799.913921][ T28] audit: type=1400 audit(799.840:21902): avc: denied { read } for pid=14566 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 799.999111][ T28] audit: type=1400 audit(799.920:21903): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 800.002367][ T28] audit: type=1400 audit(799.930:21904): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 801.807597][T14594] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14594 comm=syz.1.5316 [ 804.747621][ T28] kauditd_printk_skb: 148 callbacks suppressed [ 804.748615][ T28] audit: type=1400 audit(804.670:22053): avc: denied { read } for pid=14635 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 804.757225][ T28] audit: type=1400 audit(804.680:22054): avc: denied { read } for pid=14636 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 804.858598][ T28] audit: type=1400 audit(804.780:22055): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 804.870923][ T28] audit: type=1400 audit(804.790:22056): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 804.871309][ T28] audit: type=1400 audit(804.790:22057): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 804.912893][ T28] audit: type=1400 audit(804.840:22058): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 804.920917][ T28] audit: type=1400 audit(804.840:22059): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 804.924361][ T28] audit: type=1400 audit(804.850:22060): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 805.031800][ T28] audit: type=1400 audit(804.960:22061): avc: denied { read } for pid=14639 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 805.084611][ T28] audit: type=1400 audit(805.010:22062): avc: denied { read } for pid=14640 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 809.759629][ T28] kauditd_printk_skb: 150 callbacks suppressed [ 809.765501][ T28] audit: type=1400 audit(809.680:22213): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 809.794102][ T28] audit: type=1400 audit(809.720:22214): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 809.809203][ T28] audit: type=1400 audit(809.730:22215): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 809.823515][ T28] audit: type=1400 audit(809.750:22216): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 809.827566][ T28] audit: type=1400 audit(809.750:22217): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 809.832267][ T28] audit: type=1400 audit(809.760:22218): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 809.966272][ T28] audit: type=1400 audit(809.890:22219): avc: denied { read } for pid=14713 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 810.004628][ T28] audit: type=1400 audit(809.930:22220): avc: denied { read } for pid=14714 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 810.062474][ T28] audit: type=1400 audit(809.990:22221): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 810.066917][ T28] audit: type=1400 audit(809.990:22222): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 811.743094][T14738] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14738 comm=syz.1.5388 [ 812.308284][T14746] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5392'. [ 814.795243][ T28] kauditd_printk_skb: 147 callbacks suppressed [ 814.803206][ T28] audit: type=1400 audit(814.720:22370): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 814.818529][ T28] audit: type=1400 audit(814.740:22371): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 814.825542][ T28] audit: type=1400 audit(814.750:22372): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 814.834070][ T28] audit: type=1400 audit(814.760:22373): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 814.839844][ T28] audit: type=1400 audit(814.760:22374): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 814.853904][ T28] audit: type=1400 audit(814.780:22375): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 814.988704][ T28] audit: type=1400 audit(814.910:22376): avc: denied { read } for pid=14783 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 815.017329][ T28] audit: type=1400 audit(814.940:22377): avc: denied { read } for pid=14784 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 815.056624][ T28] audit: type=1400 audit(814.980:22378): avc: denied { allowed } for pid=14784 comm="syz.0.5412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 815.066441][ T28] audit: type=1400 audit(814.990:22379): avc: denied { sqpoll } for pid=14784 comm="syz.0.5412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 819.813346][ T28] kauditd_printk_skb: 169 callbacks suppressed [ 819.813723][ T28] audit: type=1400 audit(819.740:22549): avc: denied { read } for pid=14859 comm="syz.0.5448" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 819.817011][ T28] audit: type=1400 audit(819.740:22550): avc: denied { read open } for pid=14859 comm="syz.0.5448" path="net:[4026532747]" dev="nsfs" ino=4026532747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 819.845797][ T28] audit: type=1400 audit(819.770:22551): avc: denied { read } for pid=14861 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 819.857290][ T28] audit: type=1400 audit(819.780:22552): avc: denied { create } for pid=14859 comm="syz.0.5448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 819.885021][ T28] audit: type=1400 audit(819.810:22553): avc: denied { write } for pid=14859 comm="syz.0.5448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 819.949717][ T28] audit: type=1400 audit(819.870:22554): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 819.961869][ T28] audit: type=1400 audit(819.880:22555): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 819.962246][ T28] audit: