last executing test programs: 539.945271ms ago: executing program 0 (id=6163): r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x100000, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) 539.803561ms ago: executing program 1 (id=6164): r0 = socket$unix(0x1, 0x5, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x162, 0x0, 0x0) 429.453125ms ago: executing program 1 (id=6165): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000080)={'veth0_to_team\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x24}}}) 429.285805ms ago: executing program 0 (id=6166): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x1c, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @remote}}}, 0x90) 329.261448ms ago: executing program 0 (id=6167): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/key-users\x00', 0x0, 0x0) fcntl$addseals(r0, 0x3, 0x0) 329.130448ms ago: executing program 1 (id=6168): r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280), 0x80, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000080)) 222.501511ms ago: executing program 1 (id=6169): r0 = openat2(0xffffffffffffff9c, &(0x7f0000003500)='./file0\x00', &(0x7f0000000000)={0x149842}, 0x18) ioctl$PIO_CMAP(r0, 0x5452, &(0x7f0000000080)={0x400000000000000, 0x100000000, 0x2, 0x2, 0x4000000000000, 0xbe}) 222.281571ms ago: executing program 0 (id=6170): r0 = openat$pfkey(0xffffff9c, &(0x7f0000000080), 0x800, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x541b, &(0x7f00000000c0)='syz_tun\x00') 108.314916ms ago: executing program 1 (id=6171): r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x100000, 0x0) ioctl$BTRFS_IOC_SCRUB(r0, 0xc400941b, 0x0) 108.114916ms ago: executing program 0 (id=6172): socketpair(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 216.389µs ago: executing program 1 (id=6173): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x5452, &(0x7f0000000080)={0x3, 'veth0_to_bridge\x00'}) 0s ago: executing program 0 (id=6174): r0 = syz_usb_connect$lan78xx(0x5, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0x424, 0x7850, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) kernel console output (not intermixed with test programs): -executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 538.726275][ T29] audit: type=1400 audit(538.640:12629): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 538.742473][ T29] audit: type=1400 audit(538.660:12630): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 538.773423][ T29] audit: type=1400 audit(538.690:12631): avc: denied { read } for pid=10385 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 538.875514][ T29] audit: type=1400 audit(538.790:12632): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 538.889472][ T29] audit: type=1400 audit(538.800:12633): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 538.898225][ T29] audit: type=1400 audit(538.800:12634): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 538.927506][ T29] audit: type=1400 audit(538.840:12635): avc: denied { read } for pid=10387 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 539.015359][ T29] audit: type=1400 audit(538.930:12636): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 539.025089][ T29] audit: type=1400 audit(538.940:12637): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 542.043018][T10437] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10437 comm=syz.1.3306 [ 542.928470][T10452] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10452 comm=syz.0.3309 [ 543.724347][ T29] kauditd_printk_skb: 170 callbacks suppressed [ 543.726595][ T29] audit: type=1400 audit(543.640:12808): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 543.726860][ T29] audit: type=1400 audit(543.640:12809): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 543.733530][ T29] audit: type=1400 audit(543.650:12810): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 543.745088][ T29] audit: type=1400 audit(543.660:12811): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 543.751718][ T29] audit: type=1400 audit(543.670:12812): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 543.822269][ T29] audit: type=1400 audit(543.740:12813): avc: denied { read } for pid=10469 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 543.845013][ T29] audit: type=1400 audit(543.760:12814): avc: denied { read } for pid=10469 comm="syz.0.3319" name="pcmC1D0c" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 543.851360][ T29] audit: type=1400 audit(543.770:12815): avc: denied { read open } for pid=10469 comm="syz.0.3319" path="/dev/snd/pcmC1D0c" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 543.862166][ T29] audit: type=1400 audit(543.780:12816): avc: denied { ioctl } for pid=10469 comm="syz.0.3319" path="/dev/snd/pcmC1D0c" dev="devtmpfs" ino=730 ioctlcmd=0x4124 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 543.894837][ T29] audit: type=1400 audit(543.810:12817): avc: denied { read } for pid=10471 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 548.305585][T10543] SELinux: Context system_u:object_r:ldconfig_cache_t:s0 is not valid (left unmapped). [ 548.748223][ T29] kauditd_printk_skb: 177 callbacks suppressed [ 548.749279][ T29] audit: type=1400 audit(548.660:12995): avc: denied { read } for pid=10549 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 548.822365][ T29] audit: type=1400 audit(548.740:12996): avc: denied { read } for pid=10550 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 548.850120][ T29] audit: type=1400 audit(548.770:12997): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 548.854882][ T29] audit: type=1400 audit(548.770:12998): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 548.862231][ T29] audit: type=1400 audit(548.780:12999): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 548.952238][ T29] audit: type=1400 audit(548.870:13000): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 548.956763][ T29] audit: type=1400 audit(548.870:13001): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 548.977210][ T29] audit: type=1400 audit(548.890:13002): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 549.050908][ T29] audit: type=1400 audit(548.970:13003): avc: denied { read } for pid=10553 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 549.170249][ T29] audit: type=1400 audit(549.090:13004): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 553.146487][T10630] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10630 comm=syz.0.3399 [ 553.753437][ T29] kauditd_printk_skb: 183 callbacks suppressed [ 553.771513][ T29] audit: type=1400 audit(553.670:13188): avc: denied { read } for pid=10637 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 553.879310][ T29] audit: type=1400 audit(553.790:13189): avc: denied { read } for pid=10639 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 553.899686][ T29] audit: type=1400 audit(553.800:13190): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 553.903249][ T29] audit: type=1400 audit(553.820:13191): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 553.912401][ T29] audit: type=1400 audit(553.830:13192): avc: denied { create } for pid=10639 comm="syz.0.3404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 553.922457][ T29] audit: type=1400 audit(553.840:13193): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 553.926501][ T29] audit: type=1400 audit(553.840:13194): avc: denied { ioctl } for pid=10639 comm="syz.0.3404" path="socket:[25764]" dev="sockfs" ino=25764 ioctlcmd=0x891c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 553.972156][ T29] audit: type=1400 audit(553.890:13195): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 553.979255][ T29] audit: type=1400 audit(553.890:13196): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 553.979632][ T29] audit: type=1400 audit(553.890:13197): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 554.358255][T10648] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10648 comm=syz.0.3408 [ 556.074832][T10682] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10682 comm=syz.1.3425 [ 558.800271][ T29] kauditd_printk_skb: 175 callbacks suppressed [ 558.801347][ T29] audit: type=1400 audit(558.720:13373): avc: denied { read } for pid=10721 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 558.911135][ T29] audit: type=1400 audit(558.820:13374): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 558.915685][ T29] audit: type=1400 audit(558.830:13375): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 558.923821][ T29] audit: type=1400 audit(558.840:13376): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 558.929166][ T29] audit: type=1400 audit(558.840:13377): avc: denied { read } for pid=10723 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 559.016769][ T29] audit: type=1400 audit(558.930:13378): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 559.034522][ T29] audit: type=1400 audit(558.950:13379): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 559.049352][ T29] audit: type=1400 audit(558.960:13380): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 559.156778][ T29] audit: type=1400 audit(559.070:13381): avc: denied { read } for pid=10725 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 559.227223][ T29] audit: type=1400 audit(559.140:13382): avc: denied { read } for pid=10726 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 559.876417][T10736] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10736 comm=syz.1.3452 [ 563.860317][ T29] kauditd_printk_skb: 140 callbacks suppressed [ 563.861437][ T29] audit: type=1400 audit(563.780:13523): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 563.866472][ T29] audit: type=1400 audit(563.780:13524): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 563.887157][ T29] audit: type=1400 audit(563.800:13525): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 563.981780][ T29] audit: type=1400 audit(563.900:13526): avc: denied { read } for pid=10784 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 564.338050][ T29] audit: type=1400 audit(564.250:13527): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 564.344098][ T29] audit: type=1400 audit(564.260:13528): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 564.364499][ T29] audit: type=1400 audit(564.280:13529): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 564.380234][ T29] audit: type=1400 audit(564.300:13530): avc: denied { read } for pid=10786 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 564.479535][ T29] audit: type=1400 