last executing test programs: 1.341211168s ago: executing program 0 (id=2562): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, 0x0, 0x0) 1.208426229s ago: executing program 0 (id=2565): r0 = openat$selinux_status(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$addseals(r0, 0x406, 0xc) 1.057735002s ago: executing program 1 (id=2566): r0 = memfd_create(&(0x7f0000000300)='-B\xd5NI\xc5j\x9a\b\x00\x00\x00\b\x84\xa2{\x00\v\x18\x004\xa6Ey\xdb\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8b\x066\xb8G\xd1c\xe1$\xff\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xc83\x12\xd7\xdb\x93\xcc]x\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93=\xabQ\xf7\x05\x81\x01\xe5\x98\r\x1d\xa1\xce\x8b\x19\xea\xef\xe3\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) 1.057558372s ago: executing program 0 (id=2567): r0 = socket$netlink(0x10, 0x3, 0x7) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0}}, 0x8000) 928.013793ms ago: executing program 1 (id=2568): r0 = openat$nullb(0xffffff9c, &(0x7f0000000040), 0x208080, 0x0) fstatfs(r0, &(0x7f00000001c0)=""/172) 829.144861ms ago: executing program 0 (id=2569): r0 = openat$selinux_context(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0x5450, 0x0) 758.586447ms ago: executing program 1 (id=2570): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 659.639595ms ago: executing program 0 (id=2571): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000200), 0x103942, 0x0) pwrite64(r0, &(0x7f00000004c0)='\n2', 0x2, 0x5) 635.883577ms ago: executing program 1 (id=2572): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$ttynull(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 480.3759ms ago: executing program 1 (id=2573): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x541b, &(0x7f0000000000)={'gre0\x00', {0x2, 0x0, @initdev}}) 480.23339ms ago: executing program 0 (id=2574): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={0x0}}, 0x0) 0s ago: executing program 1 (id=2575): r0 = syz_open_dev$audion(&(0x7f00000060c0), 0x401, 0x41) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) kernel console output (not intermixed with test programs): [ 51.833891][ T29] audit: type=1400 audit(51.750:56): avc: denied { read write } for pid=3090 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 51.836119][ T29] audit: type=1400 audit(51.750:57): avc: denied { open } for pid=3090 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:22179' (ED25519) to the list of known hosts. [ 67.341644][ T29] audit: type=1400 audit(67.250:58): avc: denied { name_bind } for pid=3093 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 69.477221][ T29] audit: type=1400 audit(69.390:59): avc: denied { execute } for pid=3094 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 69.483286][ T29] audit: type=1400 audit(69.400:60): avc: denied { execute_no_trans } for pid=3094 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 72.446257][ T29] audit: type=1400 audit(72.360:61): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 72.455106][ T29] audit: type=1400 audit(72.370:62): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 72.474224][ T3094] cgroup: Unknown subsys name 'net' [ 72.483697][ T29] audit: type=1400 audit(72.400:63): avc: denied { unmount } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 72.652496][ T3094] cgroup: Unknown subsys name 'cpuset' [ 72.659308][ T3094] cgroup: Unknown subsys name 'hugetlb' [ 72.663602][ T3094] cgroup: Unknown subsys name 'rlimit' [ 72.954063][ T29] audit: type=1400 audit(72.870:64): avc: denied { setattr } for pid=3094 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 72.956287][ T29] audit: type=1400 audit(72.870:65): avc: denied { mounton } for pid=3094 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 72.957756][ T29] audit: type=1400 audit(72.870:66): avc: denied { mount } for pid=3094 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 73.111688][ T3096] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 73.115614][ T29] audit: type=1400 audit(73.030:67): avc: denied { relabelto } for pid=3096 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.119229][ T29] audit: type=1400 audit(73.030:68): avc: denied { write } for pid=3096 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 73.152929][ T29] audit: type=1400 audit(73.070:69): avc: denied { read } for pid=3094 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.155447][ T29] audit: type=1400 audit(73.070:70): avc: denied { open } for pid=3094 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 78.398211][ T3094] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 80.460533][ T29] audit: type=1400 audit(80.370:71): avc: denied { execmem } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 80.535026][ T29] audit: type=1400 audit(80.450:72): avc: denied { read } for pid=3099 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.537334][ T29] audit: type=1400 audit(80.450:73): avc: denied { open } for pid=3099 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 80.542483][ T29] audit: type=1400 audit(80.460:74): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 80.571609][ T29] audit: type=1400 audit(80.490:75): avc: denied { module_request } for pid=3099 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.573917][ T29] audit: type=1400 audit(80.490:76): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.664562][ T29] audit: type=1400 audit(80.580:77): avc: denied { sys_module } for pid=3100 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 81.384181][ T29] audit: type=1400 audit(81.300:78): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 82.628057][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.642759][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.776791][ T3099] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 82.787458][ T3099] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 83.666498][ T3100] hsr_slave_0: entered promiscuous mode [ 83.673950][ T3100] hsr_slave_1: entered promiscuous mode [ 83.782361][ T3099] hsr_slave_0: entered promiscuous mode [ 83.784516][ T3099] hsr_slave_1: entered promiscuous mode [ 83.791289][ T3099] debugfs: 'hsr0' already exists in 'hsr' [ 83.792101][ T3099] Cannot create hsr debugfs directory [ 84.238236][ T29] audit: type=1400 audit(84.150:79): avc: denied { create } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.238658][ T29] audit: type=1400 audit(84.150:80): avc: denied { write } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 84.251161][ T3100] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 84.272773][ T3100] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 