type=1400 audit(819.880:22556): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 820.008939][ T28] audit: type=1400 audit(819.930:22557): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 820.015681][ T28] audit: type=1400 audit(819.940:22558): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 824.868291][ T28] kauditd_printk_skb: 149 callbacks suppressed [ 824.875246][ T28] audit: type=1400 audit(824.790:22708): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 824.893848][ T28] audit: type=1400 audit(824.800:22709): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 824.895873][ T28] audit: type=1400 audit(824.820:22710): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 824.962340][ T28] audit: type=1400 audit(824.890:22711): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 824.967959][ T28] audit: type=1400 audit(824.890:22712): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 824.988317][ T28] audit: type=1400 audit(824.910:22713): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 825.061463][ T28] audit: type=1400 audit(824.990:22714): avc: denied { read } for pid=14936 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 825.163270][ T28] audit: type=1400 audit(825.090:22715): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 825.166015][ T28] audit: type=1400 audit(825.090:22716): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 825.174718][ T28] audit: type=1400 audit(825.090:22717): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 829.962047][ T28] kauditd_printk_skb: 139 callbacks suppressed [ 829.962486][ T28] audit: type=1400 audit(829.890:22857): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 829.964875][ T28] audit: type=1400 audit(829.890:22858): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 829.975360][ T28] audit: type=1400 audit(829.890:22859): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 830.021440][ T28] audit: type=1400 audit(829.950:22860): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 830.026208][ T28] audit: type=1400 audit(829.950:22861): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 830.047186][ T28] audit: type=1400 audit(829.970:22862): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 830.129123][ T28] audit: type=1400 audit(830.050:22863): avc: denied { read } for pid=15009 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 830.163627][ T28] audit: type=1400 audit(830.090:22864): avc: denied { read } for pid=15010 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 830.228611][ T28] audit: type=1400 audit(830.150:22865): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 830.235083][ T28] audit: type=1400 audit(830.160:22866): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 835.749607][ T28] kauditd_printk_skb: 94 callbacks suppressed [ 835.764389][ T28] audit: type=1400 audit(835.670:22961): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 835.771343][ T28] audit: type=1400 audit(835.690:22962): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 835.785338][ T28] audit: type=1400 audit(835.710:22963): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 835.818107][ T28] audit: type=1400 audit(835.740:22964): avc: denied { read } for pid=15057 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 835.911388][ T28] audit: type=1400 audit(835.840:22965): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 835.919282][ T28] audit: type=1400 audit(835.840:22966): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 835.935213][ T28] audit: type=1400 audit(835.860:22967): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 835.992194][ T28] audit: type=1400 audit(835.920:22968): avc: denied { read } for pid=15059 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 836.106782][ T28] audit: type=1400 audit(836.030:22969): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 836.112396][ T28] audit: type=1400 audit(836.030:22970): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 837.089011][T15077] SELinux: Context system_u:object_r:useradd_exec_t:s0 is not valid (left unmapped). [ 840.804068][ T28] kauditd_printk_skb: 164 callbacks suppressed [ 840.810695][ T28] audit: type=1400 audit(840.730:23135): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 840.823662][ T28] audit: type=1400 audit(840.750:23136): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 840.829296][ T28] audit: type=1400 audit(840.750:23137): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 840.909700][ T28] audit: type=1400 audit(840.830:23138): avc: denied { read } for pid=15139 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:useradd_exec_t:s0" [ 840.959682][ T28] audit: type=1400 audit(840.880:23139): avc: denied { read } for pid=15140 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:useradd_exec_t:s0" [ 841.035692][ T28] audit: type=1400 audit(840.960:23140): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 841.041796][ T28] audit: type=1400 audit(840.970:23141): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 841.046952][ T28] audit: type=1400 audit(840.970:23142): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 841.119096][ T28] audit: type=1400 audit(841.040:23143): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 841.122370][ T28] audit: type=1400 audit(841.050:23144): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 845.812152][ T28] kauditd_printk_skb: 165 callbacks suppressed [ 845.817467][ T28] audit: type=1400 audit(845.740:23310): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 845.833888][ T28] audit: type=1400 audit(845.760:23311): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 845.907189][ T28] audit: type=1400 