last executing test programs: 4.817228269s ago: executing program 0 (id=474): r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 4.317061603s ago: executing program 0 (id=475): futex(&(0x7f000000cffc)=0x4, 0x109, 0x4, 0x0, 0x0, 0x1) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0x58) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) creat(0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) read$FUSE(r2, &(0x7f0000000200)={0x2020}, 0x2020) syz_fuse_handle_req(r2, &(0x7f0000007080)="f5201a6b6542be6cbad26e239346ffe3dbc7125e4eb0daba2e9ba73337e45b1a2c2828afbe1d99c856f2d7c9b91364a83e3c477d5e9569cf8787de2fd830003be5c3bbb4a246c4e13764c6e255ef511c263c70adb80380cc2b3247fb61ebddd2b945820fc646375953f1322be813b875bf64256ac7a8debe881f8352dc9fd70b9473bf07932110a5d1a94144b2ab0b4cd92458041eef085b29b5c115df0d7db2bea67006c66b64015fc980343e5ff451373afc63f2ae21d63cddeb3b0c53bbb4e0e31663f5b1b53de22517869df6114ac9047ee98a692b4f0e3e7cfc4e42368f217cc705f2bc5d10454ab30eda651c6ee29f0cc5a6ca7b384949955785844742121b5734a8cf3f3fe1d3e5c2085da26a028ba6c84d5cbce6afbe13cbb179d4c251e1d2d68e8c7d9c34eee698ceeb6e40aed55c62c45d8c7fcb2cfe95ce261238ca5c4458647ed7a001788e991e3d2ecfc77bedec164efda9e4a5d5f03043628fd8b5f906371c52e7de2e760b820dce5c3629610a48a036cd54f23ec3ef274f8da724f45c482505864c87359d4411cad79d7434c9a9d79323410b671880a344b933a47d735abd0e63308cf7f6e15790a50ccbcce072526952c763775066125af0fcde57ba3c514301aef17391c76adfc2419829a88e0d91b947d278cd03d94ce98ec639a6163eaa9755b1813685080ce588251fbd4240a7f65cdc1074503b0fe49b24996e52c6899ac90014d9a58566e841bcac357ed59f7e727475be4f7a526a5b420c5d6ababab7e7f8ba6ef6f3455a5aed80f4aaadb58fb38f725d524b4fd63238e07936d62e81ef46bb7346d7f55c4fdbe7606b1053f6faf6d80612311823efe1e6522fd5bbb77c52c868362f263e56ea1447b612d681828561adefdd28fb855fd81f27e2698cc02bbcf7d653cf8dc9eea252f2b1f48c0d2ab70ece454daf9b5829d7106eb8ca8807eebd07d1bf6af6a4523577db893995778759e1be294aea8edb9226a9acbd44f98f60641f87195521491e621b10cc2032434f319e76743601a0bcc99fb3636389172a790e25260de7cb58961f9ad44d16c7604402bbca8cf82be528a64107c0dd114fd3458c471e97888c1c739dc678b43b202c603946cb5720a1e7331282a48afb12b461c41b6fd92b97c6960ac9f664f509b02c8267d722f372b007befada669d4cc36fb931763ffd8744b10e78cb849d40f88d190778a70f902faa4f34cae0b9e163b59b1bae96a933afecbc6a768f1d7ae20bf2771f28c1a3d333ae0b6f691d2f985e1ed6d0e1c29d7db36234b9bec18a1ee98b9ae90e4706d1c952f6059cc4d64bfc14152a88443f260d179c705df71e006a60981fefaa8a51c9c368680b830967b01b60734b9924335d7700b083bd7e87b3ad2f3d497e914368a15c5456d08861fb7513e96acb49935dc3f46fcaa297cdbdc759cb8a5a2515a482ca60440da8b7d5a8c79659d99e3892f9086b372d78622d3689267652c4dd60754cb8eb45028b0c237adff5ffaeaf78ed5a541c57feeb014a53e2a98042d5712d5f7a779b7a12bc120b8cf6df35b258fe1ad7ebdbee88d25355560fad504dce4bd878df5e43c55e765ac324dd8d65ce29c2a93f9e085bb51ff75dbbf314ed6aa3a36330fd146d28654c659f1c6c5089c3619be1c7707be835500fb15bf873ab35517b743207621346db75d16fb21624c04ceddda2d607642004f611db7414e1c593ef38c62e4d27a8b7833436609c284a46edc9b973e790aba0bf4c6bc0069ce9372c6c7b93d15740771ddf9c704338f4af870c649ecdaeab106b1242dbb74c284bfb5d87aa688d27befe1dc0d1019fde1842e89eee67e11f925672ebff47e4503e02fa989297e9468baa6f94b5e0ed2d957efc3b77a10181597c7fb2c94e62db50e46c46d10c1127573bae01166170467b7641d7e07dcd879f04b8dc08dcf460bef8e83aae33151a72eddf9ccac4eb95c48cb4008ba3fea542b2e3c6c4c07850cd4ca551536a20d18ed18852baaaf7339908583aae41f08f3c6f5811cd730e849dc8382e8bdf3519ab900d38a0a9822400d619b52a957b1bbe8384619e5d65588a2ca6bf068ca27fce9aa0448a60d04b3b230db3a939409ec7df45d70a944b34baaf0bf951d205667c8281e9e87468d1a2f6edf79a7d5df12a8564e56d3a952efa4c4be2b09be2c3d699b05268e8cfe998a9f37b8714c92647ada8a8129bc4084624c6f1059f834193deef961f5dbfe500c1bf781f45441984d52800d81d814a82ec4f859c7217146ac447c8462612574a1a8603148ed46bf3e195d417bbe43aa6bf83ea8fb525941ef8dd56149bd6fdcbf626609ddb699e40e83fa4792b39384eb0d1b78c97c6798537b192753caed3a5eaa4a33d54b473b43851cb282cd857ae11a4d34c6b53fc1c334f8ec42672295b88a326b65d338a70bb3d5d866ff55a9ce0345c7a890cd6dee36012c76d862802c9cbaf1abbab99dc898eb432f50474ae6c202121d19f8d0467fcb1279457accf9b777c75390756762dde795d94aaba4c1729f559adc33966fbf517fc91fae21bd8ef22e914bbe6bae774246749ad63d8d16f21c9aebc80a97be408443ae60af610dd3ad9964b2401e049b09dbb46f6126d3d534a7786bb3663719943111231d18e51ed534b1e28807c062280924e5d53a8a1316ca2b5936911a267d5b799fd7d8e5e725271d5b8eb90e3dd9ef9eb1400c68eb8f88622f548af7df4846758cfb74aeb48588d1820f504e97ae1d818feb7113175b04e7c0bae6239672c987253cdf0e9845119f3f200d40f586ab986312144c3525acb78a5784f5707217105bae651e0c000792f4e88c1a924d33fbe5474a71b1e193a8d3a6a65dc485f2a299e7d07a6cf621260dcfc5d79c9243618f57507ca025baa53b3e684667f23dfb8ab9065cc548ad5c881bceb5d937462ea850fc197f5ae8c9489815b2cff853895e987e684195a094d8460ee52ef9d8f6fa0ba01092f0cdffcc7a682ca3125058ce9ed0064d7d0a868b0419b49ded3d93f0c7e1d700288350ff4c130cf6e0b507ce6064623294536c8fc4011b9b40299bfe02144806411d5b36997db26033a5ddeecd6bf3faefd3ca0a6cb70b0561106b2dabb06cf88bb6fa283e43dcd2fa1f33063183e15450385ba6fed4436502211d3181351db793a76ae11ebde2b23f340b7522748a4602ec469b88eb7f3d1325baa536ab8096c58c6f2b4863a541f618112643e194a5873cdae4172bb3005743782d8af22dbf23ab60e7d0f4ceb3ef0975f747d192e80608f35c46e23e1ecee1839558bc5c146dd97aba7651dfd2401fb8aec4eda71b1b15a2570130f0f5ff489ad4355a708a6eafa9752eb5c9f7a83f43c3e3b317e7e68133573f585fc27c5cfc0d90016f5be8594e1cfac36b24570cebb5be46d3f5917441ccadc355536b8b9b455b87667edd802b77178251afdefe9a4b5f0ff7e59fa5cf9b449e18bc4bf8154f15913128a2584f7d60a3c09f467233783690df422d3d9982200eb604ec2ef50830bba6f82e8b91823808fac0b07bc0e51a671c32dea0f2f9aa2cfbbc91cdf54b719b6009ce750bab1680cac77398b2a619d550161fa70e7e8b86fb535f8797fca75708efba7f0d95da4ac235d9de68a50c998a72c0c2da90f511ea456f776c881b8416b894cd835ad13c62b035ef4d220a66c86c1c00de534690e42d064bf4fff946af98aec3f9490d6f0586e891d272a4bfb776ab84bd693af6526c4b09beab2460634d929bcc61cf75b041f067e7b503ecd6a80934e169ebb0ac926a85b53cb1d7b63eee6abcd9e250834da6e4da23b3b3d90c2f726861760ca14b78d5e895eb7fa2e8b39f724a0371412b1c94c6a42f1beeae2328e353971531bddcda730b6a0d90f7c58e3ce5953cf5a6c9e3fd657c92fe4b5b8b0b659353944afa5c69c309527d6d4039e78c675c8d2f527fbcb2b765864fed987f785221862bd7deb66e6676ddebdd19cf4cb26869f562928dc98088bb69281615fc6a2dafc466e70ff9ea1a411e1a3ba3f94ed7d429796afc9f0c95da19a4db691c36407985e5f08473dd8afd9de88b2c26b6ebd2ea35177238e18dfc36d579a80074c06f5cca60cf6d64d27eeb121c6c8e5e09aa3165c101068cb748694695e803540d947f33740d30616001448173ef57bbcb82fcb213348a2a58e2d14480b1ce1ad346729631b91f7e343e37abd8e787274ff4598acc99cc58f3578979e6e6a1926333bd8818a256b58e67c6f77145ee26f24998cab89021423e03326c175adaa8ea905122553948ece311cbcb770222e7f4f373398497c8c301480d031fc53c2a7018d91777cec253e89e28a82d15e01c12c0ccae1b56ecff35b90b19769bff4b786d4624679abe852780e9e4b9985e0564ee604027dc2a60f65d2fcf1d354e163a8465f77eb67e2a6c9fa89ea0768f9cf117fd1ea8969e592da11d34f6f9b7adb24f3261dd14199fea6da6b5d31f825b3706492b3305cbf6ef553fadfcad51a0484f09a8d2491c8a937fdd36d9e0b94fb6bdca6e80a6079739cc1d455fd735e89fe89938a7132dc0c9f181953dd9cf2d106a3f1478b46ddf35aae9bc6932227d79ac4f534967be2cbc30fa254658b61752b534257fcda6338c36710bd8db219ec394b41e7fe541f9086ce19d28e13d2b3c384745fc88ed0cb5ef414e23e8782f99307c49121a733875e9fb9c8559d8ad6bab256dde2bfdee4286c1419b80acf55dd09da71116c0fa902d8e89465c313c311f272a11cd17417372dc74e01f3ba1a9afd8bcb9fad57cde63ad59a6999caaa359e6e5b4216dd3b0bc8d310e28c8a1232cefcbd5070d0537097e370433bc1017b7b1c4efa694a25b4385bccbdf79affb0b6d203b3cefe637fd6f7b51f5ec297471c874a57145b254bd14b89fe62709c94ca3cae304739294c7b4a871768e11cb7a2db0aaeff4abbd00c70b4d4e5e8f8c6d34afe3d619404e20ccf628f7902c17ab1200644fe465751587800d59acb3abd1f8a832a03f1634c0b7e4fb3086fd21c046d7430a1faadbd9b1625ee70c1071bede890f1c07113aed9b1a35ab0fb823e2cb38d2ee6376800f63d28326ec3be129333e1024d17c46198e329779a79f4ee69b56374268fefdd29995e411052bcc92318c636aa9fa634f3e537712f720a52cd95d5472cdd6b4eb66bd1ed2c41cb37c615eb486855671d964ba46ee44eb61ffcb0b22b20632ce3222e4c3037f348d5dec196f9e2bcc2335284f5529e4de9e6b4b84fc559de63357bc8ca0a00c16bdea79372b13abb251fd4bc52f1f732811b65b4c51715da133b20caba229244060fdec0ad4c47fdf1963b6aa1acf998585c59867b5afcd08958dceb9937a97e87b2153f45970ca77e5524c5160c69963717630795e3a4768e2521617bc211926e5cb08edea70cae99c6d7eff4c1e041c7ab0d3473d6ceb3cbc24a9f45c5818896463360490911b1fb77a24aa3b394e3ee1155ea2fbc6686db2c715670dc9187b33f3051b4b894b616bdf7fb287113c315413d83e0540676fe9a48d523bef3280611165fb77c7bb33c0a087fc06e7702fc7d8ea4f7aa264c7ed332af03ae3e392bc0f96ec11e3bca6604ccb7941043fb043b4880de676efaf3f0fba185e90db8e8e6718058fd1d26c49d0a163264d4aaf7094d02d6898f75c6edf2e49edf7b0a645018220535e8694baa1e910df6e493c0812c2cbb16966cb22af208279947f9490f2f5d3a49596050604f920af8fa41c5a339609659f331f24fa0aec3787d052a02541137dd1ccdc30970a879e4a42e491137bb3cddf2c87ea6368bc4d9aad9089af50b71d56bd296d891ac2fbec84303486739a44850680353efa2203d7fcfa00d9cd81433adcad3e6aac009784b63a3b7aca58155b24274b2d41de998321bdf0229ce74a0c61a24d74ceb30d4ba766632c4a48d9db4e3b3334830b12f3136158fb16fa745c2ebad16b65b279d28332894755de3e7ae2aa88f9e2af8a46200c427540eb68907152ee7d53212b55c170ab67c47c884db89757b09dc035ea59fe2be1f384b3edef6925c399753832d32296100ca4e2699154d6ed86bc145e92d699e43c2269ed359a004aee75ac5e730dffec87f239328bc95cc281a9c0bba661f6d36ac11d1151851c70cf39fbbabff2190b619294db73008e3d32acb0b29aa3d28d1e50784dbe35eb911d838bd710336612170666ea5f42b72c32be4d83c4ff61987acd1b1f0cebe281806af8ad4b6e7041431bcb8a93cf0f44826821b0bb9c053468b4d8d034c084ba1c8dfcad9fac6ec379da5425492dc6f7791b1b25d50bd9a930ead9e4faf5b557eebe4461320476a7ae12b0dcc9d171f6d2737b824db7259e62915779dc5e8a08bc69c0c68784202aa3462bdff06af76bdf9f106dd6228211534c4433717947dfaca4b7b61a21d706217e3718b5ccac40c3c4692bd59f222d0c2e98af1ff1919256d7b0540ed69b11f212a9598c7499ba634d1677ecf17517e207d40baed5aa0e25b7e70b6b16f6d6f0c36a146db0644ababd31bc50f5039b3bc4f12b603da2675e121b09fe92c69548dfb9df18d0e50c1387280b7bb1366bf5bbabfcef5557a05ce24df1a02f22f791e06c5e3e21e5fd6db7f2c90ffb83b154b0fd9866c46609dc10b274954caf80e83693f5581f23fd765a18aa4e294bbf7a8721015ea6a6e1ba64f79f6609924d43757fd0752024af79e296415b42de3428f14d9d89f84c2e076a0821cc8921fff677ec7b91178bcbd755ece28477a6bd01fd429d824ddfb62edcdab7c4495edc5a3d27826ea4bddaeacfa7cb17632cee0095ca55d3973812033d96ec5e5ed6880b3a998b4998fb7441e11dd060515bdbfd5aa32aac6ae1fceb8e92d7e8985949946a458ca2f69637de6b92410986f8fa5ba4b1598d8383fdbff2e004dee71500302e3e9270371b39237260bde0888702c7b2bcff69192bd381cfe59b197b9dbe5e2eee27b64c17e95a1dade453a6f29dc8bef1bdd34a92a5275972a2cb18f6f553f99c6098f50198b68cd35d2877d9cdd15074422b43b03170f23138dda44b62b5e161705405d2e9a007f8cc9ec7920d1a6e947ccc57b1a51a728fe1afcb84115fe48be15c894cce96391ab3cdc1bd9aa4cf58213c15d1a849c3f38c8ee34b208766129bbb493558c139f2bfc39df29fc73422127823fc9c993f20d9df9e0acaf0b1729437458e0a857ebfe4a373fd491952a475e9c391b7ee02b79554807c0f12293aa385a3c6b18bfbfc690a7aa9bc85d8adb705eac642ec8611ac62d09d2a6892cd671629d457c2191eb5940114113ed8cd4e8411d96200d3d66f947baa7915610c396402d38f109837d29c8e937fb6223a9d0d605a3d91312908fb5a7df36122c35f7e47855d526915c3a7cea432ca4524fcae3b5c6fbad196c1efef0d129d9b3f9d23104fc3c8a90dbcea0400311e51de50c5abb62fcbedf998ebc1cf23fd76bcc2aea2451f6d0d3b8fdd337ce8d24d7ce2a5b29318df58adb0006d4295c138b4b03060134802626e31a5da92b5a7a8677132523affbdc8d958b955eb4615370497429cd3767f2f708c2cadc233bc3e5efc8c837385749da08c6dd573e3b105ce459d659f790dcaf53c1d0b4d8e0c64b6bce15559e59e66b3b0b2695703e9bd5b1c5bb3c5b1028441391f8fbeadc032e890fe5e3be78569056d147a891f4bc85406e78f962b532eb436b0e047a7d3c88bb89455ffbf1da360207af5d827e9fbbedd8393a828a92382329ff444d9a8128c40e302453550426de4babcdee45108e79533b9747fd21b8f775a76e1d4d54a8a98a65ee3c183be34172877c26e600c89949ced85004d69c24d4fee6f87d2ff24900d41577c78dfbff698d438c0e26ebe15d7b75b49a5b2a5c627da3b13f6458aeff3f0a1944a339b4be5e13d58a71928bb77053beaf7b68568205b62f5a4a9b3c0fef441ede90f012047b0cf2228481fab85d94219ce9f417e4e2b6018b319270a6b6f0de93d0147842f582bd4e41f00720626be2b2f9116875ea4f92e380bcfc33058505ee0336e10c71a5abf6f32c72fe68c68c166454db8e101b3a271f04e4dda8947743e0ac408c73cff69c10e7c015c6b078bab0a1c7aab14a26df087b2b4c859e684aebadff5033d1ebd