audit(564.390:13531): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 564.482510][ T29] audit: type=1400 audit(564.400:13532): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 565.075570][T10795] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10795 comm=syz.0.3481 [ 565.785307][T10805] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=10805 comm=syz.1.3487 [ 568.897599][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 568.899830][ T29] audit: type=1400 audit(568.810:13666): avc: denied { read } for pid=10850 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 568.910021][ T29] audit: type=1400 audit(568.830:13667): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 568.914978][ T29] audit: type=1400 audit(568.830:13668): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 568.921126][ T29] audit: type=1400 audit(568.840:13669): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 569.083420][ T29] audit: type=1400 audit(569.000:13670): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 569.086837][ T29] audit: type=1400 audit(569.000:13671): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 569.092999][ T29] audit: type=1400 audit(569.010:13672): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 569.111890][ T29] audit: type=1400 audit(569.020:13673): avc: denied { read } for pid=10852 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 569.235324][ T29] audit: type=1400 audit(569.150:13674): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 569.252615][ T29] audit: type=1400 audit(569.170:13675): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.062312][T10879] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10879 comm=syz.0.3523 [ 571.833524][T10889] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10889 comm=syz.1.3528 [ 573.924684][ T29] kauditd_printk_skb: 147 callbacks suppressed [ 573.928181][ T29] audit: type=1400 audit(573.840:13823): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 573.945525][ T29] audit: type=1400 audit(573.860:13824): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 573.956044][ T29] audit: type=1400 audit(573.870:13825): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 573.966996][ T29] audit: type=1400 audit(573.880:13826): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 573.970073][ T29] audit: type=1400 audit(573.890:13827): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 573.978308][ T29] audit: type=1400 audit(573.890:13828): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.040418][ T29] audit: type=1400 audit(573.960:13829): avc: denied { read } for pid=10924 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 574.160137][ T29] audit: type=1400 audit(574.070:13830): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.167452][ T29] audit: type=1400 audit(574.080:13831): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.175090][ T29] audit: type=1400 audit(574.090:13832): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 576.409765][T10958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10958 comm=syz.0.3562 [ 576.625214][T10961] SELinux: Context system_u:object_r:ksm_device_t:s0 is not valid (left unmapped). [ 578.947748][ T29] kauditd_printk_skb: 163 callbacks suppressed [ 578.948144][ T29] audit: type=1400 audit(578.860:13996): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 578.957166][ T29] audit: type=1400 audit(578.870:13997): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 578.979253][ T29] audit: type=1400 audit(578.900:13998): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.045678][ T29] audit: type=1400 audit(578.960:13999): avc: denied { read } for pid=11001 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 579.118083][ T29] audit: type=1400 audit(579.030:14000): avc: denied { read } for pid=11003 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 579.159953][ T29] audit: type=1400 audit(579.070:14001): avc: denied { read } for pid=11003 comm="syz.0.3585" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 579.160403][ T29] audit: type=1400 audit(579.070:14002): avc: denied { read open } for pid=11003 comm="syz.0.3585" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 579.173182][ T29] audit: type=1400 audit(579.090:14003): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.177712][ T29] audit: type=1400 audit(579.090:14004): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.181660][ T29] audit: type=1400 audit(579.100:14005): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 583.987257][ T29] kauditd_printk_skb: 179 callbacks suppressed [ 583.987541][ T29] audit: type=1400 audit(583.900:14185): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.006023][ T29] audit: type=1400 audit(583.920:14186): avc: denied { read } for pid=11087 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 584.014362][ T29] audit: type=1400 audit(583.930:14187): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.014589][ T29] audit: type=1400 audit(583.930:14188): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.068891][ T29] audit: type=1400 audit(583.980:14189): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.070746][ T29] audit: type=1400 audit(583.990:14190): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.072804][ T29] audit: type=1400 audit(583.990:14191): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.168306][ T29] audit: type=1400 audit(584.080:14192): avc: denied { read } for pid=11089 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 584.236652][ T29] audit: type=1400 audit(584.140:14193): avc: denied { read } for pid=11090 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 584.316072][ T29] audit: type=1400 audit(584.230:14194): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.041442][ T29] kauditd_printk_skb: 195 callbacks suppressed [ 589.042668][ T29] audit: type=1400 audit(588.960:14390): avc: denied { read } for pid=11183 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 589.086409][ T29] audit: type=1400 audit(589.000:14391): avc: denied { read } for pid=11184 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 589.173983][ T29] audit: type=1400 audit(589.090:14392): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.176783][ T29] audit: type=1400 audit(589.090:14393): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.198245][ T29] audit: type=1400 audit(589.110:14394): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.217001][ T29] audit: type=1400 audit(589.130:14395): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.223205][ T29] audit: type=1400 audit(589.140:14396): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.229537][ T29] audit: type=1400 audit(589.150:14397): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.372554][ T29] audit: type=1400 audit(589.290:14398): avc: denied { read } for pid=11187 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 589.379388][ T29] audit: type=1400 audit(589.290:14399): avc: denied { read } for pid=11188 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 591.095830][T11216] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=263 sclass=netlink_tcpdiag_socket pid=11216 comm=syz.1.3690 [ 594.146570][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 594.153928][ T29] audit: type=1400 audit(594.060:14561): avc: denied { read } for pid=11263 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 594.239957][ T29] audit: type=1400 audit(594.150:14562): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 594.244820][ T29] audit: type=1400 audit(594.160:14563): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 594.251402][ T29] audit: type=1400 audit(594.170:14564): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 594.391400][ T29] audit: type=1400 audit(594.310:14565): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 594.395044][ T29] audit: type=1400 audit(594.310:14566): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 594.403742][ T29] audit: type=1400 audit(594.320:14567): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 594.416640][ T29] audit: type=1400 audit(594.330:14568): avc: denied { read } for pid=11265 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 594.509967][ T29] audit: type=1400 audit(594.420:14569): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 594.510446][ T29] audit: type=1400 audit(594.420:14570): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.212210][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 599.220339][ T29] audit: type=1400 audit(599.130:14716): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.231655][ T29] audit: type=1400 audit(599.150:14717): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.235600][ T29] audit: type=1400 audit(599.150:14718): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.319686][ T29] audit: type=1400 audit(599.230:14719): avc: denied { read } for pid=11338 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 599.429449][ T29] audit: type=1400 audit(599.340:14720): avc: denied { read } for pid=11340 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 599.466424][ T29] audit: type=1400 audit(599.380:14721): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.485083][ T29] audit: type=1400 audit(599.390:14722): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.507817][ T29] audit: type=1400 audit(599.420:14723): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.526370][ T29] audit: type=1400 audit(599.440:14724): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 599.530534][ T29] audit: type=1400 audit(599.440:14725): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 603.757348][T11417] SELinux: Context system_u:object_r:crack_db_t:s0 is not valid (left unmapped). [ 604.254724][ T29] kauditd_printk_skb: 187 callbacks suppressed [ 604.257239][ T29] audit: type=1400 audit(604.170:14913): avc: denied { read } for pid=11426 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 604.284033][ T29] audit: type=1400 audit(604.200:14914): avc: denied { create } for pid=11426 comm="syz.1.3795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 604.295373][ T29] audit: type=1400 audit(604.210:14915): avc: denied { write } for pid=11426 comm="syz.1.3795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 604.337700][ T29] audit: type=1400 audit(604.250:14916): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 604.342293][ T29] audit: type=1400 audit(604.260:14917): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 604.349151][ T29] audit: type=1400 