last executing test programs: 1.849624547s ago: executing program 1 (id=16441): pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) write$RDMA_USER_CM_CMD_NOTIFY(r0, 0x0, 0x0) 1.50092571s ago: executing program 1 (id=16443): socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000400)={&(0x7f00000000c0), 0xc, &(0x7f00000003c0)={0x0}}, 0x0) 1.19946227s ago: executing program 1 (id=16445): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x5451, 0x0) 1.069829809s ago: executing program 0 (id=16446): r0 = openat$dlm_control(0xffffff9c, &(0x7f0000002a80), 0x208000, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000002, 0x17031, r0, 0x10000000) 900.727789ms ago: executing program 1 (id=16447): r0 = fanotify_init(0x0, 0x0) ioctl$FICLONERANGE(r0, 0x5450, 0x0) 900.52942ms ago: executing program 0 (id=16448): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='cmdline\x00') ioctl$PIO_CMAP(r0, 0x5452, &(0x7f0000000080)) 708.106443ms ago: executing program 0 (id=16449): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) open_tree(r0, &(0x7f0000000640)='\x00', 0x81000) 707.960242ms ago: executing program 1 (id=16450): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f00000000c0), 0x40002, 0x0) write$yama_ptrace_scope(r0, &(0x7f0000002900)='3\x00', 0x2) 529.800574ms ago: executing program 0 (id=16451): r0 = eventfd(0x0) ioctl$TUNSETCARRIER(r0, 0x5451, 0x0) 350.317186ms ago: executing program 0 (id=16452): r0 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$KDSIGACCEPT(r0, 0x5421, 0x2081004e) 244.097534ms ago: executing program 1 (id=16453): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, 0x0) 0s ago: executing program 0 (id=16454): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000300)=@ethtool_rxnfc={0x2f, 0x2, 0x6, {0xe, @usr_ip6_spec={@empty, @dev={0xfe, 0x80, '\x00', 0x24}, 0xfffffff8, 0x3d, 0xe}, {0x0, @remote, 0xe, 0x4, [0x7, 0x6]}, @ah_ip4_spec={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x5}, {0x0, @broadcast, 0x8, 0x5, [0xf, 0x9]}, 0xff, 0x3}}}) kernel console output (not intermixed with test programs): m_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1432.262500][ T29] audit: type=1400 audit(1432.180:46870): avc: denied { read } for pid=937 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1432.335439][ T29] audit: type=1400 audit(1432.250:46871): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1432.347985][ T29] audit: type=1400 audit(1432.270:46872): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1432.792236][ T946] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=946 comm=syz.1.14524 [ 1436.425168][ T1020] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1020 comm=syz.0.14555 [ 1437.089740][ T29] kauditd_printk_skb: 178 callbacks suppressed [ 1437.090045][ T29] audit: type=1400 audit(1437.010:47051): avc: denied { read } for pid=1033 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1437.119796][ T29] audit: type=1400 audit(1437.040:47052): avc: denied { read } for pid=1034 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1437.190124][ T29] audit: type=1400 audit(1437.110:47053): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1437.193043][ T29] audit: type=1400 audit(1437.110:47054): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1437.216613][ T29] audit: type=1400 audit(1437.130:47055): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1437.222697][ T29] audit: type=1400 audit(1437.140:47056): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1437.234103][ T29] audit: type=1400 audit(1437.150:47057): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1437.241418][ T29] audit: type=1400 audit(1437.160:47058): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1437.344534][ T29] audit: type=1400 audit(1437.260:47059): avc: denied { read } for pid=1037 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1437.363704][ T29] audit: type=1400 audit(1437.280:47060): avc: denied { read } for pid=1038 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1438.036983][ T1052] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1052 comm=syz.1.14571 [ 1442.109681][ T29] kauditd_printk_skb: 168 callbacks suppressed [ 1442.110158][ T29] audit: type=1400 audit(1442.030:47229): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1442.126777][ T29] audit: type=1400 audit(1442.040:47230): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1442.127412][ T29] audit: type=1400 audit(1442.040:47231): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1442.131802][ T29] audit: type=1400 audit(1442.050:47232): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1442.137862][ T29] audit: type=1400 audit(1442.050:47233): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1442.147854][ T29] audit: type=1400 audit(1442.070:47234): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1442.290331][ T29] audit: type=1400 audit(1442.210:47235): avc: denied { read } for pid=1117 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1442.316823][ T29] audit: type=1400 audit(1442.230:47236): avc: denied { read } for pid=1118 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1442.437886][ T29] audit: type=1400 audit(1442.350:47237): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1442.438428][ T29] audit: type=1400 audit(1442.350:47238): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1447.157701][ T29] kauditd_printk_skb: 159 callbacks suppressed [ 1447.158217][ T29] audit: type=1400 audit(1447.070:47398): avc: denied { read } for pid=1200 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1447.167748][ T29] audit: type=1400 audit(1447.080:47399): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1447.177692][ T29] audit: type=1400 audit(1447.090:47400): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1447.183703][ T29] audit: type=1400 audit(1447.100:47401): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1447.234387][ T29] audit: type=1400 audit(1447.150:47402): avc: denied { read open } for pid=1200 comm="syz.1.14642" path="net:[4026532716]" dev="nsfs" ino=4026532716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1447.342146][ T29] audit: type=1400 audit(1447.260:47403): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1447.346865][ T29] audit: type=1400 audit(1447.260:47404): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1447.354244][ T29] audit: type=1400 audit(1447.270:47405): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1447.364155][ T29] audit: type=1400 audit(1447.280:47406): avc: denied { read } for pid=1202 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1447.398328][ T1203] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1203 comm=syz.0.14643 [ 1447.507961][ T29] audit: type=1400 audit(1447.430:47407): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1452.221883][ T29] kauditd_printk_skb: 155 callbacks suppressed [ 1452.222529][ T29] audit: type=1400 audit(1452.130:47563): avc: denied { read } for pid=1277 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1452.306691][ T29] audit: type=1400 audit(1452.210:47564): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1452.307190][ T29] audit: type=1400 audit(1452.220:47565): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1452.307262][ T29] audit: type=1400 audit(1452.220:47566): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1452.379179][ T29] audit: type=1400 audit(1452.300:47567): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1452.382954][ T29] audit: type=1400 audit(1452.300:47568): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1452.400513][ T29] audit: type=1400 audit(1452.320:47569): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1452.508946][ T29] audit: type=1400 audit(1452.430:47570): avc: denied { read } for pid=1280 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1452.562865][ T29] audit: type=1400 audit(1452.480:47571): avc: denied { read write } for pid=1280 comm="syz.1.14682" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1452.572959][ T29] audit: type=1400 audit(1452.490:47572): avc: denied { read open } for pid=1280 comm="syz.1.14682" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1457.248591][ T29] kauditd_printk_skb: 167 callbacks suppressed [ 1457.249060][ T29] audit: type=1400 audit(1457.170:47740): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1457.258525][ T29] audit: type=1400 audit(1457.180:47741): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1457.260584][ T29] audit: type=1400 audit(1457.180:47742): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1457.322549][ T29] audit: type=1400 audit(1457.240:47743): avc: denied { read } for pid=1360 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1457.365586][ T29] audit: type=1400 audit(1457.280:47744): avc: denied { module_request } for pid=1360 comm="syz.0.14722" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1457.423473][ T29] audit: type=1400 audit(1457.340:47745): avc: denied { read } for pid=1363 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1457.452899][ T29] audit: type=1400 audit(1457.370:47746): avc: denied { write } for pid=1363 comm="syz.1.14723" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1457.477664][ T29] audit: type=1400 audit(1457.390:47747): avc: denied { write open } for pid=1363 comm="syz.1.14723" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1457.609559][ T29] audit: type=1400 audit(1457.530:47748): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1457.621356][ T29] audit: type=1400 audit(1457.540:47749): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1460.538852][ T1409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1409 comm=syz.0.14745 [ 1462.103400][ T1437] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=1437 comm=syz.1.14759 [ 1462.343200][ T29] kauditd_printk_skb: 169 callbacks suppressed [ 1462.343564][ T29] audit: type=1400 audit(1462.260:47919): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.351140][ T29] audit: type=1400 audit(1462.270:47920): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.390781][ T29] audit: type=1400 audit(1462.290:47921): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.420555][ T29] audit: type=1400 audit(1462.340:47922): avc: denied { read } for pid=1440 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1462.474022][ T29] audit: type=1400 audit(1462.390:47923): avc: denied { read } for pid=1441 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1462.544323][ T29] audit: type=1400 audit(1462.460:47924): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.557521][ T29] audit: type=1400 audit(1462.470:47925): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.558177][ T29] audit: type=1400 audit(1462.470:47926): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.705226][ T29] audit: type=1400 audit(1462.620:47927): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.709779][ T29] audit: type=1400 audit(1462.630:47928): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.771400][ T1445] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=1445 