6c6589a27ac75a075e6ef801f5dece0dbd1e477bb70d2b8553a88b13e304e00735e183feab89edf469cb90c0a5bbf778809a9996f4e72b16417672cd97bdd1c0baa64ea2d782aea9d58ea357b54d06f316076b5c413417061b3c7485b534fcc8bf25d2adf043b47a3d47f0755fe6225bba7569fe672d3507c8e15f7139ef7f606c616c52733413befb248eee53c4a9a16f952ac56e18e221626c4f51eb90c1314167c9677a7eb7004b9b42fd6ec21dd38d5b9032c441166be3f8e9dfed39fb0e654ca3126003decf8e50bf8ace994e16fdbe3f53a36a11ed6f06d1bb8e54f574a83035eba379f2453f2346d11414cafbde87cb5d66b650a5e25ebaced402188c1b4b941e788e1af908fff3ef84c1dadef0550687f0b6aeef6063dc1c8c8efe09d611253efb4d288ea407ef3c043aacc3dfc19a18449b38fb97d9fc0bb67de3e1744f782d3a9d1fc449c3a902b1ec8789e336f731a51cc7fefc43736e04942167fbfdac9f15c5b3f921aaa3df0c9709c21339ce890cd4054828615f18fd12548258440a06dbec3d72719b3e9f5f9967525f90f16993cab09c9eab2b27b29c959c002dbb028cc96297d40822772c16b4b786cc57cd581c02f143d6e728eeac1ab4eca6170748002c0e2269611a2b402f9fa8190d9216b1e1b7de8f81074b8dbb665f0d69c52cf573d07ca0752fd6fe7da88dcf4a915ab1533f5686b766393fe9bf1aeef9d17414d1803708e61973dd205097eb1ed466c8dcfb2c7710caf9df713a11c774fd0469880534ae2ccd1e40216ffa145f0fc832b166896810a678f3a47dd24bc2e6835c16e405a444971068dbd47926f430871121be8f19c8ac4fd0a9e3ff7cd961f90f24265de455694cc291de76437953ac314b1791acbe96d3fcae4fa397287a02eac86f13c931f4d4f49ad52cf1db0efdf7027ee8e468d64d316a2208ae33d8fc3274861b41f2e064c99fbba37b7a0c46a3df8dc4589de7ac28df63ed697a48011c863049345c371f10f7d53a56947e348d07e4ff71eaaaf9aaa09bf1147b80d62a60dcec6d7dd4cbf52f2b0b89d2c7de1f16d63ccc0260b0982fcf105736b50001c19eda998426284713670aab21ce128a80b57920d8c3436edb859d4afd7ed835985b5bec01df5447e66ee8511b28671646e71c0669ab2203c4c9a020000279ba87f089d04924cb33ff82f59da9399ce3f20932c073289938e4e7101d357cce920a2aae72f94d6e1aaf9a3905f4da18a7ee849a39f0d1e83adc67ffab826490d4bfff1f80e8c2c180b08e013daf6d054be660390fc4f872b8d60f14951f05ac0dcb4c4281f71ac2d4cb4d68ffdfe8f5c43160d99ea0077486219bb9400a8fc1faacf12878379a7ea5eae2adbbe2871c1664bea1985d594963935019446d605a61ff79802e114a34610d002cf27e0f4b96c6ff880785307161813f48b68c6f9130a6faee6f332e77755fb68b68248ec113030575b1c262c2430c000d11b269ce4e98a32eea3af403630e83aeaaed1420c9fd66eadcf34d6d1fbe457c5216481ddaf6b397912630999fbc5298eab15ab3cce9de7741367264a4e30a61ff7f1d5e7e64290218d9f6f5c9898cd23ee1ac35ab8d3691bf3df31cef54c161bdf3093390ad2322b6f71f22199ac68c5eab4aa7523b4957202751b675fe82c9d42432c92c2fec148da6e5514e9d5f2618d5a616cdbc4a560b3e36eb6cb8baca3251d8e819ea8f552f07ecca0664a7ef22a3a6c11d023eade70f1b872cf58e89c625f561e4858877e39d324dd448b041e4435b676ce0e86de9045e8b9e8305ae60cb7a41c01ce2318af7f9fa011d24aac2b2d31360ce7b437c46df5756d94d1005a0359b57534c49d1e8e173ba183666a19ff6e6c63388250985249eb40f0f981a2bc34e8196e9c468b1bf329c4ac9cf5f19e46734b1238f99f1e6d8c95ecca9cfafc15c756bb4780b675ec9781bfdb583bd91a7df33ed49daec1d65d14f26d7cfadb9e1de06e922939e924b034e4d128cd66a2f7a87c9399c622922e6e33af68c5115053f42c519a054e295b5f8e420630dc116bb2562ac87a6402e4635bd6c6b95943820f86acd5f48ac519b06f1b0bf1c7a70d69e84c95600e017a67e64536197447b810c21cf86a9d09c37aaf6cc39333b414844ce883cec0ffb23e36d5560e9ff6922a9237a6503c72346ebebf57e59c13e7320f670e1826c802b9cc674b55284ddb061e6e38b16c58532497709028ccc4c000604d4a72b3255170a217ac411ea68e64fb3b63653b985abc42bf21629775a05812ef159992320c3cb93805bbebb250e2f9f92b2c8795c388fea24de5e70d45f8ad1764a6e39a1d588191f77fd7bd0408252c784deef806464edc1b4d3de83df34f1b615e10ba20948ca9f28c4f435163e1f5a6fdd0bc8ef397c25b7d704e1ff1dca065022b99778c05ad39f806c3f7ae4278b768eac09b7d317ec5e07db3fc5579a29fb42658ba66c68afb3b8401b2e09c13bc0652309b26cfab2febc3e96a6da6341e6e860468aca74caf06bfc576124594c3f123d5e987319862b0700bd257cff3ea8abff23ebf1a62e575741db2902761578de5c72f4d37bf9186c2391dfff0fcdf2969df27ac0c34d3f07feb0d1887de871e96916add75c15ce2f795749ceadacca94df5808a1629ccd906b3776e7c2a9e94393243de87656432ec21be389731be9821fc035859fffd503f9c8279bd4a36f3be1e3ba0beecaaf6ee44203d8b76c4ca97da38f63fd07ed7812601ab9095a77d52397ecc31819b91d3c28f639bda94c46a5d527abe34bc579338a4db395c57dbeec31a37685ee8121284b63583e026783e47d58deaad78a17e9a946ae7a3db89d8d78d9f37ee5861de7ca92e7335dade99819ecfd63770413b17de97bf403a6d97e163f7eead7d8c182b77cc3d0e0f28f30839445ef751bcf4f21b5803a4e8754fd9a3addb2553ad1d81879addbdc2668e5f2e15926ed805ce7b4ae01be9677c322d59d619cfc806a4946f59010aac481e49d0a0b2ccd0fbd88abf07d4912a081c81633f4a6e0e68eceee686d58a43c45d3bec1046d3bb8d7fc727dda7cfe22af174219bc8e928ca15ff9ce2c707bcea190f8fdeb86a2dc99d7ca81b78efdb0062f1967bb66132164d227e149aa52f39af5e763705373c864323a5885dc6061b5a2ee5501d0b1aa465d93052f29d033a750b1b9cc85fddc0cf168ddc62fb2d1570458d246906fbb689bc8ee3864901eb43f96c19482a7ba7a52fe08b241a32aa9a2774359132b5e1905a08ba37244265070f6d69a428a5834f10d9ba45f476f9e88e856ac223d8cf6ff04894faa2590ecd0a3f6938d661d8aecf6223ae99c414962a86fdc1c2599cee39e9f0153a57ed809bd90023c8d688cc1aa7b5eec5fcd01d07d001", 0x2000, 0x0) write$FUSE_INTERRUPT(r2, &(0x7f0000002240)={0x10, 0xffffffffffffffda}, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r3, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x28, r3, 0x5, 0xfffffffd, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}]}, 0x28}}, 0x0) 2.378642192s ago: executing program 1 (id=477): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSBRK(r0, 0x5409, 0xe50) 1.938449531s ago: executing program 1 (id=478): r0 = syz_open_procfs(0x0, &(0x7f00000192c0)='net/ip6_mr_cache\x00') read$FUSE(r0, &(0x7f0000019300)={0x2020}, 0x2020) 1.196488001s ago: executing program 0 (id=479): unshare(0x20000400) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000001}}, &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x1, 0x6, 0x401, 0x3}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) 1.171497482s ago: executing program 1 (id=480): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) r4 = socket$kcm(0x10, 0x400000002, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x24, 0x2c, 0xd27, 0x30bd26, 0x25dfdc01, {0x0, 0x0, 0x0, r6, {0x8, 0xd}, {}, {0x3}}}, 0x24}, 0x1, 0x2000000, 0x0, 0x10}, 0x84) sendmsg$inet(r4, &(0x7f0000000100)={0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000140)="600000002e000d190a762d7f089e", 0xfca2}, {&(0x7f0000000280)="68cabf2dfb58fc0a1d6b689866f05d490d010088a8ffff0200258f2e4409b8f9e6aaeb88bea123dc2c6726e89b1ae2f6e8bcb5ee52dcd7298d39093c510293bca0b646a3ce904f6e6b788b3204c233e60ddc", 0x52}], 0x2}, 0x0) 638.077817ms ago: executing program 0 (id=481): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000940)=@ipv6_delrule={0x24, 0x21, 0x100, 0x70bd29, 0x25dfdbef, {0xa, 0x80, 0x90, 0xc, 0xfd, 0x0, 0x0, 0x5, 0x10}, [@FIB_RULE_POLICY=@FRA_PROTOCOL={0x5, 0x15, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x8081}, 0x20048014) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000940)=ANY=[@ANYBLOB="3c0000001a000100"], 0x3c}, 0x1, 0x0, 0x0, 0x4000080}, 0x20048004) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x20040040) 529.190915ms ago: executing program 1 (id=482): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), r0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000480)={0x28, r1, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4017}, 0x40) 389.180274ms ago: executing program 0 (id=483): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000340)={0x7fff, 0x7, 0x17, 0x7, 0x6, "fa7d6d354cc45577e8bb9bfbfe7e2e84ec9fe2", 0x6, 0x2}) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000080)) 187.056578ms ago: executing program 1 (id=484): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pimreg0\x00', 0x1}) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x1) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 186.728378ms ago: executing program 0 (id=485): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000280)='tasks\x00', 0x2, 0x0) r2 = syz_clone(0x4000, &(0x7f0000001000), 0x0, 0x0, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r2, 0x12) 0s ago: executing program 1 (id=486): r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x380}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x2}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f00002b9000/0x400000)=nil, &(0x7f00003fe000/0xc00000)=nil, 0x400000, 0x3, 0x2}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xc) r1 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/mm/ksm/run\x00', 0x1, 0x0) write$sysctl(r1, &(0x7f0000000580)='1\x00', 0x2) syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000200)=ANY=[@ANYBLOB="12010000000000406a0563000000000000010902"], 0x0) write$sysctl(r1, &(0x7f00000000c0)='2\x00', 0x2) kernel console output (not intermixed with test programs): [ 47.938739][ T29] audit: type=1400 audit(47.830:56): avc: denied { read write } for pid=3085 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 47.940783][ T29] audit: type=1400 audit(47.830:57): avc: denied { open } for pid=3085 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:2139' (ED25519) to the list of known hosts. [ 64.945983][ T29] audit: type=1400 audit(64.820:58): avc: denied { name_bind } for pid=3088 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 66.584794][ T29] audit: type=1400 audit(66.460:59): avc: denied { execute } for pid=3089 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.637878][ T29] audit: type=1400 audit(66.510:60): avc: denied { execute_no_trans } for pid=3089 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.893756][ T29] audit: type=1400 audit(69.780:61): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 69.900806][ T29] audit: type=1400 audit(69.790:62): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 69.916245][ T3089] cgroup: Unknown subsys name 'net' [ 69.925192][ T29] audit: type=1400 audit(69.810:63): avc: denied { unmount } for pid=3089 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 70.168705][ T3089] cgroup: Unknown subsys name 'cpuset' [ 70.174618][ T3089] cgroup: Unknown subsys name 'hugetlb' [ 70.178615][ T3089] cgroup: Unknown subsys name 'rlimit' [ 70.393203][ T29] audit: type=1400 audit(70.280:64): avc: denied { setattr } for pid=3089 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 70.395912][ T29] audit: type=1400 audit(70.280:65): avc: denied { mounton } for pid=3089 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 70.400044][ T29] audit: type=1400 audit(70.280:66): avc: denied { mount } for pid=3089 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 70.598945][ T3091] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 70.605773][ T29] audit: type=1400 audit(70.490:67): avc: denied { relabelto } for pid=3091 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.610988][ T29] audit: type=1400 audit(70.490:68): avc: denied { write } for pid=3091 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.648307][ T29] audit: type=1400 audit(70.540:69): avc: denied { read } for pid=3089 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 70.653715][ T29] audit: type=1400 audit(70.540:70): avc: denied { open } for pid=3089 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.443437][ T3089] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.618753][ T29] audit: type=1400 audit(79.510:71): avc: denied { execmem } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.672295][ T29] audit: type=1400 audit(79.560:72): avc: denied { read } for pid=3094 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.674122][ T29] audit: type=1400 audit(79.560:73): avc: denied { open } for pid=3094 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.680194][ T29] audit: type=1400 audit(79.570:74): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.701854][ T29] audit: type=1400 audit(79.590:75): avc: denied { module_request } for pid=3094 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.755306][ T29] audit: type=1400 audit(79.640:76): avc: denied { sys_module } for pid=3094 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.470129][ T29] audit: type=1400 audit(80.360:77): avc: denied { ioctl } for pid=3094 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.504295][ T3094] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.512111][ T3094] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.588502][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.594932][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.450531][ T3094] hsr_slave_0: entered promiscuous mode [ 82.454679][ T3094] hsr_slave_1: entered promiscuous mode [ 82.471822][ T3095] hsr_slave_0: entered promiscuous mode [ 82.474088][ T3095] hsr_slave_1: entered promiscuous mode [ 82.482495][ T3095] debugfs: 'hsr0' already exists in 'hsr' [ 82.483212][ T3095] Cannot create hsr debugfs directory [ 82.963498][ T29] audit: type=1400 audit(82.850:78): avc: denied { create } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.965355][ T29] audit: type=1400 audit(82.850:79): avc: denied { write } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.968039][ T29] audit: type=1400 audit(82.850:80): avc: denied { read } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 82.982959][ T3095] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 83.004719][ T3095] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 83.031170][ T3095] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 83.041857][ T3095] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.120428][ T3094] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.130316][ T3094] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.138943][ T3094] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.150136][ T3094] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.863135][ T3094] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.880339][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.390383][ T3094] veth0_vlan: entered promiscuous mode [ 86.413346][ T3094] veth1_vlan: entered promiscuous mode [ 86.486145][ T3094] veth0_macvtap: entered promiscuous mode [ 86.499733][ T3094] veth1_macvtap: entered promiscuous mode [ 86.600357][ T52] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.602208][ T52] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.603368][ T52] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.604269][ T52] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.736014][ T29] audit: type=1400 audit(86.620:81): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.741961][ T29] audit: type=1400 audit(86.630:82): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.eaQYnV/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.753881][ T29] audit: type=1400 audit(86.640:83): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.765829][ T29] audit: type=1400 audit(86.650:84): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.eaQYnV/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.773086][ T29] audit: type=1400 audit(86.660:85): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzkaller.eaQYnV/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3184 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.794981][ T29] audit: type=1400 audit(86.680:86): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.810601][ T29] audit: type=1400 audit(86.700:87): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.814744][ T29] audit: type=1400 audit(86.700:88): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="gadgetfs" ino=3185 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.827904][ T29] audit: type=1400 audit(86.710:89): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.831030][ T29] audit: type=1400 audit(86.720:90): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.905931][ T3094] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 86.947923][ T3095] veth0_vlan: entered promiscuous mode [ 86.966531][ T3095] veth1_vlan: entered promiscuous mode [ 87.071642][ T3095] veth0_macvtap: entered promiscuous mode [ 87.090571][ T3095] veth1_macvtap: entered promiscuous mode [ 87.166079][ T52] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.168348][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.177122][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.181252][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 87.861637][ T3708] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 88.473135][ T3719] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3719 comm=syz.0.5 [ 91.672541][ T3743] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3743 comm=syz.1.12 [ 91.990828][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 91.991824][ T29] audit: type=1400 audit(91.880:188): avc: denied { read } for pid=3742 comm="syz.1.12" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 92.530516][ T29] audit: type=1400 audit(92.420:189): avc: denied { create } for pid=3742 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 92.629286][ T29] audit: type=1400 audit(92.520:190): avc: denied { create } for pid=3738 comm="syz.0.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 92.727273][ T29] audit: type=1400 audit(92.600:191): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 92.898795][ T29] audit: type=1400 audit(92.790:192): avc: denied { create } for pid=3746 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 92.904228][ T29] audit: type=1400 audit(92.790:193): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 93.022019][ T29] audit: type=1400 audit(92.910:194): avc: denied { read } for pid=3748 comm="syz.1.15" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 93.101614][ T29] audit: type=1400 audit(92.990:195): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 93.201374][ T29] audit: type=1400 audit(93.090:196): avc: denied { create } for pid=3750 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 93.477567][ T29] audit: type=1400 audit(93.370:197): avc: denied { create } for pid=3746 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 94.937023][ T3775] capability: warning: `syz.1.25' uses 32-bit capabilities (legacy support in use) [ 95.502410][ T3787] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=3787 comm=syz.0.30 [ 98.024425][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 98.027463][ T29] audit: type=1400 audit(97.910:260): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 98.109881][ T29] audit: type=1400 audit(98.000:261): avc: denied { map_create } for pid=3801 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.120176][ T29] audit: type=1400 audit(98.010:262): avc: denied { prog_load } for pid=3801 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.128664][ T29] audit: type=1400 audit(98.020:263): avc: denied { create } for pid=3801 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 98.145165][ T29] audit: type=1400 audit(98.030:264): avc: denied { create } for pid=3801 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 98.164316][ T29] audit: type=1400 audit(98.050:265): avc: denied { create } for pid=3801 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 98.169250][ T29] audit: type=1400 audit(98.060:266): avc: denied { create } for pid=3801 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 98.175229][ T29] audit: type=1400 audit(98.060:267): avc: denied { create } for pid=3801 comm="syz.1.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 98.201134][ T29] audit: type=1400 audit(98.090:268): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 98.279641][ T29] audit: type=1400 audit(98.170:269): avc: denied { create } for pid=3803 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 98.633156][ T3807] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3807 comm=syz.0.37 [ 100.949888][ T3860] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=3860 comm=syz.0.53 [ 103.616526][ C1] hrtimer: interrupt took 371584 ns [ 104.440499][ T29] kauditd_printk_skb: 457 callbacks suppressed [ 104.443476][ T29] audit: type=1400 audit(104.330:727): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 105.737404][ T29] audit: type=1400 audit(105.620:728): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 105.819652][ T29] audit: type=1400 audit(105.700:729): avc: denied { create } for pid=3904 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 105.820074][ T29] audit: type=1400 audit(105.710:730): avc: denied { create } for pid=3904 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 105.839052][ T29] audit: type=1400 audit(105.730:731): avc: denied { create } for pid=3904 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 105.913136][ T29] audit: type=1400 audit(105.790:732): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 106.003728][ T29] audit: type=1400 audit(105.890:733): avc: denied { create } for pid=3906 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 106.024214][ T29] audit: type=1400 audit(105.910:734): avc: denied { create } for pid=3906 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 106.289460][ T29] audit: type=1400 audit(106.180:735): avc: denied { create } for pid=3906 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 106.891546][ T29] audit: type=1400 audit(106.780:736): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 109.472154][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 109.474120][ T29] audit: type=1400 audit(109.360:742): avc: denied { create } for pid=3914 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 109.488467][ T29] audit: type=1400 audit(109.380:743): avc: denied { read write } for pid=3914 comm="syz.0.76" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 109.551083][ T29] audit: type=1400 audit(109.440:744): avc: denied { write } for pid=3914 comm="syz.0.76" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 109.590021][ T29] audit: type=1400 audit(109.480:745): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 109.679863][ T29] audit: type=1400 audit(109.570:746): avc: denied { create } for pid=3917 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 109.717496][ T29] audit: type=1400 audit(109.610:747): avc: denied { read write } for pid=3917 comm="syz.0.77" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 109.721378][ T29] audit: type=1400 audit(109.610:748): avc: denied { mounton } for pid=3917 comm="syz.0.77" path="/40/file0" dev="tmpfs" ino=230 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 109.777233][ T29] audit: type=1400 audit(109.660:749): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 109.930754][ T29] audit: type=1400 audit(109.820:750): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 109.975389][ T29] audit: type=1400 audit(109.860:751): avc: denied { create } for pid=3920 comm="syz.1.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 114.489156][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 114.491082][ T29] audit: type=1400 audit(114.380:799): avc: denied { create } for pid=3949 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 114.611004][ T29] audit: type=1400 audit(114.500:801): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 114.622052][ T29] audit: type=1400 audit(114.460:800): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 114.718305][ T29] audit: type=1400 audit(114.610:802): avc: denied { create } for pid=3951 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 114.779419][ T29] audit: type=1400 audit(114.670:803): avc: denied { write } for pid=3952 comm="syz.0.90" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 114.813102][ T29] audit: type=1400 audit(114.700:804): avc: denied { read } for pid=3952 comm="syz.0.90" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 114.833428][ T29] audit: type=1400 audit(114.720:805): avc: denied { create } for pid=3952 comm="syz.0.