audit(604.260:14918): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 604.401640][ T29] audit: type=1400 audit(604.320:14919): avc: denied { read } for pid=11428 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 604.472193][ T29] audit: type=1400 audit(604.390:14920): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 604.474020][ T29] audit: type=1400 audit(604.390:14921): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 604.481194][ T29] audit: type=1400 audit(604.400:14922): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 609.275944][ T29] kauditd_printk_skb: 185 callbacks suppressed [ 609.277200][ T29] audit: type=1400 audit(609.190:15108): avc: denied { read } for pid=11516 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 609.308988][ T29] audit: type=1400 audit(609.220:15109): avc: denied { read } for pid=11517 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 609.396530][ T29] audit: type=1400 audit(609.310:15110): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 609.410415][ T29] audit: type=1400 audit(609.320:15111): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 609.410755][ T29] audit: type=1400 audit(609.320:15112): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 609.420984][ T29] audit: type=1400 audit(609.340:15113): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 609.425430][ T29] audit: type=1400 audit(609.340:15114): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 609.430913][ T29] audit: type=1400 audit(609.350:15115): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 609.577416][ T29] audit: type=1400 audit(609.490:15116): avc: denied { read } for pid=11520 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 609.577790][ T29] audit: type=1400 audit(609.490:15117): avc: denied { read } for pid=11521 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 614.296581][ T29] kauditd_printk_skb: 176 callbacks suppressed [ 614.297499][ T29] audit: type=1400 audit(614.210:15294): avc: denied { map_create } for pid=11600 comm="syz.1.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 614.304941][ T29] audit: type=1400 audit(614.220:15295): avc: denied { map_read map_write } for pid=11600 comm="syz.1.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 614.312533][ T29] audit: type=1400 audit(614.230:15296): avc: denied { map_read map_write } for pid=11600 comm="syz.1.3878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 614.397623][ T29] audit: type=1400 audit(614.310:15297): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 614.400331][ T29] audit: type=1400 audit(614.310:15298): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 614.402317][ T29] audit: type=1400 audit(614.320:15299): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 614.406803][ T29] audit: type=1400 audit(614.320:15300): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 614.411920][ T29] audit: type=1400 audit(614.330:15301): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 614.422727][ T29] audit: type=1400 audit(614.340:15302): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 614.518226][ T29] audit: type=1400 audit(614.430:15303): avc: denied { read } for pid=11602 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 619.346544][ T29] kauditd_printk_skb: 215 callbacks suppressed [ 619.347558][ T29] audit: type=1400 audit(619.260:15519): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 619.365498][ T29] audit: type=1400 audit(619.280:15520): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 619.386744][ T29] audit: type=1400 audit(619.280:15521): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 619.409461][ T29] audit: type=1400 audit(619.330:15522): avc: denied { read } for pid=11700 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 619.533186][ T29] audit: type=1400 audit(619.450:15523): avc: denied { read } for pid=11702 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 619.550171][ T29] audit: type=1400 audit(619.470:15524): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 619.553751][ T29] audit: type=1400 audit(619.470:15525): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 619.556754][ T29] audit: type=1400 audit(619.470:15526): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 619.642180][ T29] audit: type=1400 audit(619.560:15527): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 619.645113][ T29] audit: type=1400 audit(619.560:15528): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.396955][ T29] kauditd_printk_skb: 182 callbacks suppressed [ 624.398132][ T29] audit: type=1400 audit(624.310:15711): avc: denied { read } for pid=11786 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 624.442647][ T29] audit: type=1400 audit(624.360:15712): avc: denied { read } for pid=11787 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 624.516073][ T29] audit: type=1400 audit(624.430:15713): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.523342][ T29] audit: type=1400 audit(624.440:15714): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.528984][ T29] audit: type=1400 audit(624.440:15715): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.586085][ T29] audit: type=1400 audit(624.500:15716): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.594167][ T29] audit: type=1400 audit(624.500:15717): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.597957][ T29] audit: type=1400 audit(624.510:15718): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.617060][ T29] audit: type=1400 audit(624.530:15719): avc: denied { read } for pid=11790 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 624.670102][ T29] audit: type=1400 audit(624.590:15720): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 626.383594][T11823] ptrace attach of "/syz-executor exec"[11824] was attempted by "/syz-executor exec"[11823] [ 629.453296][ T29] kauditd_printk_skb: 175 callbacks suppressed [ 629.454433][ T29] audit: type=1400 audit(629.360:15896): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 629.463840][ T29] audit: type=1400 audit(629.380:15897): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 629.471147][ T29] audit: type=1400 audit(629.380:15898): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 629.499883][ T29] audit: type=1400 audit(629.410:15899): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 629.501680][ T29] audit: type=1400 audit(629.410:15900): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 629.517115][ T29] audit: type=1400 audit(629.430:15901): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 629.655477][ T29] audit: type=1400 audit(629.570:15902): avc: denied { read } for pid=11872 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 629.662400][ T29] audit: type=1400 audit(629.570:15903): avc: denied { read } for pid=11871 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 629.728165][ T29] audit: type=1400 audit(629.640:15904): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 629.732814][ T29] audit: type=1400 audit(629.650:15905): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 631.261177][T11899] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11899 comm=syz.0.4025 [ 631.378120][T11903] ======================================================= [ 631.378120][T11903] WARNING: The mand mount option has been deprecated and [ 631.378120][T11903] and is ignored by this kernel. Remove the mand [ 631.378120][T11903] option from the mount to silence this warning. [ 631.378120][T11903] ======================================================= [ 632.302274][T11933] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=11933 comm=syz.1.4041 [ 633.935034][T11996] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=66 sclass=netlink_audit_socket pid=11996 comm=syz.1.4073 [ 634.452078][ T29] kauditd_printk_skb: 262 callbacks suppressed [ 634.453035][ T29] audit: type=1400 audit(634.370:16168): avc: denied { read } for pid=12013 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 634.475245][ T29] audit: type=1400 audit(634.390:16169): avc: denied { read } for pid=12014 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 634.508092][ T29] audit: type=1400 audit(634.420:16170): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 634.510867][ T29] audit: type=1400 audit(634.430:16171): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 634.513398][ T29] audit: type=1400 audit(634.430:16172): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 634.527534][ T29] audit: type=1400 audit(634.440:16173): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 634.530695][ T29] audit: type=1400 audit(634.450:16174): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 634.533059][ T29] audit: type=1400 audit(634.450:16175): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 634.598187][ T29] audit: type=1400 audit(634.510:16176): avc: denied { read } for pid=12017 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 634.600178][ T29] audit: type=1400 audit(634.510:16177): avc: denied { read } for pid=12018 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 635.363619][T12029] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=66 sclass=netlink_audit_socket pid=12029 comm=syz.0.4089 [ 636.340366][T12039] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12039 comm=syz.0.4096 [ 639.496972][ T29] kauditd_printk_skb: 219 callbacks suppressed [ 639.499500][ T29] audit: type=1400 audit(639.410:16397): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 639.501428][ T29] audit: type=1400 audit(639.420:16398): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 639.503026][ T29] audit: type=1400 audit(639.420:16399): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 639.517924][ T29] audit: type=1400 audit(639.430:16400): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 639.522086][ T29] audit: type=1400 audit(639.440:16401): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 639.525104][ T29] audit: type=1400 audit(639.440:16402): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 639.576197][ T29] audit: type=1400 audit(639.490:16403): avc: denied { read } for pid=12164 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 639.601583][ T29] audit: type=1400 audit(639.520:16404): avc: denied { read } for pid=12164 comm="syz.0.4148" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 639.603898][ T29] audit: type=1400 audit(639.520:16405): avc: denied { open } for pid=12164 comm="syz.0.4148" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 639.609002][ T29] audit: type=1400 