comm=syz.1.14763 [ 1467.655402][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 1467.655787][ T29] audit: type=1400 audit(1467.570:48055): avc: denied { read } for pid=1500 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1467.791818][ T29] audit: type=1400 audit(1467.710:48056): avc: denied { read } for pid=1501 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1468.029553][ T29] audit: type=1400 audit(1467.950:48057): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1468.066833][ T29] audit: type=1400 audit(1467.980:48058): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1468.080350][ T29] audit: type=1400 audit(1468.000:48059): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1468.304482][ T29] audit: type=1400 audit(1468.220:48060): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1468.402410][ T29] audit: type=1400 audit(1468.320:48061): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1468.405878][ T29] audit: type=1400 audit(1468.320:48062): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1468.745822][ T29] audit: type=1400 audit(1468.660:48063): avc: denied { read } for pid=1504 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1468.878215][ T29] audit: type=1400 audit(1468.770:48064): avc: denied { read write } for pid=1504 comm="syz.0.14792" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:insmod_exec_t:s0" [ 1472.747134][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 1472.748555][ T29] audit: type=1400 audit(1472.650:48112): avc: denied { read } for pid=1526 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1473.074058][ T29] audit: type=1400 audit(1472.990:48113): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1473.096792][ T29] audit: type=1400 audit(1473.010:48114): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1473.097967][ T29] audit: type=1400 audit(1473.010:48115): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1473.235019][ T29] audit: type=1400 audit(1473.150:48116): avc: denied { read } for pid=1528 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1473.732952][ T29] audit: type=1400 audit(1473.650:48117): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1473.748835][ T29] audit: type=1400 audit(1473.670:48118): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1473.752950][ T29] audit: type=1400 audit(1473.670:48119): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1473.753312][ T29] audit: type=1400 audit(1473.670:48120): avc: denied { read } for pid=1530 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1474.205838][ T29] audit: type=1400 audit(1474.120:48121): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1477.791942][ T29] kauditd_printk_skb: 115 callbacks suppressed [ 1477.792285][ T29] audit: type=1400 audit(1477.710:48237): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1477.794094][ T29] audit: type=1400 audit(1477.710:48238): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1477.795993][ T29] audit: type=1400 audit(1477.710:48239): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1477.799843][ T29] audit: type=1400 audit(1477.720:48240): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1477.821162][ T29] audit: type=1400 audit(1477.740:48241): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1477.828786][ T29] audit: type=1400 audit(1477.750:48242): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1477.915867][ T29] audit: type=1400 audit(1477.830:48243): avc: denied { read } for pid=1605 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1477.937618][ T29] audit: type=1400 audit(1477.860:48244): avc: denied { create } for pid=1605 comm="syz.1.14835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1478.013257][ T29] audit: type=1400 audit(1477.930:48245): avc: denied { read } for pid=1607 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1478.074978][ T29] audit: type=1400 audit(1477.990:48246): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1480.463064][ T1638] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1638 comm=syz.1.14849 [ 1481.902353][ T1656] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1656 comm=syz.0.14858 [ 1482.827527][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 1482.828081][ T29] audit: type=1400 audit(1482.740:48380): avc: denied { read } for pid=1668 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1482.847082][ T29] audit: type=1400 audit(1482.760:48381): avc: denied { read } for pid=1667 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1482.907390][ T29] audit: type=1400 audit(1482.820:48382): avc: denied { read } for pid=1667 comm="syz.1.14865" dev="nsfs" ino=4026532716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1482.909891][ T29] audit: type=1400 audit(1482.830:48383): avc: denied { read open } for pid=1667 comm="syz.1.14865" path="net:[4026532716]" dev="nsfs" ino=4026532716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1482.914415][ T29] audit: type=1400 audit(1482.830:48384): avc: denied { create } for pid=1667 comm="syz.1.14865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1482.996895][ T29] audit: type=1400 audit(1482.910:48385): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1483.006742][ T29] audit: type=1400 audit(1482.920:48386): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1483.010971][ T29] audit: type=1400 audit(1482.930:48387): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1483.022475][ T29] audit: type=1400 audit(1482.940:48388): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1483.024380][ T29] audit: type=1400 audit(1482.940:48389): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1487.839361][ T29] kauditd_printk_skb: 151 callbacks suppressed [ 1487.846887][ T29] audit: type=1400 audit(1487.760:48541): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1487.848274][ T29] audit: type=1400 audit(1487.760:48542): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1487.849516][ T29] audit: type=1400 audit(1487.770:48543): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1487.868996][ T29] audit: type=1400 audit(1487.780:48544): avc: denied { read write } for pid=1739 comm="syz.1.14900" name="pcmC1D0p" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1487.870762][ T29] audit: type=1400 audit(1487.780:48545): avc: denied { read write open } for pid=1739 comm="syz.1.14900" path="/dev/snd/pcmC1D0p" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1487.900295][ T29] audit: type=1400 audit(1487.820:48546): avc: denied { ioctl } for pid=1739 comm="syz.1.14900" path="/dev/snd/pcmC1D0p" dev="devtmpfs" ino=729 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1487.971068][ T29] audit: type=1400 audit(1487.890:48547): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1487.976923][ T29] audit: type=1400 audit(1487.890:48548): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1487.985171][ T29] audit: type=1400 audit(1487.900:48549): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1488.055770][ T29] audit: type=1400 audit(1487.970:48550): avc: denied { read } for pid=1741 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1491.842744][ T1806] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1806 comm=syz.0.14932 [ 1492.933791][ T29] kauditd_printk_skb: 167 callbacks suppressed [ 1492.934191][ T29] audit: type=1400 audit(1492.850:48718): avc: denied { sys_module } for pid=1815 comm="syz.0.14938" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1492.948677][ T29] audit: type=1400 audit(1492.870:48719): avc: denied { module_request } for pid=1815 comm="syz.0.14938" kmod="" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1493.142385][ T29] audit: type=1400 audit(1493.060:48720): avc: denied { read } for pid=1820 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1493.241237][ T29] audit: type=1400 audit(1493.160:48721): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1493.243375][ T29] audit: type=1400 audit(1493.160:48722): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1493.245537][ T29] audit: type=1400 audit(1493.160:48723): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1493.302044][ T29] audit: type=1400 audit(1493.220:48724): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1493.305576][ T29] audit: type=1400 audit(1493.220:48725): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1493.311562][ T29] audit: type=1400 audit(1493.230:48726): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1493.367737][ T29] audit: type=1400 audit(1493.290:48727): avc: denied { read } for pid=1822 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1497.958607][ T29] kauditd_printk_skb: 164 callbacks suppressed [ 1497.958944][ T29] audit: type=1400 audit(1497.880:48892): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1497.965035][ T29] audit: type=1400 audit(1497.880:48893): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1497.972824][ T29] audit: type=1400 audit(1497.890:48894): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1498.030227][ T29] audit: type=1400 audit(1497.950:48895): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1498.038195][ T29] audit: type=1400 audit(1497.960:48896): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1498.049944][ T29] audit: type=1400 audit(1497.960:48897): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1498.203175][ T29] audit: type=1400 audit(1498.120:48898): avc: denied { read } for pid=1907 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1498.204016][ T29] audit: type=1400 audit(1498.120:48899): avc: denied { read } for pid=1906 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1498.307764][ T29] audit: type=1400 audit(1498.220:48900): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1498.314170][ T29] audit: type=1400 audit(1498.230:48901): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1503.013690][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 1503.014314][ T29] audit: type=1400 audit(1502.930:49031): avc: denied { read } for pid=1976 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1503.082437][ T29] audit: type=1400 audit(1503.000:49032): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1503.084359][ T29] audit: type=1400 audit(1503.000:49033): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1503.099092][ T29] audit: type=1400 audit(1503.020:49034): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1503.137798][ T29] audit: type=1400 audit(1503.060:49035): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1503.146755][ T29] audit: type=1400 audit(1503.060:49036): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1503.147109][ T29] audit: type=1400 audit(1503.060:49037): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1503.212191][ T29] audit: type=1400 audit(1503.130:49038): avc: denied { read } for pid=1979 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1503.230912][ T29] audit: type=1400 audit(1503.150:49039): avc: denied { read } for pid=1980 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1503.282429][ T29] audit: type=1400 