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 114.849650][ T29] audit: type=1400 audit(114.740:806): avc: denied { read } for pid=3952 comm="syz.0.90" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 114.900106][ T29] audit: type=1400 audit(114.790:807): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 115.106124][ T29] audit: type=1400 audit(114.990:808): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 117.262450][ T3981] capability: warning: `syz.0.100' uses deprecated v2 capabilities in a way that may be insecure [ 120.205133][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 120.205892][ T29] audit: type=1400 audit(120.090:867): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 120.369690][ T29] audit: type=1400 audit(120.240:868): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 120.447206][ T29] audit: type=1400 audit(120.330:869): avc: denied { create } for pid=4002 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 120.451193][ T29] audit: type=1400 audit(120.340:870): avc: denied { create } for pid=4002 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 120.485619][ T29] audit: type=1400 audit(120.370:871): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 120.489118][ T29] audit: type=1400 audit(120.380:872): avc: denied { create } for pid=4002 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 120.501115][ T29] audit: type=1400 audit(120.390:873): avc: denied { create } for pid=4002 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 120.505356][ T29] audit: type=1400 audit(120.390:874): avc: denied { read write } for pid=4002 comm="syz.1.107" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 120.548368][ T29] audit: type=1400 audit(120.440:875): avc: denied { create } for pid=4002 comm="syz.1.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 120.588998][ T29] audit: type=1400 audit(120.480:876): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 125.173632][ T4062] FAULT_INJECTION: forcing a failure. [ 125.173632][ T4062] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 125.175042][ T4062] CPU: 0 UID: 0 PID: 4062 Comm: syz.1.128 Not tainted syzkaller #0 PREEMPT [ 125.176831][ T4062] Hardware name: ARM-Versatile Express [ 125.177099][ T4062] Call trace: [ 125.178769][ T4062] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 125.180982][ T4062] r7:00000000 r6:00000000 r5:60000013 r4:8229596c [ 125.181071][ T4062] [<80201b58>] (show_stack) from [<8021ee34>] (dump_stack_lvl+0x70/0x7c) [ 125.181133][ T4062] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 125.181190][ T4062] r5:84f95400 r4:8294fc90 [ 125.181206][ T4062] [<8021ee40>] (dump_stack) from [<809996ec>] (should_fail_ex+0x1c4/0x228) [ 125.181274][ T4062] [<80999528>] (should_fail_ex) from [<80999764>] (should_fail+0x14/0x18) [ 125.181337][ T4062] r8:76fa0f30 r7:00000000 r6:00000000 r5:eb24df68 r4:00000002 [ 125.181353][ T4062] [<80999750>] (should_fail) from [<80999784>] (should_fail_usercopy+0x1c/0x20) [ 125.181403][ T4062] [<80999768>] (should_fail_usercopy) from [<805a6d60>] (simple_read_from_buffer+0x80/0x13c) [ 125.181457][ T4062] [<805a6ce0>] (simple_read_from_buffer) from [<80624a54>] (proc_fail_nth_read+0xb8/0x108) [ 125.181540][ T4062] r10:00000001 r9:8062499c r8:00000002 r7:eb24df68 r6:0000000f r5:76fa0f30 [ 125.181568][ T4062] r4:84f95400 r3:eb24de9f [ 125.181584][ T4062] [<8062499c>] (proc_fail_nth_read) from [<8056a53c>] (vfs_read+0x98/0x324) [ 125.181646][ T4062] r8:76fa0f30 r7:eb24df68 r6:84f95400 r5:0000000f r4:85d72240 [ 125.181664][ T4062] [<8056a4a4>] (vfs_read) from [<8056b24c>] (ksys_read+0x74/0xe8) [ 125.181721][ T4062] r10:00000003 r9:84f95400 r8:8020029c r7:00000000 r6:00000000 r5:85d72240 [ 125.181740][ T4062] r4:85d72243 [ 125.181756][ T4062] [<8056b1d8>] (ksys_read) from [<8056b2d0>] (sys_read+0x10/0x14) [ 125.181827][ T4062] r7:00000003 r6:00000008 r5:76fa0f30 r4:0000000f [ 125.181842][ T4062] [<8056b2c0>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 125.181985][ T4062] Exception stack(0xeb24dfa8 to 0xeb24dff0) [ 125.182232][ T4062] dfa0: 0000000f 76fa0f30 00000008 76fa0f30 0000000f 00000000 [ 125.182297][ T4062] dfc0: 0000000f 76fa0f30 00000008 00000003 00300000 00000000 00006364 76fa10bc [ 125.182322][ T4062] dfe0: 00000158 76fa0ed0 000d7fdc 001301ec [ 125.252655][ T29] kauditd_printk_skb: 189 callbacks suppressed [ 125.255219][ T29] audit: type=1400 audit(125.140:1066): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 125.360381][ T29] audit: type=1400 audit(125.240:1067): avc: denied { execute } for pid=4063 comm="syz.1.129" path=2F6D656D66643A0B656DDA9952406DFCFE9B232AFF202864656C6574656429 dev="tmpfs" ino=1028 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 125.361853][ T29] audit: type=1400 audit(125.250:1068): avc: denied { create } for pid=4063 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 125.369344][ T29] audit: type=1400 audit(125.260:1069): avc: denied { create } for pid=4063 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 125.409221][ T29] audit: type=1400 audit(125.300:1070): avc: denied { create } for pid=4041 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 127.890762][ T29] audit: type=1400 audit(127.780:1071): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 128.032168][ T29] audit: type=1400 audit(127.920:1072): avc: denied { read open } for pid=4069 comm="syz.1.130" path="net:[4026532744]" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 128.088375][ T29] audit: type=1400 audit(127.950:1073): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 128.264450][ T29] audit: type=1400 audit(128.150:1074): avc: denied { create } for pid=4071 comm="syz.1.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 128.278308][ T29] audit: type=1400 audit(128.160:1075): avc: denied { create } for pid=4071 comm="syz.1.131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 131.811071][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 131.812960][ T29] audit: type=1400 audit(131.680:1097): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 131.869756][ T29] audit: type=1400 audit(131.760:1098): avc: denied { create } for pid=4081 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 131.878118][ T29] audit: type=1400 audit(131.770:1099): avc: denied { create } for pid=4081 comm="syz.1.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 131.918520][ T29] audit: type=1400 audit(131.810:1100): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 131.971537][ T29] audit: type=1400 audit(131.860:1101): avc: denied { read write } for pid=4083 comm="syz.1.136" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 132.000478][ T29] audit: type=1400 audit(131.890:1102): avc: denied { create } for pid=4083 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 132.013391][ T29] audit: type=1400 audit(131.900:1103): avc: denied { read } for pid=4083 comm="syz.1.136" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 132.086001][ T29] audit: type=1400 audit(131.970:1104): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 132.426782][ T29] audit: type=1400 audit(132.310:1105): avc: denied { create } for pid=4085 comm="syz.1.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 132.437188][ T29] audit: type=1400 audit(132.320:1106): avc: denied { create } for pid=4085 comm="syz.1.137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 135.633161][ T4109] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4109 comm=syz.1.146 [ 136.916652][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 136.917397][ T29] audit: type=1400 audit(136.790:1152): avc: denied { create } for pid=4106 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 136.949961][ T29] audit: type=1400 audit(136.840:1153): avc: denied { allowed } for pid=4116 comm="syz.0.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 136.958346][ T29] audit: type=1400 audit(136.850:1154): avc: denied { read } for pid=4116 comm="syz.0.150" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 137.234995][ T29] audit: type=1400 audit(137.120:1155): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 137.402432][ T29] audit: type=1400 audit(137.290:1156): avc: denied { create } for pid=4118 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 137.420710][ T29] audit: type=1400 audit(137.310:1157): avc: denied { read } for pid=4118 comm="syz.1.151" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 137.974406][ T29] audit: type=1400 audit(137.860:1158): avc: denied { create } for pid=4118 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 138.000882][ T29] audit: type=1400 audit(137.890:1159): avc: denied { read } for pid=4116 comm="syz.0.150" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 138.018968][ T29] audit: type=1400 audit(137.910:1160): avc: denied { create } for pid=4116 comm="syz.0.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 138.034963][ T29] audit: type=1400 audit(137.920:1161): avc: denied { audit_write } for pid=4116 comm="syz.0.150" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 141.931361][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 141.933536][ T29] audit: type=1400 audit(141.820:1222): avc: denied { create } for pid=4150 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 141.949060][ T29] audit: type=1400 audit(141.840:1223): avc: denied { create } for pid=4150 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 142.021600][ T29] audit: type=1400 audit(141.910:1224): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 142.272612][ T29] audit: type=1400 audit(142.160:1225): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 142.417095][ T29] audit: type=1400 audit(142.290:1226): avc: denied { read } for pid=4155 comm="syz.1.168" name="rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 142.439348][ T29] audit: type=1400 audit(142.320:1227): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 142.662330][ T29] audit: type=1400 audit(142.520:1228): avc: denied { create } for pid=4157 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 142.664043][ T29] audit: type=1400 audit(142.520:1229): avc: denied { create } for pid=4157 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 142.665869][ T29] audit: type=1400 audit(142.540:1230): avc: denied { create } for pid=4157 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 142.808537][ T29] audit: type=1400 audit(142.700:1231): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 144.668390][ T4169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4169 comm=syz.0.173 [ 144.709927][ T4169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4169 comm=syz.0.173 [ 147.009193][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 147.011931][ T29] audit: type=1400 audit(146.900:1290): avc: denied { mount } for pid=4196 comm="syz.1.184" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 147.027772][ T29] audit: type=1400 audit(146.920:1291): avc: denied { create } for pid=4196 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 147.040682][ T29] audit: type=1400 audit(146.920:1292): avc: denied { read write } for pid=4196 comm="syz.1.184" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 147.041080][ T29] audit: type=1400 audit(146.930:1293): avc: denied { create } for pid=4196 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 147.060236][ T29] audit: type=1400 audit(146.950:1294): avc: denied { read } for pid=4196 comm="syz.1.184" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 147.079419][ T29] audit: type=1400 audit(146.970:1295): avc: denied { create } for pid=4196 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 147.137759][ T29] audit: type=1400 audit(147.020:1296): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 147.322600][ T29] audit: type=1400 audit(147.210:1297): avc: denied { prog_load } for pid=4199 comm="syz.1.185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 147.427616][ T29] audit: type=1400 audit(147.310:1298): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 147.459054][ T29] audit: type=1400 audit(147.350:1299): avc: denied { read } for pid=4190 comm="syz.0.181" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 152.180426][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 152.181828][ T29] audit: type=1400 audit(152.060:1330): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 152.284233][ T29] audit: type=1400 audit(152.170:1331): avc: denied { mounton } for pid=4222 comm="syz.1.195" path="/96/file1" dev="tmpfs" ino=525 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 152.295041][ T29] audit: type=1400 audit(152.180:1332): avc: denied { create } for pid=4222 comm="syz.1.