audit(639.520:16406): avc: denied { read } for pid=12165 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 644.122608][T12331] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12331 comm=syz.1.4229 [ 644.528926][ T29] kauditd_printk_skb: 338 callbacks suppressed [ 644.530085][ T29] audit: type=1400 audit(644.440:16745): avc: denied { read } for pid=12349 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 644.537281][ T29] audit: type=1400 audit(644.450:16746): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 644.540207][ T29] audit: type=1400 audit(644.450:16747): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 644.542098][ T29] audit: type=1400 audit(644.450:16748): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 644.573688][ T29] audit: type=1400 audit(644.490:16749): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 644.575530][ T29] audit: type=1400 audit(644.490:16750): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 644.577254][ T29] audit: type=1400 audit(644.490:16751): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 644.615330][ T29] audit: type=1400 audit(644.530:16752): avc: denied { read } for pid=12351 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 644.633192][ T29] audit: type=1400 audit(644.550:16753): avc: denied { read } for pid=12352 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 644.681013][ T29] audit: type=1400 audit(644.600:16754): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 646.179453][T12403] random: crng reseeded on system resumption [ 647.001040][T12429] random: crng reseeded on system resumption [ 648.875322][T12497] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=12497 comm=syz.1.4313 [ 649.584549][ T29] kauditd_printk_skb: 318 callbacks suppressed [ 649.585612][ T29] audit: type=1400 audit(649.500:17073): avc: denied { read } for pid=12522 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 649.599721][ T29] audit: type=1400 audit(649.520:17074): avc: denied { read } for pid=12523 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 649.645790][ T29] audit: type=1400 audit(649.560:17075): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 649.649221][ T29] audit: type=1400 audit(649.560:17076): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 649.652550][ T29] audit: type=1400 audit(649.570:17077): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 649.654129][ T29] audit: type=1400 audit(649.570:17078): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 649.655646][ T29] audit: type=1400 audit(649.570:17079): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 649.658272][ T29] audit: type=1400 audit(649.570:17080): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 649.727238][ T29] audit: type=1400 audit(649.640:17081): avc: denied { read } for pid=12526 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 649.744539][ T29] audit: type=1400 audit(649.660:17082): avc: denied { create } for pid=12527 comm="syz.1.4331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 654.593392][ T29] kauditd_printk_skb: 196 callbacks suppressed [ 654.598241][ T29] audit: type=1400 audit(654.510:17279): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 654.609268][ T29] audit: type=1400 audit(654.510:17280): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 654.610991][ T29] audit: type=1400 audit(654.510:17281): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 654.612884][ T29] audit: type=1400 audit(654.520:17282): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 654.662547][ T29] audit: type=1400 audit(654.580:17283): avc: denied { read } for pid=12634 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 654.669968][ T29] audit: type=1400 audit(654.580:17284): avc: denied { read } for pid=12635 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 654.720158][ T29] audit: type=1400 audit(654.640:17285): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 654.721941][ T29] audit: type=1400 audit(654.640:17286): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 654.725973][ T29] audit: type=1400 audit(654.640:17287): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 654.735512][ T29] audit: type=1400 audit(654.650:17288): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 659.618048][ T29] kauditd_printk_skb: 317 callbacks suppressed [ 659.618698][ T29] audit: type=1400 audit(659.530:17606): avc: denied { read } for pid=12803 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 659.638182][ T29] audit: type=1400 audit(659.550:17607): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 659.641075][ T29] audit: type=1400 audit(659.560:17608): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 659.644389][ T29] audit: type=1400 audit(659.560:17609): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 659.675363][ T29] audit: type=1400 audit(659.580:17610): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 659.675764][ T29] audit: type=1400 audit(659.580:17611): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 659.679414][ T29] audit: type=1400 audit(659.580:17612): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 659.717924][ T29] audit: type=1400 audit(659.630:17613): avc: denied { read } for pid=12806 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 659.718262][ T29] audit: type=1400 audit(659.630:17614): avc: denied { read } for pid=12807 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 659.737871][ T29] audit: type=1400 audit(659.650:17615): avc: denied { read open } for pid=12806 comm="syz.0.4466" path="net:[4026532739]" dev="nsfs" ino=4026532739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 664.252486][T12958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=152 sclass=netlink_route_socket pid=12958 comm=syz.1.4541 [ 664.671734][ T29] kauditd_printk_skb: 314 callbacks suppressed [ 664.673713][ T29] audit: type=1400 audit(664.590:17930): avc: denied { read } for pid=12972 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 664.682263][ T29] audit: type=1400 audit(664.600:17931): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 664.682654][ T29] audit: type=1400 audit(664.600:17932): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 664.686723][ T29] audit: type=1400 audit(664.600:17933): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 664.732408][ T29] audit: type=1400 audit(664.650:17934): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 664.733483][ T29] audit: type=1400 audit(664.650:17935): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 664.740954][ T29] audit: type=1400 audit(664.650:17936): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 664.771927][ T29] audit: type=1400 audit(664.690:17937): avc: denied { read } for pid=12974 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 664.830100][ T29] audit: type=1400 audit(664.740:17938): avc: denied { read } for pid=12976 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 664.862062][ T29] audit: type=1400 audit(664.780:17939): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 666.216015][T13026] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=13026 comm=syz.1.4575 [ 669.679024][ T29] kauditd_printk_skb: 327 callbacks suppressed [ 669.680300][ T29] audit: type=1400 audit(669.590:18267): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 669.690891][ T29] audit: type=1400 audit(669.610:18268): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 669.735786][ T29] audit: type=1400 audit(669.650:18269): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 669.737759][ T29] audit: type=1400 audit(669.650:18270): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 669.740501][ T29] audit: type=1400 audit(669.650:18271): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 669.753476][ T29] audit: type=1400 audit(669.670:18272): avc: denied { read } for pid=13156 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 669.772835][ T29] audit: type=1400 audit(669.690:18273): avc: denied { create } for pid=13156 comm="syz.0.4640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 669.779856][ T29] audit: type=1400 audit(669.700:18274): avc: denied { ioctl } for pid=13156 comm="syz.0.4640" path="socket:[33435]" dev="sockfs" ino=33435 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 669.812365][ T29] audit: type=1400 audit(669.730:18275): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 669.819717][ T29] audit: type=1400 audit(669.730:18276): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 674.725836][ T29] kauditd_printk_skb: 320 callbacks suppressed [ 674.727500][ T29] audit: type=1400 audit(674.640:18597): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 674.734110][ T29] audit: type=1400 audit(674.650:18598): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 674.735464][ T29] audit: type=1400 audit(674.650:18599): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 674.741660][ T29] audit: type=1400 audit(674.660:18600): avc: denied { read } for pid=13336 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 674.794396][ T29] audit: type=1400 audit(674.710:18601): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 674.794807][ T29] audit: type=1400 audit(674.710:18602): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 674.809052][ T29] audit: type=1400 audit(674.720:18603): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 674.810563][ T29] audit: type=1400 audit(674.720:18604): avc: denied { read } for pid=13338 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 674.829841][ T29] audit: type=1400 audit(674.750:18605): avc: denied { read write } for pid=13338 comm="syz.1.4733" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 674.830847][ T29] audit: type=1400 audit(674.750:18606): avc: denied { open } for pid=13338 comm="syz.1.4733" path="/dev/uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 679.861282][ T29] kauditd_printk_skb: 281 callbacks suppressed [ 679.863153][ T29] audit: type=1400 audit(679.780:18888): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 679.863503][ T29] audit: type=1400 audit(679.780:18889): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 679.863702][ T29] audit: type=1400 audit(679.780:18890): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 680.095103][ T29] audit: type=1400 audit(679.990:18891): avc: denied { read } for pid=13499 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 680.179468][ T29] audit: type=1400 audit(680.090:18892): avc: denied { read } for pid=13500 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 