audit(1503.200:49040): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1503.812072][ T1990] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=1990 comm=syz.1.15018 [ 1507.214783][ T2035] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=2035 comm=syz.0.15040 [ 1508.078069][ T29] kauditd_printk_skb: 140 callbacks suppressed [ 1508.087010][ T29] audit: type=1400 audit(1507.990:49181): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1508.087505][ T29] audit: type=1400 audit(1508.000:49182): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1508.087730][ T29] audit: type=1400 audit(1508.000:49183): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1508.150406][ T29] audit: type=1400 audit(1508.070:49184): avc: denied { read } for pid=2045 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1508.197067][ T29] audit: type=1400 audit(1508.110:49185): avc: denied { read } for pid=2045 comm="syz.0.15046" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1508.200004][ T29] audit: type=1400 audit(1508.110:49186): avc: denied { read open } for pid=2045 comm="syz.0.15046" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1508.225186][ T29] audit: type=1400 audit(1508.140:49187): avc: denied { setattr } for pid=2045 comm="syz.0.15046" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1508.293438][ T29] audit: type=1400 audit(1508.210:49188): avc: denied { read } for pid=2047 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1508.385443][ T29] audit: type=1400 audit(1508.300:49189): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1508.398268][ T29] audit: type=1400 audit(1508.310:49190): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1511.666802][ T2096] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2096 comm=syz.1.15071 [ 1512.019177][ T2100] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=2100 comm=syz.1.15073 [ 1513.112061][ T29] kauditd_printk_skb: 154 callbacks suppressed [ 1513.112648][ T29] audit: type=1400 audit(1513.030:49345): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1513.119712][ T29] audit: type=1400 audit(1513.040:49346): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1513.137086][ T29] audit: type=1400 audit(1513.050:49347): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1513.151887][ T29] audit: type=1400 audit(1513.070:49348): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1513.155792][ T29] audit: type=1400 audit(1513.070:49349): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1513.177317][ T29] audit: type=1400 audit(1513.080:49350): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1513.244422][ T29] audit: type=1400 audit(1513.160:49351): avc: denied { read } for pid=2119 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1513.363722][ T29] audit: type=1400 audit(1513.280:49352): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1513.377922][ T29] audit: type=1400 audit(1513.290:49353): avc: denied { read } for pid=2121 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1513.378320][ T29] audit: type=1400 audit(1513.290:49354): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1518.159771][ T29] kauditd_printk_skb: 138 callbacks suppressed [ 1518.160064][ T29] audit: type=1400 audit(1518.080:49493): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1518.168836][ T29] audit: type=1400 audit(1518.080:49494): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1518.173273][ T29] audit: type=1400 audit(1518.090:49495): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1518.281351][ T29] audit: type=1400 audit(1518.200:49496): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1518.283925][ T29] audit: type=1400 audit(1518.200:49497): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1518.291420][ T29] audit: type=1400 audit(1518.210:49498): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1518.378862][ T29] audit: type=1400 audit(1518.300:49499): avc: denied { read } for pid=2187 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1518.512910][ T29] audit: type=1400 audit(1518.430:49500): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1518.515726][ T29] audit: type=1400 audit(1518.430:49501): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1518.533741][ T29] audit: type=1400 audit(1518.450:49502): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1521.573332][ T2234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1005 sclass=netlink_route_socket pid=2234 comm=syz.0.15139 [ 1523.189099][ T29] kauditd_printk_skb: 139 callbacks suppressed [ 1523.189565][ T29] audit: type=1400 audit(1523.110:49642): avc: denied { read } for pid=2253 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1523.215249][ T29] audit: type=1400 audit(1523.130:49643): avc: denied { create } for pid=2253 comm="syz.1.15150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1523.224894][ T29] audit: type=1400 audit(1523.140:49644): avc: denied { bind } for pid=2253 comm="syz.1.15150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1523.242610][ T29] audit: type=1400 audit(1523.160:49645): avc: denied { read } for pid=2254 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1523.245422][ T29] audit: type=1400 audit(1523.160:49646): avc: denied { node_bind } for pid=2253 comm="syz.1.15150" saddr=10.1.1.0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1523.304299][ T29] audit: type=1400 audit(1523.220:49647): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1523.308926][ T29] audit: type=1400 audit(1523.220:49648): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1523.317004][ T29] audit: type=1400 audit(1523.230:49649): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1523.398277][ T29] audit: type=1400 audit(1523.320:49650): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1523.404266][ T29] audit: type=1400 audit(1523.320:49651): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1524.489677][ T2272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2272 comm=syz.0.15159 [ 1528.257125][ T29] kauditd_printk_skb: 165 callbacks suppressed [ 1528.264064][ T29] audit: type=1400 audit(1528.170:49817): avc: denied { read } for pid=2328 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1528.268850][ T29] audit: type=1400 audit(1528.180:49818): avc: denied { read } for pid=2327 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1528.295942][ T29] audit: type=1400 audit(1528.210:49819): avc: denied { write } for pid=2328 comm="syz.1.15187" name="fb1" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1528.320773][ T29] audit: type=1400 audit(1528.240:49820): avc: denied { write open } for pid=2328 comm="syz.1.15187" path="/dev/fb1" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1528.330321][ T29] audit: type=1400 audit(1528.250:49821): avc: denied { ioctl } for pid=2328 comm="syz.1.15187" path="/dev/fb1" dev="devtmpfs" ino=763 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1528.367001][ T29] audit: type=1400 audit(1528.280:49822): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1528.377278][ T29] audit: type=1400 audit(1528.290:49823): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1528.377887][ T29] audit: type=1400 audit(1528.290:49824): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1528.488350][ T29] audit: type=1400 audit(1528.410:49825): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1528.492403][ T29] audit: type=1400 audit(1528.410:49826): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.309942][ T29] kauditd_printk_skb: 173 callbacks suppressed [ 1533.310216][ T29] audit: type=1400 audit(1533.230:50000): avc: denied { read } for pid=2406 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1533.374808][ T29] audit: type=1400 audit(1533.290:50001): avc: denied { read } for pid=2407 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1533.402869][ T29] audit: type=1400 audit(1533.320:50002): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.411680][ T29] audit: type=1400 audit(1533.330:50003): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.427166][ T29] audit: type=1400 audit(1533.340:50004): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.501934][ T29] audit: type=1400 audit(1533.420:50005): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.505814][ T29] audit: type=1400 audit(1533.420:50006): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.515662][ T29] audit: type=1400 audit(1533.430:50007): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.553243][ T29] audit: type=1400 audit(1533.470:50008): avc: denied { read } for pid=2410 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1533.646685][ T29] audit: type=1400 audit(1533.560:50009): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1538.340352][ T29] kauditd_printk_skb: 178 callbacks suppressed [ 1538.341078][ T29] audit: type=1400 audit(1538.250:50188): avc: denied { read write } for pid=2488 comm="syz.1.15266" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:faillog_t:s0" [ 1538.356652][ T29] audit: type=1400 audit(1538.270:50189): avc: denied { read write open } for pid=2488 comm="syz.1.15266" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:faillog_t:s0" [ 1538.369380][ T29] audit: type=1400 audit(1538.290:50190): avc: denied { setattr } for pid=2488 comm="syz.1.15266" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:faillog_t:s0" [ 1538.401899][ T29] audit: type=1400 audit(1538.320:50191): avc: denied { read } for pid=2489 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1538.509199][ T29] audit: type=1400 audit(1538.430:50192): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1538.516842][ T29] audit: type=1400 audit(1538.430:50193): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1538.517305][ T29] audit: type=1400 audit(1538.430:50194): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1538.524004][ T29] audit: type=1400 audit(1538.440:50195): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1538.548718][ T29] audit: type=1400 audit(1538.470:50196): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1538.552339][ T29] audit: type=1400 audit(1538.470:50197): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1542.591367][ T2557] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2557 comm=syz.0.15300 [ 1543.380027][ T29] kauditd_printk_skb: 171 callbacks suppressed [ 1543.386932][ T29] audit: type=1400 audit(1543.300:50369): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.387374][ T29] audit: type=1400 audit(1543.300:50370): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.401694][ T29] audit: type=1400 audit(1543.320:50371): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.411267][ T29] audit: type=1400 audit(1543.330:50372): avc: denied { read } for pid=2570 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1543.513708][ T29] audit: type=1400 audit(1543.430:50373): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.527273][ T29] audit: type=1400 audit(1543.440:50374): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.532011][ T29] audit: type=1400 audit(1543.450:50375): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.585192][ T29] audit: type=1400 audit(1543.500:50376): avc: denied { read } for pid=2572 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1543.654050][ T29] audit: type=1400 audit(1543.570:50377): avc: denied { read } for pid=2574 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1543.698350][ T29] audit: type=1400 audit(1543.610:50378): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.414638][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 1548.416544][ T29] audit: type=1400 audit(1548.330:50540): avc: denied { read } for pid=2648 comm="syz.1.15345" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1548.452964][ T29] audit: type=1400 audit(1548.370:50541): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.460333][ T29] audit: type=1400 audit(1548.370:50542): avc: denied { read open } for pid=2648 comm="syz.1.15345" path="/dev/vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1548.474088][ T29] audit: type=1400 audit(1548.390:50543): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.489690][ T29] audit: type=1400 audit(1548.400:50544): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.511216][ T29] audit: type=1400 audit(1548.430:50545): avc: denied { ioctl } for pid=2648 comm="syz.1.15345" path="/dev/vcsa1" dev="devtmpfs" ino=18 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1548.591363][ T29] audit: type=1400 audit(1548.510:50546): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.594765][ T29] audit: type=1400 audit(1548.510:50547): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.607563][ T29] audit: type=1400 audit(1548.520:50548): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.659617][ T29] audit: type=1400 audit(1548.580:50549): avc: denied { read } for pid=2651 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1553.388474][ T2736] netlink: 16 bytes leftover after parsing attributes in process `syz.0.15389'. [ 1553.435150][ T29] kauditd_printk_skb: 181 callbacks suppressed [ 1553.440975][ T29] audit: type=1400 audit(1553.350:50731): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1553.443647][ T29] audit: type=1400 audit(1553.360:50732): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1553.446817][ T29] audit: type=1400 audit(1553.360:50733): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1553.483892][ T29] audit: type=1400 audit(1553.400:50734): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1553.490807][ T29] audit: type=1400 audit(1553.410:50735): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1553.498769][ T29] audit: type=1400 audit(1553.420:50736): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1553.554832][ T29] audit: type=1400 audit(1553.470:50737): avc: denied { read } for pid=2737 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1553.640547][ T29] audit: type=1400 audit(1553.560:50738): avc: denied { read } for pid=2739 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1553.673431][ T29] audit: type=1400 audit(1553.590:50739): avc: denied { create } for pid=2739 comm="syz.1.15391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1553.688984][ T29] audit: type=1400 audit(1553.610:50740): avc: denied { bind } for pid=2739 comm="syz.1.15391" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1558.483445][ T29] kauditd_printk_skb: 83 callbacks suppressed [ 1558.484840][ T29] audit: type=1400 audit(1558.400:50824): avc: denied { read } for pid=2792 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1558.489224][ T29] audit: type=1400 audit(1558.400:50825): avc: denied { read } for pid=2793 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1558.568925][ T29] audit: type=1400 audit(1558.490:50826): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1558.580718][ T29] audit: type=1400 audit(1558.500:50827): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1558.591909][ T29] audit: type=1400 audit(1558.510:50828): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1558.737979][ T29] audit: type=1400 audit(1558.660:50829): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1558.740288][ T29] audit: type=1400 audit(1558.660:50830): avc: denied { read } for pid=2796 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1558.745718][ T29] audit: type=1400 audit(1558.660:50831): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1558.755474][ T29] audit: type=1400 audit(1558.670:50832): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1558.772928][ T29] audit: type=1400 audit(1558.690:50833): avc: denied { read } for pid=2796 comm="syz.1.15411" name="vcs1" dev="devtmpfs" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1559.880086][ T2814] mmap: syz.1.15419 (2814): VmData 29016064 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 1563.824027][ T29] kauditd_printk_skb: 154 callbacks suppressed [ 1563.828030][ T29] audit: type=1400 audit(1563.740:50988): avc: denied { read } for pid=2868 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1563.900258][ T29] audit: type=1400 audit(1563.820:50989): avc: denied { sys_module } for pid=2864 comm="syz.0.15444" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1563.927413][ T29] audit: type=1400 audit(1563.820:50990): avc: denied { module_request } for pid=2864 comm="syz.0.15444" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1564.027425][ T29] audit: type=1400 audit(1563.940:50991): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1564.030600][ T29] audit: type=1400 audit(1563.950:50992): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1564.032516][ T29] audit: type=1400 audit(1563.950:50993): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1564.365662][ T29] audit: type=1400 audit(1564.280:50994): avc: denied { read } for pid=2871 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1564.529286][ T29] audit: type=1400 audit(1564.450:50995): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1564.535489][ T29] audit: type=1400 audit(1564.450:50996): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1564.552915][ T29] audit: type=1400 audit(1564.470:50997): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1568.859679][ T29] kauditd_printk_skb: 115 callbacks suppressed [ 1568.860147][ T29] audit: type=1400 audit(1568.780:51113): avc: denied { read } for pid=2930 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1568.893295][ T29] audit: type=1400 audit(1568.810:51114): avc: denied { read } for pid=2931 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1568.987016][ T29] audit: type=1400 audit(1568.900:51115): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1568.987483][ T29] audit: type=1400 audit(1568.900:51116): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1569.010214][ T29] audit: type=1400 audit(1568.910:51117): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1569.085861][ T29] audit: type=1400 audit(1569.000:51118): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1569.090509][ T29] audit: type=1400 audit(1569.010:51119): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1569.101190][ T29] audit: type=1400 audit(1569.020:51120): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1569.162025][ T29] audit: type=1400 audit(1569.080:51121): avc: denied { read } for pid=2934 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1569.261733][ T29] audit: type=1400 audit(1569.180:51122): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1573.866936][ T29] kauditd_printk_skb: 149 callbacks suppressed [ 1573.867472][ T29] audit: type=1400 audit(1573.780:51272): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1573.874075][ T29] audit: type=1400 audit(1573.790:51273): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1573.908912][ T29] audit: type=1400 audit(1573.820:51274): avc: denied { ioctl } for pid=3009 comm="syz.0.15508" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x941f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1574.022665][ T29] audit: type=1400 audit(1573.940:51275): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1574.023047][ T29] audit: type=1400 audit(1573.940:51276): avc: denied { read } for pid=3012 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1574.030859][ T29] audit: type=1400 audit(1573.950:51277): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1574.047623][ T29] audit: type=1400 audit(1573.960:51278): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1574.080970][ T29] audit: type=1400 audit(1574.000:51279): avc: denied { read } for pid=3012 comm="syz.1.15509" dev="nsfs" ino=4026532716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1574.092674][ T29] audit: type=1400 audit(1574.010:51280): avc: denied { read open } for pid=3012 comm="syz.1.15509" path="net:[4026532716]" dev="nsfs" ino=4026532716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1574.113672][ T29] audit: type=1400 audit(1574.030:51281): avc: denied { create } for pid=3012 comm="syz.1.15509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1574.371418][ T3017] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3017 comm=syz.1.15511 [ 1575.100553][ T3027] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1795 sclass=netlink_tcpdiag_socket pid=3027 comm=syz.1.15516 [ 1578.907208][ T29] kauditd_printk_skb: 130 callbacks suppressed [ 1578.909775][ T29] audit: type=1400 audit(1578.820:51412): avc: denied { read } for pid=3091 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1578.995483][ T29] audit: type=1400 audit(1578.910:51413): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1579.007732][ T29] audit: type=1400 audit(1578.930:51414): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1579.011000][ T29] audit: type=1400 audit(1578.930:51415): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1579.150343][ T29] audit: type=1400 audit(1579.070:51416): avc: denied { read } for pid=3097 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1579.224817][ T29] audit: type=1400 audit(1579.140:51417): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1579.229526][ T29] audit: type=1400 audit(1579.140:51418): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1579.257560][ T29] audit: type=1400 audit(1579.170:51419): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1579.301826][ T29] audit: type=1400 audit(1579.220:51420): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1579.304565][ T29] audit: type=1400 audit(1579.220:51421): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1583.388770][ T3157] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3157 comm=syz.0.15569 [ 1583.924887][ T29] kauditd_printk_skb: 148 callbacks suppressed [ 1583.925207][ T29] audit: type=1400 audit(1583.840:51570): avc: denied { read } for pid=3167 comm="syz.1.15575" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1583.944617][ T29] audit: type=1400 audit(1583.860:51571): avc: denied { read open } for pid=3167 comm="syz.1.15575" path="/dev/vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1583.983889][ T29] audit: type=1400 audit(1583.900:51572): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1583.988330][ T29] audit: type=1400 