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 152.401703][ T29] audit: type=1400 audit(152.290:1333): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 152.617075][ T29] audit: type=1400 audit(152.490:1334): avc: denied { read } for pid=4225 comm="syz.1.196" name="audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 152.617603][ T29] audit: type=1400 audit(152.500:1335): avc: denied { create } for pid=4225 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 152.621485][ T29] audit: type=1400 audit(152.510:1336): avc: denied { create } for pid=4225 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 152.627489][ T29] audit: type=1400 audit(152.510:1337): avc: denied { create } for pid=4225 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 152.629710][ T29] audit: type=1400 audit(152.520:1338): avc: denied { create } for pid=4225 comm="syz.1.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 152.682326][ T29] audit: type=1400 audit(152.570:1339): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 153.813404][ T4236] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4236 comm=syz.1.201 [ 157.362916][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 157.364463][ T29] audit: type=1400 audit(157.250:1404): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 157.648276][ T29] audit: type=1400 audit(157.540:1405): avc: denied { create } for pid=4269 comm="syz.0.215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 157.737302][ T29] audit: type=1400 audit(157.620:1406): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 157.789638][ T29] audit: type=1400 audit(157.680:1407): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 157.949628][ T29] audit: type=1400 audit(157.840:1408): avc: denied { create } for pid=4271 comm="syz.1.217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 158.027540][ T29] audit: type=1400 audit(157.900:1409): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 158.088452][ T29] audit: type=1400 audit(157.980:1410): avc: denied { create } for pid=4273 comm="syz.0.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 158.219620][ T29] audit: type=1400 audit(158.110:1411): avc: denied { create } for pid=4275 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 158.227508][ T29] audit: type=1400 audit(158.110:1412): avc: denied { create } for pid=4275 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 158.238220][ T29] audit: type=1400 audit(158.130:1413): avc: denied { create } for pid=4275 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 162.797372][ T29] kauditd_printk_skb: 213 callbacks suppressed [ 162.798673][ T29] audit: type=1400 audit(162.690:1627): avc: denied { read } for pid=4286 comm="syz.1.221" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 162.811103][ T29] audit: type=1400 audit(162.700:1628): avc: denied { audit_write } for pid=4286 comm="syz.1.221" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 163.777790][ T29] audit: type=1400 audit(163.670:1629): avc: denied { write } for pid=4288 comm="syz.0.222" name="mouse0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 163.801522][ T29] audit: type=1400 audit(163.690:1630): avc: denied { create } for pid=4288 comm="syz.0.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 163.814804][ T29] audit: type=1400 audit(163.700:1631): avc: denied { module_request } for pid=4288 comm="syz.0.222" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 163.817254][ T29] audit: type=1400 audit(163.700:1632): avc: denied { sys_module } for pid=4288 comm="syz.0.222" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 164.291111][ T29] audit: type=1400 audit(164.180:1633): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 164.369150][ T29] audit: type=1400 audit(164.260:1634): avc: denied { create } for pid=4288 comm="syz.0.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 164.458679][ T29] audit: type=1400 audit(164.350:1635): avc: denied { create } for pid=4295 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 164.465961][ T29] audit: type=1400 audit(164.350:1636): avc: denied { create } for pid=4295 comm="syz.1.223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 167.823127][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 167.825257][ T29] audit: type=1400 audit(167.710:1658): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 168.009505][ T29] audit: type=1400 audit(167.900:1659): avc: denied { read write } for pid=4308 comm="syz.1.228" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 168.045308][ T29] audit: type=1400 audit(167.930:1660): avc: denied { create } for pid=4308 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 168.065699][ T29] audit: type=1400 audit(167.950:1661): avc: denied { create } for pid=4308 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 168.089287][ T29] audit: type=1400 audit(167.980:1662): avc: denied { create } for pid=4308 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 168.091580][ T29] audit: type=1400 audit(167.980:1663): avc: denied { create } for pid=4308 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 168.094584][ T29] audit: type=1400 audit(167.980:1664): avc: denied { read } for pid=4308 comm="syz.1.228" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 168.119217][ T29] audit: type=1400 audit(168.010:1665): avc: denied { create } for pid=4308 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 168.186087][ T29] audit: type=1400 audit(168.070:1666): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 168.377255][ T29] audit: type=1400 audit(168.230:1667): avc: denied { read } for pid=4311 comm="syz.1.229" name="controlC0" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 173.977318][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 173.977746][ T29] audit: type=1400 audit(173.860:1681): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 174.030658][ T29] audit: type=1400 audit(173.920:1682): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 174.165072][ T29] audit: type=1400 audit(174.050:1683): avc: denied { read write } for pid=4323 comm="syz.1.234" name="udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 174.195742][ T29] audit: type=1400 audit(174.080:1684): avc: denied { create } for pid=4323 comm="syz.1.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 174.250570][ T29] audit: type=1400 audit(174.140:1685): avc: denied { read } for pid=4323 comm="syz.1.234" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 174.271300][ T29] audit: type=1400 audit(174.160:1686): avc: denied { create } for pid=4323 comm="syz.1.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 174.279978][ T29] audit: type=1400 audit(174.170:1687): avc: denied { create } for pid=4323 comm="syz.1.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 174.360904][ T29] audit: type=1400 audit(174.250:1688): avc: denied { read write } for pid=4323 comm="syz.1.234" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 174.425737][ T29] audit: type=1400 audit(174.310:1689): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 174.463373][ T29] audit: type=1400 audit(174.350:1690): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 179.382415][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 179.384626][ T29] audit: type=1400 audit(179.270:1734): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 179.595117][ T29] audit: type=1400 audit(179.480:1735): avc: denied { create } for pid=4365 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 179.607850][ T29] audit: type=1400 audit(179.500:1736): avc: denied { create } for pid=4365 comm="syz.1.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 180.384982][ T29] audit: type=1400 audit(180.270:1737): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 180.729425][ T29] audit: type=1400 audit(180.620:1738): avc: denied { allowed } for pid=4367 comm="syz.0.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 180.808728][ T29] audit: type=1400 audit(180.700:1739): avc: denied { read } for pid=4367 comm="syz.0.252" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 181.529043][ T29] audit: type=1400 audit(181.410:1740): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 181.665601][ T29] audit: type=1400 audit(181.550:1741): avc: denied { read } for pid=4370 comm="syz.1.253" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 183.204866][ T29] audit: type=1400 audit(183.090:1742): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 183.238813][ T29] audit: type=1400 audit(183.130:1743): avc: denied { write } for pid=4370 comm="syz.1.253" name="mouse0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 184.388434][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 184.396819][ T29] audit: type=1400 audit(184.280:1757): avc: denied { read } for pid=4381 comm="syz.0.256" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 184.399125][ T29] audit: type=1400 audit(184.280:1758): avc: denied { read } for pid=4381 comm="syz.0.256" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 184.401120][ T29] audit: type=1400 audit(184.280:1759): avc: denied { read } for pid=4381 comm="syz.0.256" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 184.402775][ T29] audit: type=1400 audit(184.280:1760): avc: denied { read } for pid=4381 comm="syz.0.256" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 184.404223][ T29] audit: type=1400 audit(184.280:1761): avc: denied { read } for pid=4381 comm="syz.0.256" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 184.406003][ T29] audit: type=1400 audit(184.280:1762): avc: denied { read } for pid=4381 comm="syz.0.256" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 184.408991][ T29] audit: type=1400 audit(184.280:1763): avc: denied { read } for pid=4381 comm="syz.0.256" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 184.411077][ T29] audit: type=1400 audit(184.280:1764): avc: denied { read } for pid=4381 comm="syz.0.256" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 184.412955][ T29] audit: type=1400 audit(184.280:1765): avc: denied { read } for pid=4381 comm="syz.0.256" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 184.414946][ T29] audit: type=1400 audit(184.280:1766): avc: denied { read } for pid=4381 comm="syz.0.256" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 190.170483][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 190.171585][ T29] audit: type=1400 audit(190.050:1793): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 190.315749][ T29] audit: type=1400 audit(190.200:1794): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 190.404698][ T29] audit: type=1400 audit(190.290:1795): avc: denied { create } for pid=4395 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 190.407677][ T29] audit: type=1400 audit(190.300:1796): avc: denied { create } for pid=4395 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 190.412657][ T29] audit: type=1400 audit(190.300:1797): avc: denied { map_create } for pid=4398 comm="syz.0.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 190.427893][ T29] audit: type=1400 audit(190.320:1798): avc: denied { create } for pid=4398 comm="syz.0.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 190.457825][ T29] audit: type=1400 audit(190.350:1799): avc: denied { create } for pid=4395 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 190.481378][ T29] audit: type=1400 audit(190.370:1800): avc: denied { create } for pid=4395 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 190.511595][ T29] audit: type=1400 audit(190.400:1801): avc: denied { create } for pid=4395 comm="syz.1.259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 190.524381][ T29] audit: type=1400 audit(190.410:1802): avc: denied { create } for pid=4398 comm="syz.0.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 194.850695][ T4432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4432 comm=syz.1.272 [ 195.327079][ T29] kauditd_printk_skb: 147 callbacks suppressed [ 195.328305][ T29] audit: type=1400 audit(195.180:1950): avc: denied { create } for pid=4437 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 195.344190][ T29] audit: type=1400 audit(195.230:1951): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 195.519678][ T29] audit: type=1400 audit(195.410:1952): avc: denied { create } for pid=4439 comm="syz.1.