680.360287][ T29] audit: type=1400 audit(680.280:18893): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 680.363360][ T29] audit: type=1400 audit(680.280:18894): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 680.366701][ T29] audit: type=1400 audit(680.280:18895): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 680.399047][ T29] audit: type=1400 audit(680.310:18896): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 680.400921][ T29] audit: type=1400 audit(680.320:18897): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 684.970362][ T29] kauditd_printk_skb: 83 callbacks suppressed [ 684.980182][ T29] audit: type=1400 audit(684.890:18981): avc: denied { read } for pid=13549 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 685.271209][ T29] audit: type=1400 audit(685.190:18982): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 685.273154][ T29] audit: type=1400 audit(685.190:18983): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 685.274326][ T29] audit: type=1400 audit(685.190:18984): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 685.530396][ T29] audit: type=1400 audit(685.440:18985): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 685.559727][ T29] audit: type=1400 audit(685.440:18986): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 685.562906][ T29] audit: type=1400 audit(685.480:18987): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 685.572301][ T29] audit: type=1400 audit(685.480:18988): avc: denied { read } for pid=13552 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 685.704063][ T29] audit: type=1400 audit(685.610:18989): avc: denied { read } for pid=13552 comm="syz.0.4838" dev="nsfs" ino=4026532739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 685.704600][ T29] audit: type=1400 audit(685.610:18990): avc: denied { open } for pid=13552 comm="syz.0.4838" path="net:[4026532739]" dev="nsfs" ino=4026532739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 690.157589][ T29] kauditd_printk_skb: 148 callbacks suppressed [ 690.170243][ T29] audit: type=1400 audit(690.070:19139): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 690.170651][ T29] audit: type=1400 audit(690.070:19140): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 690.170766][ T29] audit: type=1400 audit(690.080:19141): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 690.207219][ T29] audit: type=1400 audit(690.120:19142): avc: denied { read } for pid=13628 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 690.222455][ T29] audit: type=1400 audit(690.140:19143): avc: denied { read } for pid=13627 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 690.244338][ T29] audit: type=1400 audit(690.160:19144): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 690.244686][ T29] audit: type=1400 audit(690.160:19145): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 690.244772][ T29] audit: type=1400 audit(690.160:19146): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 690.276510][ T29] audit: type=1400 audit(690.190:19147): avc: denied { read } for pid=13631 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 690.293865][ T29] audit: type=1400 audit(690.190:19148): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 691.253612][T13677] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13677 comm=syz.1.4899 [ 691.628171][T13692] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13692 comm=syz.0.4906 [ 691.946464][T13704] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=42 sclass=netlink_xfrm_socket pid=13704 comm=syz.0.4911 [ 692.406778][T13719] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=42 sclass=netlink_xfrm_socket pid=13719 comm=syz.1.4920 [ 693.432050][T13762] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13762 comm=syz.1.4940 [ 694.995356][T13829] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=13829 comm=syz.0.4977 [ 695.159989][ T29] kauditd_printk_skb: 403 callbacks suppressed [ 695.162679][ T29] audit: type=1400 audit(695.070:19552): avc: denied { read } for pid=13833 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 695.198374][ T29] audit: type=1400 audit(695.110:19553): avc: denied { read } for pid=13834 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 695.235925][ T29] audit: type=1400 audit(695.150:19554): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 695.249433][ T29] audit: type=1400 audit(695.160:19555): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 695.251297][ T29] audit: type=1400 audit(695.160:19556): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 695.260978][ T29] audit: type=1400 audit(695.180:19557): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 695.263465][ T29] audit: type=1400 audit(695.180:19558): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 695.272284][ T29] audit: type=1400 audit(695.190:19559): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 695.307517][ T29] audit: type=1400 audit(695.220:19560): avc: denied { read } for pid=13837 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 695.334072][ T29] audit: type=1400 audit(695.250:19561): avc: denied { read } for pid=13837 comm="syz.1.4978" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 698.774449][T13960] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=47 sclass=netlink_xfrm_socket pid=13960 comm=syz.0.5039 [ 700.204716][ T29] kauditd_printk_skb: 298 callbacks suppressed [ 700.205102][ T29] audit: type=1400 audit(700.120:19860): avc: denied { read } for pid=13997 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 700.254459][ T29] audit: type=1400 audit(700.170:19861): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 700.255354][ T29] audit: type=1400 audit(700.170:19862): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 700.256258][ T29] audit: type=1400 audit(700.170:19863): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 700.304501][ T29] audit: type=1400 audit(700.220:19864): avc: denied { read } for pid=13999 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 700.346371][ T29] audit: type=1400 audit(700.260:19865): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 700.346772][ T29] audit: type=1400 audit(700.260:19866): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 700.352440][ T29] audit: type=1400 audit(700.270:19867): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 700.402358][ T29] audit: type=1400 audit(700.320:19868): avc: denied { read } for pid=14001 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 700.453401][ T29] audit: type=1400 audit(700.370:19869): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.233901][ T29] kauditd_printk_skb: 294 callbacks suppressed [ 705.234929][ T29] audit: type=1400 audit(705.150:20164): avc: denied { read } for pid=14152 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 705.242790][ T29] audit: type=1400 audit(705.160:20165): avc: denied { read } for pid=14153 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 705.303321][ T29] audit: type=1400 audit(705.220:20166): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.306048][ T29] audit: type=1400 audit(705.220:20167): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.307758][ T29] audit: type=1400 audit(705.220:20168): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.325875][ T29] audit: type=1400 audit(705.230:20169): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.362885][ T29] audit: type=1400 audit(705.280:20170): avc: denied { read } for pid=14156 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 705.412895][ T29] audit: type=1400 audit(705.330:20171): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.414910][ T29] audit: type=1400 audit(705.330:20172): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 705.423527][ T29] audit: type=1400 audit(705.330:20173): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 709.827560][T14298] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=14298 comm=syz.0.5208 [ 710.255617][ T29] kauditd_printk_skb: 323 callbacks suppressed [ 710.256028][ T29] audit: type=1400 audit(710.170:20497): avc: denied { read } for pid=14317 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 710.284331][ T29] audit: type=1400 audit(710.200:20498): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 710.284599][ T29] audit: type=1400 audit(710.200:20499): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 710.289950][ T29] audit: type=1400 audit(710.200:20501): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 710.297417][ T29] audit: type=1400 audit(710.200:20500): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 710.304626][ T29] audit: type=1400 audit(710.220:20502): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 710.330215][ T29] audit: type=1400 audit(710.250:20503): avc: denied { read } for pid=14320 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 710.365626][ T29] audit: type=1400 audit(710.280:20504): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 710.366380][ T29] audit: type=1400 audit(710.280:20505): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 710.367105][ T29] audit: type=1400 audit(710.280:20506): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 711.646174][T14371] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14371 comm=syz.1.5244 [ 714.036104][T14460] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=14460 comm=syz.0.5288 [ 714.866245][T14489] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14489 comm=syz.0.5303 [ 715.287812][ T29] kauditd_printk_skb: 333 callbacks suppressed [ 715.289993][ T29] audit: type=1400 audit(715.200:20840): avc: denied { read } for pid=14503 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 715.307435][ T29] audit: type=1400 audit(715.220:20841): avc: denied { read } for pid=14504 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 715.344438][ T29] audit: type=1400 audit(715.260:20842): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 715.345570][ T29] audit: type=1400 audit(715.260:20843): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 715.346748][ T29] audit: type=1400 audit(715.260:20844): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 715.376935][ T29] audit: type=1400 audit(715.290:20845): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 715.377317][ T29] audit: type=1400 audit(715.290:20846): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 715.396343][ T29] audit: type=1400 audit(715.310:20847): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 715.414173][ T29] audit: type=1400 audit(715.330:20848): avc: denied { read } for pid=14507 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 715.464500][ T29] audit: type=1400 audit(715.380:20849): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 717.695114][T14588] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14588 comm=syz.1.5351 [ 718.379944][T14613] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5135 sclass=netlink_route_socket pid=14613 comm=syz.1.5364 [ 720.330339][ T29] kauditd_printk_skb: 317 callbacks suppressed [ 720.333381][ T29] audit: type=1400 audit(720.250:21167): avc: denied { read } for pid=14686 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 720.350136][ T29] audit: type=1400 audit(720.260:21168): avc: denied { read } for pid=14687 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 720.370911][ T29] audit: type=1400 audit(720.290:21169): avc: denied { read } for pid=14687 comm="syz.0.5401" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 720.372037][ T29] audit: type=1400 audit(720.290:21170): avc: denied { open } for pid=14687 comm="syz.0.5401" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 720.382143][ T29] audit: type=1400 audit(720.300:21171): avc: denied { ioctl } for pid=14687 comm="syz.0.5401" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64b0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 720.412825][ T29] audit: type=1400 audit(720.330:21172): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 720.414186][ T29] audit: type=1400 audit(720.330:21173): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 720.419522][ T29] audit: type=1400 audit(720.330:21174): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 720.432686][ T29] audit: type=1400 audit(720.350:21175): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 720.434922][ T29] audit: type=1400 audit(720.350:21176): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 722.242309][T14739] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=14739 comm=syz.1.5427 [ 724.044053][T14763] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14763 comm=syz.1.5438 [ 725.357711][ T29] kauditd_printk_skb: 222 callbacks suppressed [ 725.360884][ T29] audit: type=1400 audit(725.270:21399): avc: denied { read } for pid=14806 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 725.403482][ T29] audit: type=1400 audit(725.320:21400): avc: denied { read } for pid=14808 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 725.429873][ T29] audit: type=1400 audit(725.340:21401): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 725.430943][ T29] audit: type=1400 audit(725.350:21402): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 725.432061][ T29] audit: type=1400 audit(725.350:21403): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 725.465078][ T29] audit: type=1400 audit(725.370:21404): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 725.465571][ T29] audit: type=1400 audit(725.370:21405): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 725.467371][ T29] audit: type=1400 audit(725.370:21406): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 725.515760][ T29] audit: type=1400 audit(725.430:21407): avc: denied { read } for pid=14810 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 725.516227][ T29] audit: type=1400 audit(725.430:21408): avc: denied { read } for pid=14811 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 730.376295][ T29] kauditd_printk_skb: 326 callbacks suppressed [ 730.394556][ T29] audit: type=1400 audit(730.290:21735): avc: denied { read } for pid=14988 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 730.406996][ T29] audit: type=1400 audit(730.320:21736): avc: denied { read } for pid=14989 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 730.412673][ T29] audit: type=1400 audit(730.330:21737): avc: denied { create } for pid=14988 comm="syz.1.5550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 730.423865][T14990] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=47 sclass=netlink_xfrm_socket pid=14990 comm=syz.1.5550 [ 730.424062][ T29] audit: type=1400 audit(730.340:21738): avc: denied { write } for pid=14988 comm="syz.1.5550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 730.463875][ T29] audit: type=1400 audit(730.380:21739): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 730.466167][ T29] audit: type=1400 audit(730.380:21740): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 730.474149][ T29] audit: type=1400 audit(730.380:21741): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 730.477304][ T29] audit: type=1400 audit(730.390:21742): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 730.495123][ T29] audit: type=1400 audit(730.400:21743): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 730.497500][ T29] audit: type=1400 audit(730.400:21744): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 735.394784][ T29] kauditd_printk_skb: 321 callbacks suppressed [ 735.395074][ T29] audit: type=1400 audit(735.310:22066): avc: denied { read } for pid=15149 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 735.417953][ T29] audit: type=1400 audit(735.330:22067): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 735.424547][ T29] audit: type=1400 audit(735.340:22068): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 735.425822][ T29] audit: type=1400 audit(735.340:22069): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 735.469118][ T29] audit: type=1400 audit(735.380:22070): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 735.477014][ T29] audit: type=1400 audit(735.390:22071): avc: denied { read } for pid=15152 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 735.480012][ T29] audit: type=1400 audit(735.390:22072): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 735.482369][ T29] audit: type=1400 audit(735.400:22073): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 735.524726][ T29] audit: type=1400 audit(735.440:22074): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 735.525136][ T29] audit: type=1400 audit(735.440:22075): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.437691][ T29] kauditd_printk_skb: 298 callbacks suppressed [ 740.440572][ T29] audit: type=1400 audit(740.350:22374): avc: denied { read } for pid=15316 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 740.485532][ T29] audit: type=1400 audit(740.400:22375): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.487445][ T29] audit: type=1400 audit(740.400:22376): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.490503][ T29] audit: type=1400 audit(740.400:22377): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.539118][ T29] audit: type=1400 audit(740.450:22378): avc: denied { read } for pid=15318 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 740.575385][ T29] audit: type=1400 audit(740.490:22379): avc: denied { read } for pid=15319 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 740.613975][ T29] audit: type=1400 audit(740.530:22380): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.615355][ T29] audit: type=1400 audit(740.530:22381): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.616371][ T29] audit: type=1400 audit(740.530:22382): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.645503][ T29] audit: type=1400 audit(740.560:22383): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 743.665270][T15430] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1011 sclass=netlink_route_socket pid=15430 comm=syz.1.5769 [ 745.456681][ T29] kauditd_printk_skb: 321 callbacks suppressed [ 745.457631][ T29] audit: type=1400 audit(745.370:22705): avc: denied { read } for pid=15492 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.503634][ T29] audit: type=1400 audit(745.420:22706): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 745.506028][ T29] audit: type=1400 audit(745.420:22707): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 745.510692][ T29] audit: type=1400 audit(745.430:22708): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 745.562173][ T29] audit: type=1400 audit(745.480:22709): avc: denied { read } for pid=15494 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.584148][ T29] audit: type=1400 audit(745.500:22710): avc: denied { read } for pid=15494 comm="syz.1.5802" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.587096][ T29] audit: type=1400 audit(745.500:22711): avc: denied { open } for pid=15494 comm="syz.1.5802" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.599386][ T29] audit: type=1400 audit(745.510:22712): avc: denied { setattr } for pid=15494 comm="syz.1.5802" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.619051][ T29] audit: type=1400 audit(745.530:22713): avc: denied { read } for pid=15495 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 745.635185][ T29] audit: type=1400 audit(745.550:22714): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 748.627316][T15609] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15609 comm=syz.0.5858 [ 750.510316][ T29] kauditd_printk_skb: 337 callbacks suppressed [ 750.512865][ T29] audit: type=1400 audit(750.430:23052): avc: denied { read } for pid=15677 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 750.529644][ T29] audit: type=1400 audit(750.440:23053): avc: denied { read } for pid=15678 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 750.529965][ T29] audit: type=1400 audit(750.440:23054): avc: denied { allowed } for pid=15677 comm="syz.1.5893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 750.544630][ T29] audit: type=1400 audit(750.460:23055): avc: denied { create } for pid=15677 comm="syz.1.5893" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 750.546086][ T29] audit: type=1400 audit(750.460:23056): avc: denied { map } for pid=15677 comm="syz.1.5893" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=40950 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 750.546590][ T29] audit: type=1400 audit(750.460:23057): avc: denied { read write } for pid=15677 comm="syz.1.5893" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=40950 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 750.557016][ T29] audit: type=1400 audit(750.470:23058): avc: denied { create } for pid=15678 comm="syz.0.5892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 750.564503][ T29] audit: type=1400 audit(750.480:23059): avc: denied { ioctl } for pid=15678 comm="syz.0.5892" path="socket:[41854]" dev="sockfs" ino=41854 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 