audit(1583.910:51573): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1583.991511][ T29] audit: type=1400 audit(1583.910:51574): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1584.040884][ T29] audit: type=1400 audit(1583.960:51575): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1584.044812][ T29] audit: type=1400 audit(1583.960:51576): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1584.055744][ T29] audit: type=1400 audit(1583.970:51577): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1584.094239][ T29] audit: type=1400 audit(1584.010:51578): avc: denied { read } for pid=3171 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1584.182691][ T29] audit: type=1400 audit(1584.100:51579): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1584.938857][ T3187] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3187 comm=syz.0.15582 [ 1589.089301][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 1589.091057][ T29] audit: type=1400 audit(1589.010:51740): avc: denied { read } for pid=3248 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1589.188231][ T29] audit: type=1400 audit(1589.110:51741): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.191813][ T29] audit: type=1400 audit(1589.110:51742): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.197523][ T29] audit: type=1400 audit(1589.110:51743): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.343380][ T29] audit: type=1400 audit(1589.260:51744): avc: denied { read } for pid=3251 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1589.419241][ T29] audit: type=1400 audit(1589.340:51745): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.423024][ T29] audit: type=1400 audit(1589.340:51746): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.432882][ T29] audit: type=1400 audit(1589.350:51747): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.560278][ T29] audit: type=1400 audit(1589.480:51748): avc: denied { read } for pid=3253 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1589.651403][ T29] audit: type=1400 audit(1589.570:51749): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1594.197598][ T29] kauditd_printk_skb: 149 callbacks suppressed [ 1594.198008][ T29] audit: type=1400 audit(1594.110:51899): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1594.206847][ T29] audit: type=1400 audit(1594.110:51900): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1594.209822][ T29] audit: type=1400 audit(1594.120:51901): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1594.243790][ T29] audit: type=1400 audit(1594.160:51902): avc: denied { read } for pid=3324 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1594.273450][ T29] audit: type=1400 audit(1594.190:51903): avc: denied { write } for pid=3324 comm="syz.0.15649" name="dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1594.287975][ T29] audit: type=1400 audit(1594.190:51904): avc: denied { write open } for pid=3324 comm="syz.0.15649" path="/dev/dlm_plock" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1594.303234][ T29] audit: type=1400 audit(1594.220:51905): avc: denied { ioctl } for pid=3324 comm="syz.0.15649" path="/dev/dlm_plock" dev="devtmpfs" ino=87 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1594.378241][ T29] audit: type=1400 audit(1594.300:51906): avc: denied { read } for pid=3326 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1594.405608][ T29] audit: type=1400 audit(1594.320:51907): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1594.418159][ T29] audit: type=1400 audit(1594.340:51908): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1599.213788][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 1599.214185][ T29] audit: type=1400 audit(1599.130:52070): avc: denied { read } for pid=3396 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1599.245882][ T29] audit: type=1400 audit(1599.160:52071): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1599.258071][ T29] audit: type=1400 audit(1599.170:52072): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1599.258558][ T29] audit: type=1400 audit(1599.170:52073): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1599.315403][ T29] audit: type=1400 audit(1599.230:52074): avc: denied { create } for pid=3396 comm="syz.0.15685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1599.438230][ T29] audit: type=1400 audit(1599.360:52075): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1599.442582][ T29] audit: type=1400 audit(1599.360:52076): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1599.451877][ T29] audit: type=1400 audit(1599.370:52077): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1599.465568][ T29] audit: type=1400 audit(1599.380:52078): avc: denied { read } for pid=3398 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1599.574870][ T29] audit: type=1400 audit(1599.490:52079): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1600.554593][ T3415] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3415 comm=syz.0.15694 [ 1604.229980][ T29] kauditd_printk_skb: 166 callbacks suppressed [ 1604.234536][ T29] audit: type=1400 audit(1604.150:52246): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1604.234866][ T29] audit: type=1400 audit(1604.150:52247): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1604.235058][ T29] audit: type=1400 audit(1604.150:52248): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1604.271991][ T29] audit: type=1400 audit(1604.190:52249): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1604.277463][ T29] audit: type=1400 audit(1604.190:52250): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1604.280542][ T29] audit: type=1400 audit(1604.200:52251): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1604.343107][ T29] audit: type=1400 audit(1604.260:52252): avc: denied { read } for pid=3478 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1604.361269][ T29] audit: type=1400 audit(1604.280:52253): avc: denied { read } for pid=3479 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1604.380913][ T29] audit: type=1400 audit(1604.300:52254): avc: denied { read } for pid=3479 comm="syz.0.15727" name="controlC1" dev="devtmpfs" ino=736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1604.382192][ T29] audit: type=1400 audit(1604.300:52255): avc: denied { read open } for pid=3479 comm="syz.0.15727" path="/dev/snd/controlC1" dev="devtmpfs" ino=736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1607.552150][ T3534] random: crng reseeded on system resumption [ 1609.277170][ T29] kauditd_printk_skb: 178 callbacks suppressed [ 1609.277604][ T29] audit: type=1400 audit(1609.190:52434): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1609.292980][ T29] audit: type=1400 audit(1609.210:52435): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1609.313315][ T29] audit: type=1400 audit(1609.230:52436): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1609.361957][ T29] audit: type=1400 audit(1609.280:52437): avc: denied { read } for pid=3564 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1609.494443][ T29] audit: type=1400 audit(1609.410:52438): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1609.507244][ T29] audit: type=1400 audit(1609.420:52439): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1609.507684][ T29] audit: type=1400 audit(1609.420:52440): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1609.566798][ T29] audit: type=1400 audit(1609.490:52441): avc: denied { read } for pid=3566 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1609.631313][ T29] audit: type=1400 audit(1609.550:52442): avc: denied { read } for pid=3567 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1609.670392][ T29] audit: type=1400 audit(1609.590:52443): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1612.065007][ T3608] TCP: TCP_TX_DELAY enabled [ 1614.292211][ T29] kauditd_printk_skb: 167 callbacks suppressed [ 1614.292674][ T29] audit: type=1400 audit(1614.210:52611): avc: denied { read } for pid=3654 comm="syz.1.15808" name="fb1" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1614.299404][ T29] audit: type=1400 audit(1614.220:52612): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1614.318999][ T29] audit: type=1400 audit(1614.240:52613): avc: denied { read open } for pid=3654 comm="syz.1.15808" path="/dev/fb1" dev="devtmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1614.326939][ T29] audit: type=1400 audit(1614.240:52614): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1614.330081][ T29] audit: type=1400 audit(1614.250:52615): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1614.428106][ T29] audit: type=1400 audit(1614.350:52616): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1614.430284][ T29] audit: type=1400 audit(1614.350:52617): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1614.439799][ T29] audit: type=1400 audit(1614.350:52618): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1614.491985][ T29] audit: type=1400 audit(1614.410:52619): avc: denied { read } for pid=3657 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1614.520712][ T29] audit: type=1400 audit(1614.440:52620): avc: denied { create } for pid=3657 comm="syz.0.15809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1619.341902][ T29] kauditd_printk_skb: 169 callbacks suppressed [ 1619.342203][ T29] audit: type=1400 audit(1619.260:52790): avc: denied { read } for pid=3732 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1619.439089][ T29] audit: type=1400 audit(1619.360:52791): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1619.440608][ T29] audit: type=1400 audit(1619.360:52792): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1619.442278][ T29] audit: type=1400 audit(1619.360:52793): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1619.478641][ T29] audit: type=1400 audit(1619.390:52794): avc: denied { read } for pid=3734 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1619.514015][ T29] audit: type=1400 audit(1619.430:52795): avc: denied { read write } for pid=3734 comm="syz.1.15847" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:insmod_exec_t:s0" [ 1619.553857][ T29] audit: type=1400 audit(1619.460:52796): avc: denied { read write open } for pid=3734 comm="syz.1.15847" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:insmod_exec_t:s0" [ 1619.554079][ T29] audit: type=1400 audit(1619.470:52797): avc: denied { ioctl } for pid=3734 comm="syz.1.15847" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0x9439 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:insmod_exec_t:s0" [ 1619.618367][ T29] audit: type=1400 audit(1619.540:52798): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1619.621020][ T29] audit: type=1400 audit(1619.540:52799): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1624.468600][ T29] kauditd_printk_skb: 185 callbacks suppressed [ 1624.468962][ T29] audit: type=1400 audit(1624.390:52985): avc: denied { read } for pid=3817 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1624.494375][ T29] audit: type=1400 audit(1624.410:52986): avc: denied { read } for pid=3818 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1624.617034][ T29] audit: type=1400 audit(1624.540:52987): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1624.622729][ T29] audit: type=1400 audit(1624.540:52988): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1624.630147][ T29] audit: type=1400 audit(1624.550:52989): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1624.633983][ T29] audit: type=1400 audit(1624.550:52990): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1624.648635][ T29] audit: type=1400 audit(1624.570:52991): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1624.656927][ T29] audit: type=1400 audit(1624.570:52992): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1624.791428][ T29] audit: type=1400 audit(1624.710:52993): avc: denied { read } for pid=3821 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1624.871091][ T29] audit: type=1400 audit(1624.790:52994): avc: denied { read } for pid=3822 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1625.299447][ T3830] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5127 sclass=netlink_route_socket pid=3830 comm=syz.0.15894 [ 1626.092886][ T3845] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3845 comm=syz.1.15902 [ 1629.482852][ T29] kauditd_printk_skb: 163 callbacks suppressed [ 1629.483406][ T29] audit: type=1400 audit(1629.400:53158): avc: denied { read } for pid=3899 comm="syz.0.15929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1629.560788][ T29] audit: type=1400 audit(1629.480:53159): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1629.567186][ T29] audit: type=1400 audit(1629.480:53160): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1629.573240][ T29] audit: type=1400 audit(1629.490:53161): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1629.628279][ T29] audit: type=1400 audit(1629.550:53162): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1629.630888][ T29] audit: type=1400 audit(1629.550:53163): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1629.641181][ T29] audit: type=1400 audit(1629.560:53164): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1629.760386][ T29] audit: type=1400 audit(1629.680:53165): avc: denied { read } for pid=3902 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1629.804488][ T29] audit: type=1400 audit(1629.720:53166): avc: denied { read write } for pid=3902 comm="syz.1.15930" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1629.810943][ T29] audit: type=1400 audit(1629.730:53167): avc: denied { read write open } for pid=3902 comm="syz.1.15930" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1634.534889][ T29] kauditd_printk_skb: 187 callbacks suppressed [ 1634.535251][ T29] audit: type=1400 audit(1634.450:53355): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.538970][ T29] audit: type=1400 audit(1634.450:53356): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.539345][ T29] audit: type=1400 audit(1634.460:53357): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.577158][ T29] audit: type=1400 audit(1634.490:53358): avc: denied { read } for pid=3995 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1634.629639][ T29] audit: type=1400 audit(1634.550:53359): avc: denied { read } for pid=3996 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1634.696413][ T29] audit: type=1400 audit(1634.610:53360): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.698142][ T29] audit: type=1400 audit(1634.620:53361): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.706321][ T29] audit: type=1400 audit(1634.620:53362): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.707825][ T29] audit: type=1400 audit(1634.620:53363): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.709946][ T29] audit: type=1400 audit(1634.620:53364): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1639.585657][ T29] kauditd_printk_skb: 169 callbacks suppressed [ 1639.587274][ T29] audit: type=1400 audit(1639.500:53534): avc: denied { read } for pid=4080 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1639.626609][ T29] audit: type=1400 audit(1639.540:53535): avc: denied { read } for pid=4080 comm="syz.1.16014" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1639.646638][ T29] audit: type=1400 audit(1639.560:53536): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1639.646907][ T29] audit: type=1400 audit(1639.560:53537): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1639.647121][ T29] audit: type=1400 audit(1639.560:53538): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1639.660062][ T29] audit: type=1400 audit(1639.580:53539): avc: denied { read open } for pid=4080 comm="syz.1.16014" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1639.679726][ T29] audit: type=1400 audit(1639.600:53540): avc: denied { ioctl } for pid=4080 comm="syz.1.16014" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x4dfb scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1639.743267][ T29] audit: type=1400 audit(1639.660:53541): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1639.753012][ T29] audit: type=1400 audit(1639.670:53542): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1639.773626][ T29] audit: type=1400 audit(1639.690:53543): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1644.651547][ T29] kauditd_printk_skb: 159 callbacks suppressed [ 1644.651838][ T29] audit: type=1400 audit(1644.570:53703): avc: denied { read } for pid=4160 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1644.710726][ T29] audit: type=1400 audit(1644.630:53704): avc: denied { read } for pid=4161 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1644.743555][ T29] audit: type=1400 audit(1644.660:53705): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1644.750398][ T29] audit: type=1400 audit(1644.660:53706): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1644.761539][ T29] audit: type=1400 audit(1644.680:53707): avc: denied { write } for pid=4161 comm="syz.1.16054" name="rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1644.770064][ T29] audit: type=1400 audit(1644.690:53708): avc: denied { write open } for pid=4161 comm="syz.1.16054" path="/dev/rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1644.777682][ T29] audit: type=1400 audit(1644.700:53709): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1644.822903][ T29] audit: type=1400 audit(1644.710:53710): avc: denied { setattr } for pid=4161 comm="syz.1.16054" name="rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1644.879557][ T29] audit: type=1400 audit(1644.800:53711): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1644.881780][ T29] audit: type=1400 audit(1644.800:53712): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.679678][ T29] kauditd_printk_skb: 150 callbacks suppressed [ 1649.680374][ T29] audit: type=1400 audit(1649.600:53863): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.683520][ T29] audit: type=1400 audit(1649.600:53864): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.686695][ T29] audit: type=1400 audit(1649.610:53865): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.752514][ T29] audit: type=1400 audit(1649.670:53866): avc: denied { read } for pid=4232 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1649.831740][ T29] audit: type=1400 audit(1649.750:53867): avc: denied { read } for pid=4233 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1649.894926][ T29] audit: type=1400 audit(1649.810:53868): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.906726][ T29] audit: type=1400 audit(1649.820:53869): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.915006][ T29] audit: type=1400 audit(1649.830:53870): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.953340][ T29] audit: type=1400 audit(1649.870:53871): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1649.962060][ T29] audit: type=1400 audit(1649.880:53872): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1654.744403][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 1654.744861][ T29] audit: type=1400 audit(1654.660:53955): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1654.767203][ T29] audit: type=1400 audit(1654.680:53956): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1654.772013][ T29] audit: type=1400 audit(1654.690:53957): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1654.799481][ T29] audit: type=1400 audit(1654.710:53958): avc: denied { read } for pid=4273 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1654.820590][ T29] audit: type=1400 audit(1654.740:53959): avc: denied { read } for pid=4273 comm="syz.1.16110" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1654.826964][ T29] audit: type=1400 audit(1654.740:53960): avc: denied { read open } for pid=4273 comm="syz.1.16110" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1654.832798][ T29] audit: type=1400 audit(1654.750:53961): avc: denied { ioctl } for pid=4273 comm="syz.1.16110" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1654.877009][ T29] audit: type=1400 audit(1654.790:53962): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1654.877481][ T29] audit: type=1400 audit(1654.790:53963): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1654.879933][ T29] audit: type=1400 audit(1654.800:53964): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1656.990204][ T4309] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4309 comm=syz.1.16127 [ 1659.288963][ T4342] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4342 comm=syz.1.16144 [ 1659.781497][ T29] kauditd_printk_skb: 157 callbacks suppressed [ 1659.781788][ T29] audit: type=1400 audit(1659.700:54122): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1659.789655][ T29] audit: type=1400 audit(1659.700:54123): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1659.805015][ T29] audit: type=1400 audit(1659.720:54125): avc: denied { read } for pid=4349 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1659.809470][ T29] audit: type=1400 audit(1659.720:54124): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1659.965722][ T29] audit: type=1400 audit(1659.880:54126): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1659.973367][ T29] audit: type=1400 audit(1659.890:54127): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1659.993205][ T29] audit: type=1400 audit(1659.910:54128): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1660.035223][ T29] audit: type=1400 audit(1659.950:54129): avc: denied { read } for pid=4351 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1660.161473][ T29] audit: type=1400 audit(1660.080:54130): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1660.165465][ T29] audit: type=1400 audit(1660.080:54131): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1664.842596][ T29] kauditd_printk_skb: 157 callbacks suppressed [ 1664.842989][ T29] audit: type=1400 audit(1664.760:54289): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1664.860812][ T29] audit: type=1400 audit(1664.770:54291): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1664.861217][ T29] audit: type=1400 audit(1664.760:54290): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1664.861427][ T29] audit: type=1400 audit(1664.780:54292): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1664.862182][ T29] audit: type=1400 audit(1664.780:54293): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1664.871720][ T29] audit: type=1400 audit(1664.780:54294): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1665.060822][ T29] audit: type=1400 audit(1664.980:54295): avc: denied { read } for pid=4427 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1665.091886][ T29] audit: type=1400 audit(1665.010:54296): avc: denied { read } for pid=4428 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1665.197333][ T29] audit: type=1400 audit(1665.100:54297): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1665.197843][ T29] audit: type=1400 audit(1665.100:54298): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1669.873018][ T29] kauditd_printk_skb: 168 callbacks suppressed [ 1669.873532][ T29] audit: type=1400 audit(1669.790:54467): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1669.881793][ T29] audit: type=1400 audit(1669.800:54468): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1669.882445][ T29] audit: type=1400 audit(1669.800:54469): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1669.964408][ T29] audit: type=1400 audit(1669.880:54470): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1669.971519][ T29] audit: type=1400 audit(1669.890:54471): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1669.980951][ T29] audit: type=1400 audit(1669.890:54472): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1670.056978][ T29] audit: type=1400 audit(1669.980:54473): avc: denied { read } for pid=4502 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1670.061054][ T29] audit: type=1400 audit(1669.980:54474): avc: denied { read } for pid=4501 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1670.122947][ T29] audit: type=1400 audit(1670.040:54475): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1670.124547][ T29] audit: type=1400 audit(1670.040:54476): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1674.914546][ T29] kauditd_printk_skb: 157 callbacks suppressed [ 1674.914913][ T29] audit: type=1400 audit(1674.830:54634): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1674.924312][ T29] audit: type=1400 audit(1674.840:54635): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1674.930554][ T29] audit: type=1400 audit(1674.850:54636): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1674.977056][ T29] audit: type=1400 audit(1674.890:54637): avc: denied { read } for pid=4578 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1675.035865][ T29] audit: type=1400 audit(1674.950:54638): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1675.039330][ T29] audit: type=1400 audit(1674.960:54639): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1675.046748][ T29] audit: type=1400 audit(1674.960:54640): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1675.134298][ T29] audit: type=1400 audit(1675.050:54641): avc: denied { read } for pid=4580 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1675.181249][ T29] audit: type=1400 audit(1675.090:54642): avc: denied { read } for pid=4580 comm="syz.0.16264" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1675.181732][ T29] audit: type=1400 audit(1675.100:54643): avc: denied { read open } for pid=4580 comm="syz.0.16264" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1676.494784][ T4599] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4599 comm=syz.0.16272 [ 1679.587754][ T4649] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4649 comm=syz.1.16298 [ 1679.957198][ T29] kauditd_printk_skb: 166 callbacks suppressed [ 1679.957539][ T29] audit: type=1400 audit(1679.880:54810): avc: denied { read } for pid=4654 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1680.033449][ T29] audit: type=1400 audit(1679.950:54811): avc: denied { read } for pid=4655 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1680.120605][ T29] audit: type=1400 audit(1680.040:54812): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1680.125582][ T29] audit: type=1400 audit(1680.040:54813): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1680.131690][ T29] audit: type=1400 audit(1680.050:54815): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1680.136862][ T29] audit: type=1400 audit(1680.040:54814): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1680.143713][ T29] audit: type=1400 audit(1680.060:54816): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1680.158257][ T29] audit: type=1400 audit(1680.070:54817): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1680.287241][ T29] audit: type=1400 audit(1680.200:54818): avc: denied { read } for pid=4658 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1680.372293][ T29] audit: type=1400 audit(1680.290:54819): avc: denied { read } for pid=4659 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1681.073154][ T4668] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=27 sclass=netlink_tcpdiag_socket pid=4668 comm=syz.1.16306 [ 1684.969082][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 1684.969530][ T29] audit: type=1400 audit(1684.890:54947): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1684.977379][ T29] audit: type=1400 audit(1684.890:54948): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1684.986811][ T29] audit: type=1400 audit(1684.900:54949): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1685.035569][ T29] audit: type=1400 audit(1684.950:54950): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1685.050056][ T29] audit: type=1400 audit(1684.970:54951): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1685.053443][ T29] audit: type=1400 audit(1684.970:54952): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1685.163402][ T29] audit: type=1400 audit(1685.080:54953): avc: denied { read } for pid=4722 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1685.199684][ T29] audit: type=1400 audit(1685.120:54954): avc: denied { read } for pid=4723 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1685.232311][ T29] audit: type=1400 audit(1685.150:54955): avc: denied { read } for pid=4723 comm="syz.1.16334" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1685.243423][ T29] audit: type=1400 audit(1685.160:54956): avc: denied { read open } for pid=4723 comm="syz.1.16334" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1689.987659][ T29] kauditd_printk_skb: 162 callbacks suppressed [ 1689.987927][ T29] audit: type=1400 audit(1689.910:55119): avc: denied { read } for pid=4796 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1690.039513][ T29] audit: type=1400 audit(1689.960:55120): avc: denied { read } for pid=4797 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1690.116912][ T29] audit: type=1400 audit(1690.020:55121): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1690.117189][ T29] audit: type=1400 audit(1690.030:55122): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1690.117399][ T29] audit: type=1400 audit(1690.030:55123): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1690.181125][ T29] audit: type=1400 audit(1690.100:55124): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1690.184036][ T29] audit: type=1400 audit(1690.100:55125): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1690.192595][ T29] audit: type=1400 audit(1690.110:55126): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1690.263713][ T29] audit: type=1400 audit(1690.180:55127): avc: denied { read } for pid=4800 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1690.310862][ T29] audit: type=1400 audit(1690.230:55128): avc: denied { read } for pid=4801 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1695.005221][ T29] kauditd_printk_skb: 256 callbacks suppressed [ 1695.005629][ T29] audit: type=1400 audit(1694.920:55385): avc: denied { search } for pid=4852 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1695.005864][ T29] audit: type=1400 audit(1694.920:55386): avc: denied { search } for pid=4852 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1695.006700][ T29] audit: type=1400 audit(1694.920:55387): avc: denied { search } for pid=4852 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1695.069123][ T29] audit: type=1400 audit(1694.990:55388): avc: denied { read } for pid=4854 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1695.117430][ T29] audit: type=1400 audit(1695.030:55389): avc: denied { search } for pid=4825 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1695.190072][ T29] audit: type=1400 audit(1695.110:55390): avc: denied { read } for pid=4856 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1695.232996][ T29] audit: type=1400 audit(1695.150:55391): avc: denied { read } for pid=4856 comm="syz.0.16397" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1695.242790][ T29] audit: type=1400 audit(1695.160:55392): avc: denied { read open } for pid=4856 comm="syz.0.16397" path="/dev/random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1695.254284][ T29] audit: type=1400 audit(1695.170:55393): avc: denied { ioctl } for pid=4856 comm="syz.0.16397" path="/dev/random" dev="devtmpfs" ino=7 ioctlcmd=0x5207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1695.260333][ T29] audit: type=1400 audit(1695.180:55394): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1700.072631][ T29] kauditd_printk_skb: 151 callbacks suppressed [ 1700.073144][ T29] audit: type=1400 audit(1699.990:55546): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1700.092528][ T29] audit: type=1400 audit(1700.010:55547): avc: denied { read write open } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1700.104068][ T29] audit: type=1400 audit(1700.020:55548): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1700.171535][ T29] audit: type=1400 audit(1700.090:55549): avc: denied { read } for pid=4931 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1700.191747][ T29] audit: type=1400 audit(1700.110:55550): avc: denied { create } for pid=4931 comm="syz.1.16434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1700.248352][ T29] audit: type=1400 audit(1700.170:55551): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1700.254196][ T29] audit: type=1400 audit(1700.170:55552): avc: denied { read write open } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1700.261138][ T29] audit: type=1400 audit(1700.180:55553): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1700.277769][ T29] audit: type=1400 audit(1700.200:55554): avc: denied { read } for pid=4933 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1700.347568][ T29] audit: type=1400 audit(1700.270:55555): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1703.102078][ T4014] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1703.114681][ T4014] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1703.121082][ T4014] bond0 (unregistering): Released all slaves [ 1703.197094][ T4014] hsr_slave_0: left promiscuous mode [ 1703.200455][ T4014] hsr_slave_1: left promiscuous mode [ 1703.893579][ T4014] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1703.960286][ T4014] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1704.008224][ T4014] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1704.079188][ T4014] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1704.313514][ T4014] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1704.323246][ T4014] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1704.332998][ T4014] bond0 (unregistering): Released all slaves [ 1704.415644][ T4014] hsr_slave_0: left promiscuous mode [ 1704.420407][ T4014] hsr_slave_1: left promiscuous mode [ 1704.431085][ T4014] veth0_macvtap: left promiscuous mode [ 1704.431953][ T4014] veth1_vlan: left promiscuous mode [ 1704.432672][ T4014] veth0_vlan: left promiscuous mode [ 1705.087261][ T29] kauditd_printk_skb: 146 callbacks suppressed [ 1705.087761][ T29] audit: type=1400 audit(1705.000:55702): avc: denied { search } for pid=5005 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1705.093234][ T29] audit: type=1400 audit(1705.010:55703): avc: denied { write } for pid=5005 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1705.254613][ T29] audit: type=1400 audit(1705.170:55704): avc: denied { search } for pid=5006 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1705.261098][ T29] audit: type=1400 audit(1705.180:55705): avc: denied { write } for pid=5006 comm="chmod" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1705.455305][ T29] audit: type=1400 audit(1705.370:55706): avc: denied { search } for pid=5007 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1705.461210][ T29] audit: type=1400 audit(1705.380:55707): avc: denied { write } for pid=5007 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1705.500587][ T29] audit: type=1400 audit(1705.420:55708): avc: denied { search } for pid=4989 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1706.064587][ T29] audit: type=1400 audit(1705.980:55709): avc: denied { write } for pid=5009 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1706.073299][ T29] audit: type=1400 audit(1705.980:55710): avc: denied { write } for pid=5009 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1706.076941][ T29] audit: type=1400 audit(1705.990:55711): avc: denied { write } for pid=5009 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1710.219303][ T29] kauditd_printk_skb: 159 callbacks suppressed [ 1710.219797][ T29] audit: type=1400 audit(1710.140:55871): avc: denied { write } for pid=5026 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1710.220127][ T29] audit: type=1400 audit(1710.140:55872): avc: denied { write } for pid=5026 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1710.224834][ T29] audit: type=1400 audit(1710.140:55873): avc: denied { write } for pid=5026 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1710.229477][ T29] audit: type=1400 audit(1710.140:55874): avc: denied { write } for pid=5026 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1710.231791][ T29] audit: type=1400 audit(1710.150:55875): avc: denied { write } for pid=5026 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1710.233795][ T29] audit: type=1400 audit(1710.150:55876): avc: denied { write } for pid=5026 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1710.247880][ T29] audit: type=1400 audit(1710.170:55877): avc: denied { search } for pid=5026 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1710.293154][ T29] audit: type=1400 audit(1710.210:55878): avc: denied { search } for pid=5027 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1710.300193][ T29] audit: type=1400 audit(1710.220:55879): avc: denied { search } for pid=5027 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1710.310049][ T29] audit: type=1400 audit(1710.230:55880): avc: denied { search } for pid=5027 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1715.257346][ T29] kauditd_printk_skb: 239 callbacks suppressed [ 1715.258617][ T29] audit: type=1400 audit(1715.180:56120): avc: denied { write } for pid=5050 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1715.261157][ T29] audit: type=1400 audit(1715.180:56121): avc: denied { write } for pid=5050 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1715.263501][ T29] audit: type=1400 audit(1715.180:56122): avc: denied { write } for pid=5050 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1715.265837][ T29] audit: type=1400 audit(1715.180:56123): avc: denied { write } for pid=5050 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1715.268793][ T29] audit: type=1400 audit(1715.180:56124): avc: denied { write } for pid=5050 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1715.270889][ T29] audit: type=1400 audit(1715.180:56125): avc: denied { write } for pid=5050 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1715.281932][ T29] audit: type=1400 audit(1715.200:56126): avc: denied { search } for pid=5050 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1715.314932][ T29] audit: type=1400 audit(1715.230:56127): avc: denied { search } for pid=5051 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1715.322562][ T29] audit: type=1400 audit(1715.240:56128): avc: denied { search } for pid=5051 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1715.334462][ T29] audit: type=1400 audit(1715.250:56129): avc: denied { search } for pid=5051 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1720.464570][ T29] kauditd_printk_skb: 202 callbacks suppressed [ 1720.465135][ T29] audit: type=1400 audit(1720.380:56332): avc: denied { write } for pid=5074 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1720.465555][ T29] audit: type=1400 audit(1720.380:56333): avc: denied { write } for pid=5074 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1720.479285][ T29] audit: type=1400 audit(1720.380:56334): avc: denied { write } for pid=5074 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1720.479894][ T29] audit: type=1400 audit(1720.400:56335): avc: denied { write } for pid=5074 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1720.484076][ T29] audit: type=1400 audit(1720.400:56336): avc: denied { write } for pid=5074 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1720.484522][ T29] audit: type=1400 audit(1720.400:56337): avc: denied { write } for pid=5074 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1730.049076][ T29] audit: type=1400 audit(1729.970:56338): avc: denied { write } for pid=5088 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1730.051551][ T29] audit: type=1400 audit(1729.970:56339): avc: denied { write } for pid=5088 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1730.058326][ T29] audit: type=1400 audit(1729.970:56340): avc: denied { write } for pid=5088 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1730.066676][ T29] audit: type=1400 audit(1729.970:56341): avc: denied { write } for pid=5088 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1730.067156][ T29] audit: type=1400 audit(1729.970:56342): avc: denied { write } for pid=5088 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1730.067362][ T29] audit: type=1400 audit(1729.970:56343): avc: denied { write } for pid=5088 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1730.075954][ T29] audit: type=1400 audit(1729.990:56344): avc: denied { search } for pid=5088 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1730.107183][ T29] audit: type=1400 audit(1730.030:56345): avc: denied { search } for pid=5089 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1730.110835][ T29] audit: type=1400 audit(1730.030:56346): avc: denied { search } for pid=5089 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1730.116707][ T29] audit: type=1400 audit(1730.030:56347): avc: denied { search } for pid=5089 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1735.057077][ T29] kauditd_printk_skb: 317 callbacks suppressed [ 1735.057339][ T29] audit: type=1400 audit(1734.970:56665): avc: denied { search } for pid=5113 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1735.057512][ T29] audit: type=1400 audit(1734.970:56666): avc: denied { write } for pid=5113 comm="chmod" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1735.176569][ T29] audit: type=1400 audit(1735.090:56667): avc: denied { search } for pid=5114 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1735.178726][ T29] audit: type=1400 audit(1735.100:56668): avc: denied { write } for pid=5114 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1735.254978][ T29] audit: type=1400 audit(1735.170:56669): avc: denied { search } for pid=5109 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1735.543677][ T29] audit: type=1400 audit(1735.460:56670): avc: denied { write } for pid=5116 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1735.544207][ T29] audit: type=1400 audit(1735.460:56671): avc: denied { write } for pid=5116 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1735.544528][ T29] audit: type=1400 audit(1735.460:56672): avc: denied { write } for pid=5116 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1735.554200][ T29] audit: type=1400 audit(1735.470:56673): avc: denied { write } for pid=5116 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1735.554789][ T29] audit: type=1400 audit(1735.470:56674): avc: denied { write } for pid=5116 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1740.225333][ T29] kauditd_printk_skb: 287 callbacks suppressed [ 1740.227163][ T29] audit: type=1400 audit(1740.140:56962): avc: denied { getattr } for pid=5139 comm="mkdir" path="/run" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1740.239836][ T29] audit: type=1400 audit(1740.160:56963): avc: denied { write } for pid=5139 comm="mkdir" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1740.252137][ T29] audit: type=1400 audit(1740.170:56964): avc: denied { search } for pid=5137 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1740.256507][ T29] audit: type=1400 audit(1740.170:56965): avc: denied { write } for pid=5137 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1740.257853][ T29] audit: type=1400 audit(1740.170:56966): avc: denied { write } for pid=5137 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1740.258969][ T29] audit: type=1400 audit(1740.170:56967): avc: denied { write } for pid=5137 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1740.260879][ T29] audit: type=1400 audit(1740.180:56968): avc: denied { write } for pid=5137 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1740.262907][ T29] audit: type=1400 audit(1740.180:56969): avc: denied { write } for pid=5137 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1740.269100][ T29] audit: type=1400 audit(1740.190:56970): avc: denied { search } for pid=5137 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 1740.271294][ T29] audit: type=1400 audit(1740.190:56971): avc: denied { write } for pid=5137 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0