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 195.760144][ T29] audit: type=1400 audit(195.650:1953): avc: denied { create } for pid=4433 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 196.391002][ T29] audit: type=1400 audit(196.280:1954): avc: denied { read } for pid=4433 comm="syz.0.271" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 196.928115][ T29] audit: type=1400 audit(196.820:1955): avc: denied { read } for pid=4433 comm="syz.0.271" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 198.034860][ T29] audit: type=1400 audit(197.920:1956): avc: denied { create } for pid=4433 comm="syz.0.271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 198.431701][ T29] audit: type=1400 audit(198.320:1957): avc: denied { module_request } for pid=4433 comm="syz.0.271" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 198.433746][ T29] audit: type=1400 audit(198.320:1958): avc: denied { sys_module } for pid=4433 comm="syz.0.271" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 198.753050][ T29] audit: type=1400 audit(198.630:1959): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 200.376497][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 200.377216][ T29] audit: type=1400 audit(200.260:1973): avc: denied { create } for pid=4451 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 200.419145][ T29] audit: type=1400 audit(200.310:1974): avc: denied { create } for pid=4451 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 200.478909][ T29] audit: type=1400 audit(200.370:1975): avc: denied { sys_module } for pid=4451 comm="syz.0.279" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 200.551034][ T29] audit: type=1400 audit(200.440:1976): avc: denied { create } for pid=4451 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 200.564796][ T29] audit: type=1400 audit(200.450:1977): avc: denied { create } for pid=4451 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 200.573297][ T29] audit: type=1400 audit(200.460:1978): avc: denied { create } for pid=4451 comm="syz.0.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 200.700599][ T29] audit: type=1400 audit(200.590:1979): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 207.667792][ T29] audit: type=1400 audit(207.550:1980): avc: denied { create } for pid=4439 comm="syz.1.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 210.467387][ T29] audit: type=1400 audit(210.350:1981): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 210.664854][ T29] audit: type=1400 audit(210.530:1982): avc: denied { create } for pid=4454 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 210.665280][ T29] audit: type=1400 audit(210.550:1983): avc: denied { map_create } for pid=4455 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 210.673249][ T29] audit: type=1400 audit(210.560:1984): avc: denied { create } for pid=4455 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 210.787262][ T29] audit: type=1400 audit(210.670:1985): avc: denied { read } for pid=4454 comm="syz.0.284" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 211.258454][ T29] audit: type=1400 audit(211.150:1986): avc: denied { create } for pid=4455 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 211.265104][ T29] audit: type=1400 audit(211.150:1987): avc: denied { read } for pid=4455 comm="syz.1.280" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 211.354679][ T29] audit: type=1400 audit(211.230:1988): avc: denied { create } for pid=4454 comm="syz.0.284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 212.694023][ T29] audit: type=1400 audit(212.550:1989): avc: denied { read } for pid=4455 comm="syz.1.280" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 213.164655][ T29] audit: type=1400 audit(213.050:1990): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 213.271047][ T29] audit: type=1400 audit(213.160:1991): avc: denied { create } for pid=4460 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 213.340482][ T29] audit: type=1400 audit(213.230:1992): avc: denied { create } for pid=4455 comm="syz.1.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 213.353239][ T29] audit: type=1400 audit(213.240:1993): avc: denied { create } for pid=4460 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 213.409390][ T29] audit: type=1400 audit(213.300:1994): avc: denied { read } for pid=4460 comm="syz.0.281" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 213.420383][ T29] audit: type=1400 audit(213.310:1995): avc: denied { create } for pid=4460 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 213.469452][ T29] audit: type=1400 audit(213.340:1996): avc: denied { create } for pid=4460 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 213.533606][ T29] audit: type=1400 audit(213.420:1997): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 213.634517][ T29] audit: type=1400 audit(213.520:1998): avc: denied { module_request } for pid=4455 comm="syz.1.280" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 214.915177][ T4473] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4473 comm=syz.0.287 [ 214.922507][ T4473] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=4473 comm=syz.0.287 [ 214.924607][ T4473] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4473 comm=syz.0.287 [ 215.224219][ T4475] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4475 comm=syz.0.289 [ 217.745865][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 217.747095][ T29] audit: type=1400 audit(217.630:2036): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 217.906671][ T29] audit: type=1400 audit(217.780:2037): avc: denied { create } for pid=4480 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 217.906873][ T29] audit: type=1400 audit(217.780:2038): avc: denied { create } for pid=4480 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 217.913849][ T29] audit: type=1400 audit(217.800:2039): avc: denied { map_create } for pid=4480 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 217.915412][ T29] audit: type=1400 audit(217.800:2040): avc: denied { prog_load } for pid=4480 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 217.918290][ T29] audit: type=1400 audit(217.810:2041): avc: denied { prog_load } for pid=4480 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 217.928961][ T4481] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4481 comm=syz.1.292 [ 217.956517][ T29] audit: type=1400 audit(217.820:2042): avc: denied { mount } for pid=4480 comm="syz.1.292" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 217.956819][ T29] audit: type=1400 audit(217.830:2043): avc: denied { create } for pid=4480 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 217.956923][ T29] audit: type=1400 audit(217.840:2044): avc: denied { execmem } for pid=4480 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 217.969200][ T29] audit: type=1400 audit(217.850:2045): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 224.184626][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 224.185965][ T29] audit: type=1400 audit(224.070:2070): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 224.511346][ T29] audit: type=1400 audit(224.400:2071): avc: denied { read write } for pid=4498 comm="syz.0.298" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 224.568092][ T29] audit: type=1400 audit(224.460:2072): avc: denied { create } for pid=4498 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 224.571507][ T29] audit: type=1400 audit(224.460:2073): avc: denied { create } for pid=4498 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 224.596090][ T29] audit: type=1400 audit(224.480:2074): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 224.667363][ T29] audit: type=1400 audit(224.530:2075): avc: denied { create } for pid=4498 comm="syz.0.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=0 [ 224.691175][ T29] audit: type=1400 audit(224.580:2076): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 224.743021][ T4501] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4501 comm=syz.1.299 [ 224.962261][ T29] audit: type=1400 audit(224.850:2077): avc: denied { create } for pid=4502 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 224.990202][ T29] audit: type=1400 audit(224.880:2078): avc: denied { read write } for pid=4502 comm="syz.0.300" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 225.009203][ T29] audit: type=1400 audit(224.900:2079): avc: denied { read } for pid=4502 comm="syz.0.300" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 229.240663][ T29] kauditd_printk_skb: 85 callbacks suppressed [ 229.243602][ T29] audit: type=1400 audit(229.130:2165): avc: denied { allowed } for pid=4535 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 229.260770][ T29] audit: type=1400 audit(229.150:2166): avc: denied { audit_write } for pid=4535 comm="syz.1.312" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 229.331145][ T29] audit: type=1400 audit(229.220:2167): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 229.464570][ T29] audit: type=1400 audit(229.350:2168): avc: denied { create } for pid=4537 comm="syz.1.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 229.467762][ T29] audit: type=1400 audit(229.360:2169): avc: denied { create } for pid=4537 comm="syz.1.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 230.078274][ T29] audit: type=1400 audit(229.970:2170): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 230.317242][ T29] audit: type=1400 audit(230.200:2171): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 230.457618][ T29] audit: type=1400 audit(230.340:2172): avc: denied { create } for pid=4544 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 230.457893][ T29] audit: type=1400 audit(230.340:2173): avc: denied { create } for pid=4544 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 230.459999][ T29] audit: type=1400 audit(230.350:2174): avc: denied { read } for pid=4544 comm="syz.1.315" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 233.881403][ T4571] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4571 comm=syz.1.325 [ 234.885219][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 234.888664][ T29] audit: type=1400 audit(234.770:2205): avc: denied { read } for pid=4570 comm="syz.1.325" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 235.460207][ T29] audit: type=1400 audit(235.350:2206): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 238.143233][ T29] audit: type=1400 audit(238.030:2207): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 238.452008][ T29] audit: type=1400 audit(238.340:2208): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 238.633540][ T29] audit: type=1400 audit(238.520:2209): avc: denied { read } for pid=4576 comm="syz.1.328" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 238.755980][ T29] audit: type=1400 audit(238.640:2210): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 238.908271][ T29] audit: type=1400 audit(238.800:2211): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 238.973541][ T29] audit: type=1400 audit(238.860:2212): avc: denied { create } for pid=4578 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 238.988715][ T29] audit: type=1400 audit(238.880:2213): avc: denied { create } for pid=4578 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 238.999832][ T29] audit: type=1400 audit(238.890:2214): avc: denied { create } for pid=4578 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 239.242851][ T4581] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4581 comm=syz.1.330 [ 240.185075][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 240.187470][ T29] audit: type=1400 audit(240.070:2223): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 240.211885][ T29] audit: type=1400 audit(240.100:2224): avc: denied { read } for pid=4580 comm="syz.1.330" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 240.500109][ T29] audit: type=1400 audit(240.390:2225): avc: denied { read } for pid=4586 comm="syz.0.333" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 242.168340][ T29] audit: type=1400 audit(242.060:2226): avc: denied { write } for pid=4586 comm="syz.0.333" name="mouse0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 242.178469][ T29] audit: type=1400 audit(242.070:2227): avc: denied { create } for pid=4586 comm="syz.0.333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 242.209888][ T29] audit: type=1400 audit(242.070:2228): avc: denied { module_request } for pid=4586 comm="syz.0.333" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 242.211153][ T29] audit: type=1400 audit(242.070:2229): avc: denied { sys_module } for pid=4586 comm="syz.0.333" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 243.158891][ T29] audit: type=1400 audit(243.050:2230): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 243.310580][ T29] audit: type=1400 audit(243.200:2231): avc: denied { read } for pid=4592 comm="syz.1.334" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 243.327225][ T29] audit: type=1400 audit(243.220:2232): avc: denied { allowed } for pid=4592 comm="syz.1.