audit(845.830:23312): avc: denied { read } for pid=15219 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:useradd_exec_t:s0" [ 846.004462][ T28] audit: type=1400 audit(845.930:23313): avc: denied { read } for pid=15221 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:useradd_exec_t:s0" [ 846.028814][ T28] audit: type=1400 audit(845.950:23314): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 846.034651][ T28] audit: type=1400 audit(845.960:23315): avc: denied { map_create } for pid=15221 comm="syz.0.5628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 846.036389][ T28] audit: type=1400 audit(845.960:23316): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 846.041770][ T28] audit: type=1400 audit(845.970:23317): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 846.073466][ T28] audit: type=1400 audit(846.000:23318): avc: denied { perfmon } for pid=15221 comm="syz.0.5628" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 846.109826][ T28] audit: type=1400 audit(846.030:23319): avc: denied { map_create } for pid=15221 comm="syz.0.5628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 850.611501][ T3652] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 850.828413][ T28] kauditd_printk_skb: 193 callbacks suppressed [ 850.828722][ T28] audit: type=1400 audit(850.740:23513): avc: denied { ioctl } for pid=15291 comm="syz.0.5667" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.828939][ T28] audit: type=1400 audit(850.750:23514): avc: denied { ioctl } for pid=15291 comm="syz.0.5667" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.834708][ T28] audit: type=1400 audit(850.760:23515): avc: denied { ioctl } for pid=15291 comm="syz.0.5667" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.881037][ T28] audit: type=1400 audit(850.800:23516): avc: denied { ioctl } for pid=15291 comm="syz.0.5667" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.886272][ T28] audit: type=1400 audit(850.810:23517): avc: denied { ioctl } for pid=15291 comm="syz.0.5667" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.913476][ T28] audit: type=1400 audit(850.840:23518): avc: denied { ioctl } for pid=15291 comm="syz.0.5667" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.931129][ T28] audit: type=1400 audit(850.850:23519): avc: denied { ioctl } for pid=15291 comm="syz.0.5667" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.943354][ T28] audit: type=1400 audit(850.870:23520): avc: denied { ioctl } for pid=15291 comm="syz.0.5667" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.962028][ T28] audit: type=1400 audit(850.880:23521): avc: denied { ioctl } for pid=15291 comm="syz.0.5667" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.968453][ T28] audit: type=1400 audit(850.890:23522): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 850.988551][ T3652] usb 1-1: New USB device found, idVendor=04b8, idProduct=0202, bcdDevice= 0.40 [ 850.989450][ T3652] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 850.990813][ T3652] usb 1-1: Product: syz [ 850.991460][ T3652] usb 1-1: Manufacturer: syz [ 850.992039][ T3652] usb 1-1: SerialNumber: syz [ 851.586380][ T3652] usblp 1-1:1.0: usblp0: USB Unidirectional printer dev 5 if 0 alt 0 proto 1 vid 0x04B8 pid 0x0202 [ 851.618620][ T3652] usb 1-1: USB disconnect, device number 5 [ 851.645644][ T3652] usblp0: removed [ 855.847235][ T28] kauditd_printk_skb: 148 callbacks suppressed [ 855.847947][ T28] audit: type=1400 audit(855.770:23671): avc: denied { read } for pid=15378 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:useradd_exec_t:s0" [ 855.956007][ T28] audit: type=1400 audit(855.880:23672): avc: denied { read } for pid=15380 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:useradd_exec_t:s0" [ 856.003694][ T28] audit: type=1400 audit(855.930:23673): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 856.008761][ T28] audit: type=1400 audit(855.930:23674): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 856.018737][ T28] audit: type=1400 audit(855.940:23675): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 856.137738][ T28] audit: type=1400 audit(856.060:23676): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 856.152438][ T28] audit: type=1400 audit(856.080:23678): avc: denied { read } for pid=15382 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:useradd_exec_t:s0" [ 856.153474][ T28] audit: type=1400 audit(856.070:23677): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 856.157051][ T28] audit: type=1400 audit(856.080:23679): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 856.177973][ T28] audit: type=1400 audit(856.100:23680): avc: denied { write } for pid=15382 comm="syz.0.5700" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 857.674522][ T262] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 857.778125][ T262] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 857.839222][ T262] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 857.913781][ T262] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 858.339093][ T262] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 858.354659][ T262] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 858.359885][ T262] bond0 (unregistering): Released all slaves [ 858.438577][ T262] hsr_slave_0: left promiscuous mode [ 858.442962][ T262] hsr_slave_1: left promiscuous mode [ 858.456099][ T262] veth1_macvtap: left promiscuous mode [ 858.457324][ T262] veth0_macvtap: left promiscuous mode [ 858.458424][ T262] veth1_vlan: left promiscuous mode [ 858.459285][ T262] veth0_vlan: left promiscuous mode [ 859.173193][ T262] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 859.224787][ T262] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 