750.580909][ T29] audit: type=1400 audit(750.500:23060): avc: denied { map } for pid=15677 comm="syz.1.5893" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=40950 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 750.581873][ T29] audit: type=1400 audit(750.500:23061): avc: denied { read write } for pid=15677 comm="syz.1.5893" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=40950 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 750.946147][T15690] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15690 comm=syz.1.5900 [ 751.391858][T15703] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15703 comm=syz.1.5905 [ 752.309348][T15736] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15736 comm=syz.1.5922 [ 753.543577][T15778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15778 comm=syz.0.5943 [ 754.443736][T15806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5135 sclass=netlink_route_socket pid=15806 comm=syz.0.5957 [ 755.524708][ T29] kauditd_printk_skb: 323 callbacks suppressed [ 755.526506][ T29] audit: type=1400 audit(755.430:23385): avc: denied { read } for pid=15843 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 755.542665][ T29] audit: type=1400 audit(755.460:23386): avc: denied { read } for pid=15844 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 755.574331][ T29] audit: type=1400 audit(755.490:23387): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 755.575026][ T29] audit: type=1400 audit(755.490:23388): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 755.575198][ T29] audit: type=1400 audit(755.490:23389): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 755.627560][ T29] audit: type=1400 audit(755.540:23390): avc: denied { read } for pid=15848 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 755.664084][ T29] audit: type=1400 audit(755.580:23391): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 755.664372][ T29] audit: type=1400 audit(755.580:23392): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 755.670473][ T29] audit: type=1400 audit(755.590:23393): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 755.671383][ T29] audit: type=1400 audit(755.590:23394): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 755.823919][T15857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5135 sclass=netlink_route_socket pid=15857 comm=syz.0.5982 [ 757.812215][T15924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=15924 comm=syz.0.6016 [ 760.542392][ T29] kauditd_printk_skb: 277 callbacks suppressed [ 760.543781][ T29] audit: type=1400 audit(760.440:23672): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.544031][ T29] audit: type=1400 audit(760.450:23673): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.544107][ T29] audit: type=1400 audit(760.450:23674): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.576935][ T29] audit: type=1400 audit(760.490:23675): avc: denied { read } for pid=15997 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.595725][ T29] audit: type=1400 audit(760.510:23676): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.597154][ T29] audit: type=1400 audit(760.510:23677): avc: denied { read write open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.600839][ T29] audit: type=1400 audit(760.520:23678): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.601205][ T29] audit: type=1400 audit(760.520:23679): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.601309][ T29] audit: type=1400 audit(760.520:23680): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.609590][ T29] audit: type=1400 audit(760.520:23681): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 761.335072][T16028] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16028 comm=syz.0.6069 [ 765.585030][ T29] kauditd_printk_skb: 371 callbacks suppressed [ 765.586267][ T29] audit: type=1400 audit(765.500:24053): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.589793][ T29] audit: type=1400 audit(765.500:24054): avc: denied { read } for pid=16185 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 765.599145][ T29] audit: type=1400 audit(765.510:24055): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.602401][ T29] audit: type=1400 audit(765.520:24056): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.655786][ T29] audit: type=1400 audit(765.570:24057): avc: denied { read } for pid=16187 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 765.667528][ T29] audit: type=1400 audit(765.580:24058): avc: denied { read write } for pid=3093 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.670542][ T29] audit: type=1400 audit(765.580:24059): avc: denied { open } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.672341][ T29] audit: type=1400 audit(765.580:24060): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.719989][ T29] audit: type=1400 audit(765.640:24061): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.722482][ T29] audit: type=1400 audit(765.640:24062): avc: denied { open } for pid=3094 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 767.469650][ T97] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 767.643160][ T97] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 767.643448][ T97] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 767.644962][ T97] usb 1-1: Product: syz [ 767.645144][ T97] usb 1-1: Manufacturer: syz [ 767.645350][ T97] usb 1-1: SerialNumber: syz [ 1188.288930][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 1188.289268][ C0] Modules linked in: [ 1188.290095][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted syzkaller #0 PREEMPT [ 1188.290245][ C0] Hardware name: ARM-Versatile Express [ 1188.290478][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 1188.291249][ C0] LR is at tmigr_handle_remote_up+0x268/0x4b0 [ 1188.291324][ C0] pc : [<81abbd3c>] lr : [<80346ef4>] psr: 60000113 [ 1188.291371][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 1188.291410][ C0] r10: 00000001 r9 : 000000b2 r8 : c3d9a780 [ 1188.291453][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 1188.291493][ C0] r3 : 000032f4 r2 : 00000103 r1 : 830bf3b0 r0 : ddddb488 [ 1188.291624][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 1188.291703][ C0] Control: 30c5387d Table: 84cbe700 DAC: fffffffd [ 1188.291807][ C0] Call trace: [ 1188.292092][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 1188.292497][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 1188.292638][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 1188.292690][ C0] r4:830bf380 [ 1188.292718][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 1188.292797][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 1188.292819][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 1188.292886][ C0] r4:82804084 [ 1188.292906][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 1188.292969][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 1188.293040][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 1188.293065][ C0] r4:8281b500 [ 1188.293081][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 1188.293142][ C0] r5:8247f0cc r4:826c3a9c [ 1188.293162][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 1188.293229][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1188.293375][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 1188.293581][ C0] 1dc0: 00000001 00000000 [ 1188.293642][ C0] 1de0: 0000b8b4 0000b8b3 840b6b68 00000004 00000001 840b6b68 83f10a88 840b6a40 [ 1188.293680][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 1188.293757][ C0] r9:8281b500 r8:83f10a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 1188.293779][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 1188.293853][ C0] r5:00000004 r4:840b6a40 [ 1188.293871][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 1188.293943][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840e4da8 [ 1188.293960][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1188.294017][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 1188.294083][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83999bd8 r5:00000001 [ 1188.294106][ C0] r4:840e4da8 [ 1188.294121][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 1188.294176][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 1188.294233][ C0] r5:000000ff r4:832ffa24 [ 1188.294253][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 1188.294309][ C0] r5:000000ff r4:832ffa24 [ 1188.294331][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 1188.294387][ C0] r5:000000ff r4:832ffa24 [ 1188.294406][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 1188.294469][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 1188.294491][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1188.294571][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 1188.294590][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 1188.294655][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 1188.294731][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 1188.294755][ C0] r4:000000ed [ 1188.294771][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 1188.294840][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 1188.294949][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 1188.295684][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1188.296445][ C1] NMI backtrace for cpu 1 [ 1188.296609][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #0 PREEMPT [ 1188.296668][ C1] Hardware name: ARM-Versatile Express [ 1188.296692][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 1188.296759][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 1188.296792][ C1] pc : [<81abbef4>] lr : [<81abbecc>] psr: 80000113 [ 1188.296818][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 1188.296840][ C1] r10: 81c05450 r9 : 840b6a40 r8 : 83f10a88 [ 1188.296862][ C1] r7 : 840b6b68 r6 : 00000000 r5 : 00000001 r4 : 840b6b68 [ 1188.296885][ C1] r3 : 0000b8b3 r2 : 0000b8b5 r1 : 00000000 r0 : 00000001 [ 1188.296912][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1188.296951][ C1] Control: 30c5387d Table: 84cbe700 DAC: 00000000 [ 1188.296972][ C1] Call trace: frame pointer underflow [ 1188.297065][ C1] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 1188.297148][ C1] r5:00000001 r4:840b6a40 [ 1188.297169][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 1188.297244][ C1] r7:00000000 r6:00000000 r5:00000000 r4:840e4d80 [ 1188.297263][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1188.297338][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 