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 246.157333][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 246.159771][ T29] audit: type=1400 audit(246.040:2242): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 246.532162][ T29] audit: type=1400 audit(246.420:2243): avc: denied { relabelfrom } for pid=4600 comm="syz.1.337" name="" dev="pipefs" ino=5542 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 246.534188][ T29] audit: type=1400 audit(246.420:2244): avc: denied { create } for pid=4600 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 246.537274][ T29] audit: type=1400 audit(246.420:2245): avc: denied { create } for pid=4600 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 246.537529][ T29] audit: type=1400 audit(246.420:2246): avc: denied { create } for pid=4600 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 246.537739][ T29] audit: type=1400 audit(246.420:2247): avc: denied { create } for pid=4600 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 246.537969][ T29] audit: type=1400 audit(246.420:2248): avc: denied { create } for pid=4600 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 246.538176][ T29] audit: type=1400 audit(246.420:2249): avc: denied { create } for pid=4600 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 246.538376][ T29] audit: type=1400 audit(246.420:2250): avc: denied { create } for pid=4600 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 246.538594][ T29] audit: type=1400 audit(246.420:2251): avc: denied { create } for pid=4600 comm="syz.1.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 251.755440][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 251.757834][ T29] audit: type=1400 audit(251.640:2325): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 283.875796][ T29] audit: type=1400 audit(283.760:2326): avc: denied { read } for pid=4615 comm="syz.0.342" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 283.906006][ T29] audit: type=1400 audit(283.790:2327): avc: denied { read write } for pid=4614 comm="syz.1.343" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 283.938603][ T29] audit: type=1400 audit(283.830:2328): avc: denied { module_request } for pid=4615 comm="syz.0.342" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 283.939650][ T29] audit: type=1400 audit(283.830:2329): avc: denied { sys_module } for pid=4615 comm="syz.0.342" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 283.997836][ T29] audit: type=1400 audit(283.890:2330): avc: denied { read } for pid=4615 comm="syz.0.342" name="comedi2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 284.051480][ T29] audit: type=1400 audit(283.940:2331): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 284.097852][ T29] audit: type=1400 audit(283.980:2332): avc: denied { read } for pid=4615 comm="syz.0.342" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 284.265970][ T29] audit: type=1400 audit(284.150:2333): avc: denied { read write } for pid=4618 comm="syz.1.344" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 284.271851][ T29] audit: type=1400 audit(284.160:2334): avc: denied { mounton } for pid=4618 comm="syz.1.344" path="/186/file0" dev="tmpfs" ino=1015 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 284.292107][ T29] audit: type=1400 audit(284.180:2335): avc: denied { execute } for pid=4618 comm="syz.1.344" name="file0" dev="tmpfs" ino=1015 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 285.415390][ T4633] netlink: 4 bytes leftover after parsing attributes in process `syz.1.351'. [ 289.761253][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 289.763777][ T29] audit: type=1400 audit(289.650:2390): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 289.975739][ T29] audit: type=1400 audit(289.860:2391): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 290.918523][ T29] audit: type=1400 audit(290.810:2392): avc: denied { create } for pid=4667 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 291.052912][ T29] audit: type=1400 audit(290.940:2393): avc: denied { read } for pid=4663 comm="syz.0.366" name="rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 292.015127][ T29] audit: type=1400 audit(291.900:2394): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 292.621390][ T29] audit: type=1400 audit(292.510:2395): avc: denied { write } for pid=4673 comm="syz.0.369" name="raw" dev="proc" ino=4026532678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 292.818932][ T4674] netlink: 'syz.0.369': attribute type 16 has an invalid length. [ 292.819439][ T4674] netlink: 'syz.0.369': attribute type 17 has an invalid length. [ 292.829076][ T29] audit: type=1400 audit(292.700:2396): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 292.865517][ T4674] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 292.984986][ T29] audit: type=1400 audit(292.870:2397): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 293.119615][ T29] audit: type=1400 audit(293.010:2398): avc: denied { prog_load } for pid=4695 comm="syz.1.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 293.191438][ T29] audit: type=1400 audit(293.080:2399): avc: denied { create } for pid=4695 comm="syz.1.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 296.080574][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 296.083156][ T29] audit: type=1400 audit(295.970:2414): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 301.306066][ T29] audit: type=1400 audit(301.180:2415): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 301.989794][ T29] audit: type=1400 audit(301.880:2416): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 302.261030][ T29] audit: type=1400 audit(302.150:2417): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 302.699239][ T29] audit: type=1400 audit(302.590:2418): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 302.771573][ T29] audit: type=1400 audit(302.660:2419): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 303.004560][ T29] audit: type=1400 audit(302.890:2420): avc: denied { name_bind } for pid=4722 comm="syz.0.383" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 303.010527][ T29] audit: type=1400 audit(302.900:2421): avc: denied { name_bind } for pid=4722 comm="syz.0.383" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 303.230300][ T29] audit: type=1400 audit(303.120:2422): avc: denied { prog_load } for pid=4724 comm="syz.1.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 303.236061][ T29] audit: type=1400 audit(303.120:2423): avc: denied { read write } for pid=4724 comm="syz.1.382" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 303.285520][ T29] audit: type=1400 audit(303.170:2424): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 306.449952][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 306.450838][ T29] audit: type=1400 audit(306.340:2461): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 306.670382][ T29] audit: type=1400 audit(306.560:2462): avc: denied { read } for pid=4757 comm="syz.0.399" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 306.775872][ T29] audit: type=1400 audit(306.660:2463): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 307.059599][ T29] audit: type=1400 audit(306.950:2464): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 307.228850][ T4762] netlink: 8 bytes leftover after parsing attributes in process `syz.0.401'. [ 307.268826][ T29] audit: type=1400 audit(307.160:2465): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 307.562618][ T29] audit: type=1400 audit(307.450:2466): avc: denied { audit_write } for pid=4763 comm="syz.0.402" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 307.672597][ T29] audit: type=1400 audit(307.560:2467): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 307.958103][ T29] audit: type=1400 audit(307.850:2468): avc: denied { read write } for pid=4765 comm="syz.0.403" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 308.101322][ T29] audit: type=1400 audit(307.990:2469): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 308.112328][ T29] audit: type=1400 audit(308.000:2470): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 311.518022][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 311.549345][ T29] audit: type=1400 audit(311.410:2500): avc: denied { create } for pid=4783 comm="syz.1.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=0 [ 311.590281][ T29] audit: type=1400 audit(311.480:2501): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 311.885806][ T29] audit: type=1400 audit(311.770:2502): avc: denied { read } for pid=4786 comm="syz.1.414" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 311.977048][ T29] audit: type=1400 audit(311.860:2503): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 311.983417][ T29] audit: type=1400 audit(311.870:2504): avc: denied { prog_load } for pid=4785 comm="syz.0.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 312.148730][ T29] audit: type=1400 audit(312.040:2505): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 312.275262][ T29] audit: type=1400 audit(312.160:2506): avc: denied { create } for pid=4789 comm="syz.1.415" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 312.427037][ T29] audit: type=1400 audit(312.310:2507): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 312.560971][ T29] audit: type=1400 audit(312.450:2508): avc: denied { create } for pid=4791 comm="syz.0.416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 312.696659][ T29] audit: type=1400 audit(312.580:2509): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 315.850456][ T4818] netlink: 'syz.0.427': attribute type 1 has an invalid length. [ 316.072191][ T4818] 8021q: adding VLAN 0 to HW filter on device bond1 [ 316.283207][ T4818] bond1: (slave ip6erspan0): making interface the new active one [ 316.303092][ T4818] bond1: (slave ip6erspan0): Enslaving as an active interface with an up link [ 317.101011][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 317.102240][ T29] audit: type=1400 audit(316.990:2537): avc: denied { module_request } for pid=4855 comm="syz.1.429" kmod="fs-cifs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 318.298845][ T29] audit: type=1400 audit(318.190:2538): avc: denied { read } for pid=4857 comm="syz.0.430" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 318.349213][ T29] audit: type=1400 audit(318.240:2539): avc: denied { module_request } for pid=4857 comm="syz.0.430" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 318.351114][ T29] audit: type=1400 audit(318.240:2540): avc: denied { sys_module } for pid=4857 comm="syz.0.430" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 318.567124][ T29] audit: type=1400 audit(318.460:2541): avc: denied { create } for pid=4857 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 318.571566][ T29] audit: type=1400 audit(318.460:2542): avc: denied { read append } for pid=4857 comm="syz.0.430" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 318.589340][ T29] audit: type=1400 audit(318.480:2543): avc: denied { create } for pid=4857 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 318.608452][ T29] audit: type=1400 audit(318.500:2544): avc: denied { module_request } for pid=4857 comm="syz.0.430" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 318.619015][ T29] audit: type=1400 audit(318.510:2545): avc: denied { sys_module } for pid=4857 comm="syz.0.430" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 318.890619][ T29] audit: type=1400 audit(318.780:2546): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 322.409303][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 322.411365][ T29] audit: type=1400 audit(322.300:2561): avc: denied { create } for pid=4873 comm="syz.0.437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 322.414710][ T29] audit: type=1400 audit(322.300:2562): avc: denied { create } for pid=4873 comm="syz.0.437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 322.789018][ T29] audit: type=1400 audit(322.680:2563): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 323.338738][ T29] audit: type=1400 audit(323.230:2564): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 323.558101][ T29] audit: type=1400 audit(323.410:2565): avc: denied { watch watch_reads } for pid=4875 comm="syz.0.438" path="/207" dev="tmpfs" ino=1110 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 323.812330][ T29] audit: type=1400 audit(323.700:2566): avc: denied { read write } for pid=4877 comm="syz.1.439" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 324.007469][ T29] audit: type=1400 audit(323.870:2567): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 324.347602][ T29] audit: type=1400 audit(324.190:2568): avc: denied { read } for pid=4875 comm="syz.0.438" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 324.348066][ T29] audit: type=1400 audit(324.190:2569): avc: denied { create } for pid=4875 comm="syz.0.438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 324.348151][ T29] audit: type=1400 audit(324.230:2570): avc: denied { prog_load } for pid=4879 comm="syz.1.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.998480][ T4891] netlink: 8 bytes leftover after parsing attributes in process `syz.1.445'. [ 325.999620][ T4891] netlink: 12 bytes leftover after parsing attributes in process `syz.1.445'. [ 326.029128][ T4891] Zero length message leads to an empty skb [ 326.926171][ T4907] sch_tbf: burst 1023 is lower than device lo mtu (65550) ! [ 327.449282][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 327.450324][ T29] audit: type=1400 audit(327.340:2630): avc: denied { read } for pid=4915 comm="syz.1.456" name="comedi0" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 327.637031][ T29] audit: type=1400 audit(327.520:2631): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 328.091812][ T29] audit: type=1400 audit(327.980:2632): avc: denied { create } for pid=4919 comm="syz.1.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 328.142679][ T29] audit: type=1400 audit(328.030:2633): avc: denied { read write } for pid=4919 comm="syz.1.458" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 328.268821][ T29] audit: type=1400 audit(328.160:2634): avc: denied { prog_load } for pid=4919 comm="syz.1.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 328.329289][ T29] audit: type=1400 audit(328.220:2635): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 328.400935][ T29] audit: type=1400 audit(328.290:2636): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 329.316663][ T29] audit: type=1400 audit(329.190:2637): avc: denied { prog_load } for pid=4921 comm="syz.0.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 329.538403][ T29] audit: type=1400 audit(329.430:2638): avc: denied { prog_load } for pid=4921 comm="syz.0.459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 329.708582][ T29] audit: type=1400 audit(329.600:2639): avc: denied { allowed } for pid=4922 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 331.918244][ T4929] netlink: 96 bytes leftover after parsing attributes in process `syz.0.462'. [ 333.030862][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 333.046904][ T29] audit: type=1400 audit(332.920:2656): avc: denied { prog_load } for pid=4932 comm="syz.1.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 333.128550][ T29] audit: type=1400 audit(333.020:2657): avc: denied { read } for pid=4933 comm="syz.0.465" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 333.168446][ T29] audit: type=1400 audit(333.060:2658): avc: denied { read write } for pid=4933 comm="syz.0.465" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 333.293819][ T29] audit: type=1400 audit(333.180:2659): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 333.687062][ T29] audit: type=1400 audit(333.550:2660): avc: denied { create } for pid=4936 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 333.687623][ T29] audit: type=1400 audit(333.570:2661): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 333.891119][ T29] audit: type=1400 audit(333.780:2662): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 334.307633][ T29] audit: type=1400 audit(334.160:2663): avc: denied { read } for pid=4938 comm="syz.1.468" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 334.573498][ T29] audit: type=1400 audit(334.460:2664): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 334.852763][ T29] audit: type=1400 audit(334.740:2665): avc: denied { read write } for pid=4940 comm="syz.0.467" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 335.309023][ T4946] syz.0.470 uses obsolete (PF_INET,SOCK_PACKET) [ 338.628334][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 338.630400][ T29] audit: type=1400 audit(338.520:2683): avc: denied { read write } for pid=4959 comm="syz.1.476" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 338.715354][ T29] audit: type=1400 audit(338.600:2684): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 339.032506][ T29] audit: type=1400 audit(338.920:2685): avc: denied { read } for pid=4962 comm="syz.1.477" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 339.101306][ T29] audit: type=1400 audit(338.990:2686): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 339.448551][ T29] audit: type=1400 audit(339.330:2687): avc: denied { write } for pid=4964 comm="syz.1.478" name="ip6_mr_cache" dev="proc" ino=4026532794 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 339.725103][ T29] audit: type=1400 audit(339.610:2688): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 339.922428][ T29] audit: type=1400 audit(339.810:2689): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 340.354465][ T29] audit: type=1400 audit(340.240:2690): avc: denied { prog_load } for pid=4966 comm="syz.0.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 340.362023][ T29] audit: type=1400 audit(340.250:2691): avc: denied { read } for pid=4967 comm="syz.1.480" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 340.380671][ T29] audit: type=1400 audit(340.270:2692): avc: denied { read write } for pid=3094 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 340.462085][ T4969] netlink: 60 bytes leftover after parsing attributes in process `syz.1.480'. [ 340.567981][ T4971] netlink: 'syz.0.481': attribute type 21 has an invalid length. [ 341.338802][ T4981] ------------[ cut here ]------------ [ 341.339719][ T4981] WARNING: mm/highmem.c:622 at kunmap_local_indexed+0x294/0x2e8, CPU#1: syz.1.486/4981 [ 341.343186][ T4981] Modules linked in: [ 341.344411][ T4981] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 341.344973][ T4981] CPU: 1 UID: 0 PID: 4981 Comm: syz.1.486 Not tainted syzkaller #0 PREEMPT [ 341.345359][ T4981] Hardware name: ARM-Versatile Express [ 341.345613][ T4981] Call trace: [ 341.345815][ T4981] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 341.346491][ T4981] r7:82283bb8 r6:83ec5400 r5:00000000 r4:8229596c [ 341.346840][ T4981] [<80201b58>] (show_stack) from [<8021ee18>] (dump_stack_lvl+0x54/0x7c) [ 341.347345][ T4981] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 341.347683][ T4981] r5:00000000 r4:82a7bd14 [ 341.347891][ T4981] [<8021ee40>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 341.348187][ T4981] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 341.348549][ T4981] r7:804d0480 [ 341.348713][ T4981] [<80202850>] (panic) from [<802520b0>] (get_taint+0x0/0x1c) [ 341.349074][ T4981] r3:8280c704 r2:00000001 r1:8227c120 r0:82283bb8 [ 341.349356][ T4981] [<80252038>] (check_panic_on_warn) from [<80252228>] (__warn+0x94/0x1a4) [ 341.349736][ T4981] [<80252194>] (__warn) from [<802524b0>] (warn_slowpath_fmt+0x178/0x1f4) [ 341.350745][ T4981] r8:00000009 r7:822b05d4 r6:dfc2dc34 r5:83ec5400 r4:00000000 [ 341.351169][ T4981] [<8025233c>] (warn_slowpath_fmt) from [<804d0480>] (kunmap_local_indexed+0x294/0x2e8) [ 341.351672][ T4981] r10:8280ca28 r9:dfc2dd68 r8:20200000 r7:ffedd000 r6:00000001 r5:83ec5400 [ 341.352013][ T4981] r4:ffedd000 [ 341.352196][ T4981] [<804d01ec>] (kunmap_local_indexed) from [<80534e58>] (break_ksm_pmd_entry+0x168/0x270) [ 341.352638][ T4981] r7:ffedd000 r6:20200000 r5:00000000 r4:00000000 [ 341.352878][ T4981] [<80534cf0>] (break_ksm_pmd_entry) from [<804e9f0c>] (walk_pgd_range+0x3dc/0x63c) [ 341.353260][ T4981] r10:81c1f3c4 r9:20000000 r8:dfc2dd68 r7:80534cf0 r6:85da9800 r5:20200000 [ 341.353611][ T4981] r4:20400000 [ 341.353784][ T4981] [<804e9b30>] (walk_pgd_range) from [<804ea1b0>] (__walk_page_range+0x44/0x64) [ 341.354228][ T4981] r10:8291822c r9:82ad0df8 r8:81c1f3c4 r7:20400000 r6:20000000 r5:dfc2dd68 [ 341.354589][ T4981] r4:85d75f00 [ 341.354768][ T4981] [<804ea16c>] (__walk_page_range) from [<804ea894>] (walk_page_range_vma_unsafe+0xb4/0x24c) [ 341.355221][ T4981] r9:82ad0df8 r8:84eebd0c r7:81c1f3c4 r6:20400000 r5:20000000 r4:85d75f00 [ 341.355565][ T4981] [<804ea7e0>] (walk_page_range_vma_unsafe) from [<804eaa58>] (walk_page_range_vma+0x2c/0x34) [ 341.356005][ T4981] r7:dfc2ddcc r6:20400000 r5:81c1f3c4 r4:85d75f00 [ 341.356533][ T4981] [<804eaa2c>] (walk_page_range_vma) from [<80533c9c>] (break_ksm+0x5c/0x9c) [ 341.357107][ T4981] [<80533c40>] (break_ksm) from [<80536df4>] (run_store+0x2fc/0x3bc) [ 341.357709][ T4981] r7:00000002 r6:81e8bba4 r5:84eebc00 r4:84c85018 [ 341.358003][ T4981] [<80536af8>] (run_store) from [<81a88d70>] (kobj_attr_store+0x1c/0x28) [ 341.358381][ T4981] r10:85cbe610 r9:00000000 r8:833c8140 r7:85e96780 r6:81e8bba4 r5:81a88d54 [ 341.358689][ T4981] r4:80536af8 [ 341.358856][ T4981] [<81a88d54>] (kobj_attr_store) from [<8063ac5c>] (sysfs_kf_write+0x70/0x7c) [ 341.359262][ T4981] r5:81a88d54 r4:00000002 [ 341.359461][ T4981] [<8063abec>] (sysfs_kf_write) from [<80638f18>] (kernfs_fop_write_iter+0x118/0x218) [ 341.359847][ T4981] r9:00000000 r8:00000002 r7:dfc2df08 r6:00000002 r5:85cbe600 r4:85e96780 [ 341.360171][ T4981] [<80638e00>] (kernfs_fop_write_iter) from [<8056b000>] (vfs_write+0x274/0x44c) [ 341.360595][ T4981] r10:81c27144 r9:200000c0 r8:dfc2df68 r7:83ec5400 r6:00000002 r5:85d7ea80 [ 341.360936][ T4981] r4:80638e00 [ 341.361103][ T4981] [<8056ad8c>] (vfs_write) from [<8056b348>] (ksys_write+0x74/0xe8) [ 341.361484][ T4981] r10:00000004 r9:83ec5400 r8:8020029c r7:00000000 r6:00000002 r5:85d7ea80 [ 341.361821][ T4981] r4:85d7ea83 [ 341.362026][ T4981] [<8056b2d4>] (ksys_write) from [<8056b3cc>] (sys_write+0x10/0x14) [ 341.362406][ T4981] r7:00000004 r6:00316310 r5:00000000 r4:00000000 [ 341.362703][ T4981] [<8056b3bc>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 341.363062][ T4981] Exception stack(0xdfc2dfa8 to 0xdfc2dff0) [ 341.363370][ T4981] dfa0: 00000000 00000000 00000003 200000c0 00000002 00000000 [ 341.363752][ T4981] dfc0: 00000000 00000000 00316310 00000004 00300000 00000000 00006364 76fc20bc [ 341.364125][ T4981] dfe0: 76fc1ec0 76fc1eb0 0001929c 00132320 [ 341.368139][ T4981] Rebooting in 86400 seconds..