859.294228][ T262] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 859.359742][ T262] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 859.685478][ T262] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 859.696208][ T262] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 859.715517][ T262] bond0 (unregistering): Released all slaves [ 859.795160][ T262] hsr_slave_0: left promiscuous mode [ 859.797475][ T262] hsr_slave_1: left promiscuous mode [ 859.805577][ T262] veth1_macvtap: left promiscuous mode [ 859.805945][ T262] veth0_macvtap: left promiscuous mode [ 859.806248][ T262] veth1_vlan: left promiscuous mode [ 859.806409][ T262] veth0_vlan: left promiscuous mode [ 860.627888][ T2957] 8021q: adding VLAN 0 to HW filter on device eth1 [ 861.160948][ T28] kauditd_printk_skb: 112 callbacks suppressed [ 861.167715][ T28] audit: type=1400 audit(861.080:23793): avc: denied { write } for pid=15439 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 861.172233][ T28] audit: type=1400 audit(861.090:23794): avc: denied { write } for pid=15439 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 861.181041][ T28] audit: type=1400 audit(861.090:23795): avc: denied { write } for pid=15439 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 861.185640][ T28] audit: type=1400 audit(861.090:23796): avc: denied { write } for pid=15439 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 861.186126][ T28] audit: type=1400 audit(861.090:23797): avc: denied { write } for pid=15439 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 861.186411][ T28] audit: type=1400 audit(861.090:23798): avc: denied { write } for pid=15439 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 861.422494][ T28] audit: type=1400 audit(861.350:23799): avc: denied { write } for pid=15440 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 861.425302][ T28] audit: type=1400 audit(861.350:23800): avc: denied { write } for pid=15440 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 861.428411][ T28] audit: type=1400 audit(861.350:23801): avc: denied { write } for pid=15440 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 861.436199][ T28] audit: type=1400 audit(861.360:23802): avc: denied { write } for pid=15440 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 862.354008][ T2957] 8021q: adding VLAN 0 to HW filter on device eth2 [ 863.874543][ T2957] 8021q: adding VLAN 0 to HW filter on device eth3 [ 865.477377][ T2957] 8021q: adding VLAN 0 to HW filter on device eth4 [ 866.271262][ T28] kauditd_printk_skb: 233 callbacks suppressed [ 866.271693][ T28] audit: type=1400 audit(866.190:24036): avc: denied { write } for pid=15464 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 866.284446][ T28] audit: type=1400 audit(866.190:24037): avc: denied { write } for pid=15464 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 866.288839][ T28] audit: type=1400 audit(866.210:24038): avc: denied { write } for pid=15464 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 866.289398][ T28] audit: type=1400 audit(866.210:24039): avc: denied { write } for pid=15464 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 866.300741][ T28] audit: type=1400 audit(866.220:24040): avc: denied { write } for pid=15464 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 866.301292][ T28] audit: type=1400 audit(866.220:24041): avc: denied { write } for pid=15464 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 866.325042][ T28] audit: type=1400 audit(866.250:24042): avc: denied { search } for pid=15464 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 866.362302][ T28] audit: type=1400 audit(866.290:24043): avc: denied { search } for pid=15465 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 866.370707][ T28] audit: type=1400 audit(866.290:24044): avc: denied { search } for pid=15465 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 866.376935][ T28] audit: type=1400 audit(866.300:24045): avc: denied { search } for pid=15465 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 867.322586][ T2957] 8021q: adding VLAN 0 to HW filter on device eth5 [ 869.191521][ T2957] 8021q: adding VLAN 0 to HW filter on device eth6 [ 870.816529][ T2957] 8021q: adding VLAN 0 to HW filter on device eth7 [ 871.382557][ T28] kauditd_printk_skb: 239 callbacks suppressed [ 871.382977][ T28] audit: type=1400 audit(871.310:24285): avc: denied { write } for pid=15487 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 871.383238][ T28] audit: type=1400 audit(871.310:24286): avc: denied { write } for pid=15487 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 871.383439][ T28] audit: type=1400 audit(871.310:24287): avc: denied { write } for pid=15487 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 871.383646][ T28] audit: type=1400 audit(871.310:24288): avc: denied { write } for pid=15487 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 871.383880][ T28] audit: type=1400 audit(871.310:24289): avc: denied { write } for pid=15487 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 871.384125][ T28] audit: type=1400 audit(871.310:24290): avc: denied { write } for pid=15487 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 871.622758][ T28] audit: type=1400 audit(871.550:24291): avc: denied { write } for pid=15488 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 871.625126][ T28] audit: type=1400 audit(871.550:24292): avc: denied { write } for pid=15488 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 871.630880][ T28] audit: type=1400 audit(871.550:24293): avc: denied { write } for pid=15488 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 871.633550][ T28] audit: type=1400 