1188.297414][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:0000b6b8 r6:00000026 r5:00000000 [ 1188.297436][ C1] r4:840e4d80 [ 1188.297455][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 1188.297511][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 1188.297576][ C1] r5:832ff844 r4:832ff844 [ 1188.297597][ C1] [<809ccae0>] (gpio_led_set) from [<809ca3d4>] (led_set_brightness_nosleep+0x38/0x44) [ 1188.297658][ C1] r5:832ff844 r4:84a8698c [ 1188.297682][ C1] [<809ca39c>] (led_set_brightness_nosleep) from [<809cd438>] (led_heartbeat_function+0x84/0x144) [ 1188.297739][ C1] [<809cd3b4>] (led_heartbeat_function) from [<80327070>] (call_timer_fn+0x30/0x220) [ 1188.297815][ C1] r7:0000b6b8 r6:809cd3b4 r5:84a8698c r4:83216000 [ 1188.297838][ C1] [<80327040>] (call_timer_fn) from [<80327524>] (__run_timers+0x2c4/0x3f8) [ 1188.297914][ C1] r9:df805ebc r8:0000b6b8 r7:00000000 r6:809cd3b4 r5:dddd9f00 r4:84a8698c [ 1188.297938][ C1] [<80327260>] (__run_timers) from [<803276c0>] (run_timer_base+0x68/0x78) [ 1188.298013][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000182 r5:00000002 [ 1188.298039][ C1] r4:dddd9f00 [ 1188.298057][ C1] [<80327658>] (run_timer_base) from [<803276ec>] (run_timer_softirq+0x1c/0x34) [ 1188.298115][ C1] r4:82804084 [ 1188.298132][ C1] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 1188.298194][ C1] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 1188.298268][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443f98 r5:8247f0cc [ 1188.298295][ C1] r4:83216000 [ 1188.298329][ C1] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 1188.298396][ C1] r5:8247f0cc r4:826c3a9c [ 1188.298418][ C1] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 1188.298485][ C1] [<81aad8e8>] (generic_handle_arch_irq) from [<81a7d904>] (call_with_stack+0x1c/0x20) [ 1188.298565][ C1] r9:83216000 r8:83f10a88 r7:df865e3c r6:ffffffff r5:60000013 r4:809c822c [ 1188.298592][ C1] [<81a7d8e8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 1188.298650][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 1188.298699][ C1] 5e00: e020f008 00000009 0000b8b3 00000000 e020f008 00000009 [ 1188.298743][ C1] 5e20: 00000001 840b6b68 83f10a88 840b6a40 00000000 df865e6c df865e58 df865e58 [ 1188.298773][ C1] 5e40: 809c8228 809c822c 60000013 ffffffff [ 1188.298796][ C1] [<809c820c>] (gpio_mmio_write32) from [<809c7a4c>] (gpio_mmio_set+0x64/0x80) [ 1188.298865][ C1] r5:00000008 r4:840b6a40 [ 1188.298886][ C1] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 1188.298959][ C1] r7:00000001 r6:00000000 r5:00000003 r4:840e4dbc [ 1188.298981][ C1] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1188.299039][ C1] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 1188.299112][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:83999c18 r5:00000001 [ 1188.299137][ C1] r4:840e4dbc [ 1188.299154][ C1] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 1188.299210][ C1] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 1188.299270][ C1] r5:000000ff r4:832ffb14 [ 1188.299292][ C1] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 1188.299367][ C1] r5:000000ff r4:832ffb14 [ 1188.299388][ C1] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 1188.299449][ C1] r5:000000ff r4:832ffb14 [ 1188.299470][ C1] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 1188.299536][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 1188.299561][ C1] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1188.299638][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 1188.299661][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 1188.299726][ C1] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 1188.299801][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 1188.299828][ C1] r4:00000092 [ 1188.299846][ C1] [<802b1c08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 1188.299914][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 1188.299993][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 1188.300918][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 1188.335440][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 1188.335874][ C0] Tainted: [L]=SOFTLOCKUP [ 1188.336047][ C0] Hardware name: ARM-Versatile Express [ 1188.336287][ C0] Call trace: [ 1188.336742][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 1188.337152][ C0] r7:822965a4 r6:8281b500 r5:00000000 r4:82295754 [ 1188.337374][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 1188.337730][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 1188.338083][ C0] r5:00000000 r4:82a7bd14 [ 1188.338395][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 1188.338892][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 1188.339238][ C0] r7:82ac27f8 [ 1188.339396][ C0] [<80202850>] (panic) from [<80383fcc>] (watchdog_timer_fn+0x2dc/0x350) [ 1188.339751][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:822965a4 [ 1188.339995][ C0] [<80383cf0>] (watchdog_timer_fn) from [<80329c64>] (__hrtimer_run_queues+0x1c4/0x454) [ 1188.340419][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383cf0 r6:dddc7000 r5:dddc7040 [ 1188.340738][ C0] r4:dddc75d8 [ 1188.340906][ C0] [<80329aa0>] (__hrtimer_run_queues) from [<8032b268>] (hrtimer_interrupt+0x148/0x2bc) [ 1188.341286][ C0] r10:a6d86d30 r9:dddc7180 r8:dddc7130 r7:00000114 r6:00000003 r5:20000193 [ 1188.341589][ C0] r4:dddc7000 [ 1188.341752][ C0] [<8032b120>] (hrtimer_interrupt) from [<813408e0>] (arch_timer_handler_virt+0x30/0x38) [ 1188.342167][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 1188.342466][ C0] r4:8309de40 [ 1188.342645][ C0] [<813408b0>] (arch_timer_handler_virt) from [<802efab4>] (handle_percpu_devid_irq+0x128/0x34c) [ 1188.343043][ C0] [<802ef98c>] (handle_percpu_devid_irq) from [<802e8c44>] (handle_irq_desc+0x74/0x84) [ 1188.343504][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 1188.343818][ C0] r4:8280cc44 [ 1188.343983][ C0] [<802e8bd0>] (handle_irq_desc) from [<802e8cc0>] (generic_handle_domain_irq+0x18/0x1c) [ 1188.344409][ C0] [<802e8ca8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 1188.344796][ C0] [<80201260>] (gic_handle_irq) from [<81aad948>] (generic_handle_arch_irq+0x60/0x80) [ 1188.345193][ C0] r7:82801b90 r6:82443f98 r5:8247f0cc r4:826c3a9c [ 1188.345439][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1188.345803][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 1188.346056][ C0] 1b80: ddddb488 830bf3b0 00000103 000032f4 [ 1188.346377][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 c3d9a780 000000b2 00000001 82801bec [ 1188.346711][ C0] 1bc0: 82801bf0 82801be0 80346ef4 81abbd3c 60000113 ffffffff [ 1188.347005][ C0] r9:8281b500 r8:c3d9a780 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abbd3c [ 1188.347309][ C0] [<81abbd14>] (_raw_spin_unlock_irq) from [<80346ef4>] (tmigr_handle_remote_up+0x268/0x4b0) [ 1188.347724][ C0] [<80346c8c>] (tmigr_handle_remote_up) from [<803451a4>] (__walk_groups_from+0x3c/0xe4) [ 1188.348146][ C0] r10:8281b500 r9:8280c820 r8:80346c8c r7:82801cb8 r6:830bf380 r5:00000002 [ 1188.348452][ C0] r4:830bf380 [ 1188.348625][ C0] [<80345168>] (__walk_groups_from) from [<8034753c>] (tmigr_handle_remote+0xe8/0x108) [ 1188.349005][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 1188.349340][ C0] [<80347454>] (tmigr_handle_remote) from [<80327700>] (run_timer_softirq+0x30/0x34) [ 1188.349730][ C0] r4:82804084 [ 1188.349890][ C0] [<803276d0>] (run_timer_softirq) from [<8025b65c>] (handle_softirqs+0x140/0x458) [ 1188.350246][ C0] [<8025b51c>] (handle_softirqs) from [<8025bad0>] (__irq_exit_rcu+0x110/0x1d0) [ 1188.350636][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443f98 r5:8247f0cc [ 1188.350914][ C0] r4:8281b500 [ 1188.351080][ C0] [<8025b9c0>] (__irq_exit_rcu) from [<8025be48>] (irq_exit+0x10/0x18) [ 1188.351392][ C0] r5:8247f0cc r4:826c3a9c [ 1188.351569][ C0] [<8025be38>] (irq_exit) from [<81aad964>] (generic_handle_arch_irq+0x7c/0x80) [ 1188.351920][ C0] [<81aad8e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1188.352307][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 1188.352603][ C0] 1dc0: 00000001 00000000 [ 1188.352926][ C0] 1de0: 0000b8b4 0000b8b3 840b6b68 00000004 00000001 840b6b68 83f10a88 840b6a40 [ 1188.353257][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbecc 81abbef4 80000013 ffffffff [ 1188.353609][ C0] r9:8281b500 r8:83f10a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbef4 [ 1188.353911][ C0] [<81abbeb4>] (_raw_spin_lock) from [<809c7a2c>] (gpio_mmio_set+0x44/0x80) [ 1188.354290][ C0] r5:00000004 r4:840b6a40 [ 1188.354489][ C0] [<809c79e8>] (gpio_mmio_set) from [<809b81e8>] (gpiochip_set+0x1c/0x44) [ 1188.354855][ C0] r7:00000001 r6:00000000 r5:00000002 r4:840e4da8 [ 1188.355389][ C0] [<809b81cc>] (gpiochip_set) from [<809baab0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1188.355795][ C0] [<809baa38>] (gpiod_set_raw_value_commit) from [<809bc350>] (gpiod_set_value_nocheck+0x44/0x58) [ 1188.356255][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83999bd8 r5:00000001 [ 1188.356587][ C0] r4:840e4da8 [ 1188.356757][ C0] [<809bc30c>] (gpiod_set_value_nocheck) from [<809bc3a0>] (gpiod_set_value+0x3c/0x88) [ 1188.357130][ C0] [<809bc364>] (gpiod_set_value) from [<809ccb3c>] (gpio_led_set+0x5c/0x60) [ 1188.357487][ C0] r5:000000ff r4:832ffa24 [ 1188.357694][ C0] [<809ccae0>] (gpio_led_set) from [<809ca464>] (led_set_brightness+0x84/0x90) [ 1188.358053][ C0] r5:000000ff r4:832ffa24 [ 1188.358242][ C0] [<809ca3e0>] (led_set_brightness) from [<809cbfe4>] (led_trigger_event+0x40/0x58) [ 1188.358629][ C0] r5:000000ff r4:832ffa24 [ 1188.358823][ C0] [<809cbfa4>] (led_trigger_event) from [<809cd640>] (ledtrig_cpu+0xac/0xf4) [ 1188.359180][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 1188.359432][ C0] [<809cd594>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1188.359812][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 1188.360205][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b168c>] (do_idle+0x5c/0x2d8) [ 1188.360577][ C0] [<802b1630>] (do_idle) from [<802b1c38>] (cpu_startup_entry+0x30/0x34) [ 1188.360953][ C0] r10:8281aff4 r9:8280c680 r8:823bec64 r7:00000000 r6:deffc06c r5:828222e8 [ 1188.361260][ C0] r4:000000ed [ 1188.361425][ C0] [<802b1c08>] (cpu_startup_entry) from [<81aaf37c>] (kernel_init+0x0/0x138) [ 1188.361801][ C0] [<81aaf29c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 1188.362143][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 1188.364909][ C0] Rebooting in 86400 seconds..