audit(871.550:24294): avc: denied { write } for pid=15488 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 872.736008][ T2957] 8021q: adding VLAN 0 to HW filter on device eth8 [ 876.417968][ T28] kauditd_printk_skb: 201 callbacks suppressed [ 876.418425][ T28] audit: type=1400 audit(876.340:24496): avc: denied { search } for pid=15511 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 876.437463][ T28] audit: type=1400 audit(876.360:24497): avc: denied { write } for pid=15511 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 876.464670][ T28] audit: type=1400 audit(876.390:24498): avc: denied { search } for pid=15506 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 876.782305][ T28] audit: type=1400 audit(876.710:24499): avc: denied { write } for pid=15514 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 876.784220][ T28] audit: type=1400 audit(876.710:24500): avc: denied { write } for pid=15514 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 876.790671][ T28] audit: type=1400 audit(876.710:24501): avc: denied { write } for pid=15514 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 876.794533][ T28] audit: type=1400 audit(876.710:24502): avc: denied { write } for pid=15514 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 876.796801][ T28] audit: type=1400 audit(876.710:24503): avc: denied { write } for pid=15514 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 876.800686][ T28] audit: type=1400 audit(876.710:24504): avc: denied { write } for pid=15514 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 884.103698][ T28] audit: type=1400 audit(884.030:24505): avc: denied { write } for pid=15524 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 884.104430][ T28] audit: type=1400 audit(884.030:24506): avc: denied { write } for pid=15524 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 884.104565][ T28] audit: type=1400 audit(884.030:24507): avc: denied { write } for pid=15524 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 884.110854][ T28] audit: type=1400 audit(884.030:24508): avc: denied { write } for pid=15524 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 884.111011][ T28] audit: type=1400 audit(884.030:24509): avc: denied { write } for pid=15524 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 884.111066][ T28] audit: type=1400 audit(884.030:24510): avc: denied { write } for pid=15524 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 884.135692][ T28] audit: type=1400 audit(884.060:24511): avc: denied { search } for pid=15524 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 884.161494][ T28] audit: type=1400 audit(884.090:24512): avc: denied { search } for pid=15525 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 884.167689][ T28] audit: type=1400 audit(884.090:24513): avc: denied { search } for pid=15525 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 884.174186][ T28] audit: type=1400 audit(884.100:24514): avc: denied { search } for pid=15525 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 889.186815][ T28] kauditd_printk_skb: 321 callbacks suppressed [ 889.187324][ T28] audit: type=1400 audit(889.110:24836): avc: denied { search } for pid=15545 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 889.404714][ T28] audit: type=1400 audit(889.330:24837): avc: denied { write } for pid=15552 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 889.406719][ T28] audit: type=1400 audit(889.330:24838): avc: denied { write } for pid=15552 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 889.417460][ T28] audit: type=1400 audit(889.330:24839): avc: denied { write } for pid=15552 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 889.419553][ T28] audit: type=1400 audit(889.330:24840): avc: denied { write } for pid=15552 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 889.427058][ T28] audit: type=1400 audit(889.330:24841): avc: denied { write } for pid=15552 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 889.430337][ T28] audit: type=1400 audit(889.330:24842): avc: denied { write } for pid=15552 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 889.432973][ T28] audit: type=1400 audit(889.340:24843): avc: denied { search } for pid=15552 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 889.444338][ T28] audit: type=1400 audit(889.370:24844): avc: denied { search } for pid=15553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 889.450697][ T28] audit: type=1400 audit(889.370:24845): avc: denied { search } for pid=15553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 894.254445][ T28] kauditd_printk_skb: 316 callbacks suppressed [ 894.259684][ T28] audit: type=1400 audit(894.180:25162): avc: denied { search } for pid=15576 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 894.260445][ T28] audit: type=1400 audit(894.180:25163): avc: denied { write } for pid=15576 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 894.380915][ T28] audit: type=1400 audit(894.310:25164): avc: denied { search } for pid=15577 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 894.382898][ T28] audit: type=1400 audit(894.310:25165): avc: denied { write } for pid=15577 comm="chmod" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 894.560822][ T28] audit: type=1400 audit(894.480:25166): avc: denied { search } for pid=15578 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 894.563782][ T28] audit: type=1400 audit(894.490:25167): avc: denied { write } for pid=15578 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 894.645889][ T28] audit: type=1400 audit(894.570:25168): avc: denied { search } for pid=15573 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0