84.283061][ T3100] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 84.302989][ T3100] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 84.393594][ T3099] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 84.405682][ T3099] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 84.425766][ T3099] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 84.437654][ T3099] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 85.222487][ T3099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.277219][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.154891][ T3100] veth0_vlan: entered promiscuous mode [ 88.185165][ T3099] veth0_vlan: entered promiscuous mode [ 88.200318][ T3100] veth1_vlan: entered promiscuous mode [ 88.208488][ T3099] veth1_vlan: entered promiscuous mode [ 88.283564][ T3099] veth0_macvtap: entered promiscuous mode [ 88.295891][ T3100] veth0_macvtap: entered promiscuous mode [ 88.302066][ T3099] veth1_macvtap: entered promiscuous mode [ 88.316704][ T3100] veth1_macvtap: entered promiscuous mode [ 88.373728][ T1358] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.374666][ T1358] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.374761][ T1358] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.374849][ T1358] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.463610][ T38] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.464140][ T38] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.464227][ T38] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.464320][ T38] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.497710][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 88.497997][ T29] audit: type=1400 audit(88.410:82): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 88.507224][ T29] audit: type=1400 audit(88.420:83): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.macB8K/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 88.513131][ T29] audit: type=1400 audit(88.430:84): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 88.521418][ T29] audit: type=1400 audit(88.440:85): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.macB8K/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 88.525474][ T29] audit: type=1400 audit(88.440:86): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/syzkaller.macB8K/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=959 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 88.542393][ T29] audit: type=1400 audit(88.460:87): avc: denied { unmount } for pid=3099 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 88.556000][ T29] audit: type=1400 audit(88.470:88): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 88.563408][ T29] audit: type=1400 audit(88.480:89): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="gadgetfs" ino=960 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 88.570889][ T29] audit: type=1400 audit(88.490:90): avc: denied { mount } for pid=3099 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 88.573784][ T29] audit: type=1400 audit(88.490:91): avc: denied { mounton } for pid=3099 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 88.651739][ T3100] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 88.651741][ T3099] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 91.388411][ T3859] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3859 comm=syz.0.34 [ 92.954236][ T3917] capability: warning: `syz.1.63' uses 32-bit capabilities (legacy support in use) [ 94.268850][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 94.269321][ T29] audit: type=1400 audit(94.180:105): avc: denied { append } for pid=3968 comm="syz.0.89" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 94.608774][ T3981] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3981 comm=syz.1.95 [ 95.116253][ T29] audit: type=1400 audit(95.030:106): avc: denied { create } for pid=4000 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 95.123966][ T29] audit: type=1400 audit(95.040:107): avc: denied { ioctl } for pid=4000 comm="syz.1.105" path="socket:[2792]" dev="sockfs" ino=2792 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 96.282600][ T29] audit: type=1400 audit(96.200:108): avc: denied { getattr } for pid=4048 comm="syz.0.129" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 96.927457][ T29] audit: type=1400 audit(96.840:109): avc: denied { lock } for pid=4071 comm="syz.0.140" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 97.007849][ T29] audit: type=1400 audit(96.920:110): avc: denied { create } for pid=4074 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 97.015469][ T4076] Zero length message leads to an empty skb [ 97.015589][ T29] audit: type=1400 audit(96.930:111): avc: denied { write } for pid=4074 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 97.040582][ T4077] TCP: TCP_TX_DELAY enabled [ 97.138777][ T29] audit: type=1400 audit(97.050:112): avc: denied { create } for pid=4079 comm="syz.1.144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 97.147590][ T29] audit: type=1400 audit(97.060:113): avc: denied { ioctl } for pid=4079 comm="syz.1.144" path="socket:[2926]" dev="sockfs" ino=2926 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 97.253001][ T4085] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4085 comm=syz.1.147 [ 97.524540][ T29] audit: type=1400 audit(97.440:114): avc: denied { bind } for pid=4094 comm="syz.0.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 98.653957][ T4141] netlink: 4 bytes leftover after parsing attributes in process `syz.1.175'. [ 99.496723][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 99.498858][ T29] audit: type=1400 audit(99.410:120): avc: denied { connect } for pid=4176 comm="syz.1.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 99.725242][ T29] audit: type=1400 audit(99.640:121): avc: denied { create } for pid=4185 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 99.741892][ T29] audit: type=1400 audit(99.660:122): avc: denied { write } for pid=4185 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 99.741918][ T4187] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4187 comm=syz.0.198 [ 99.890558][ T4192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4192 comm=syz.0.200 [ 100.828893][ T29] audit: type=1400 audit(100.740:123): avc: denied { create } for pid=4231 comm="syz.1.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 100.835314][ T29] audit: type=1400 audit(100.750:124): avc: denied { setattr } for pid=4231 comm="syz.1.221" name="NETLINK" dev="sockfs" ino=4219 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 101.335522][ T29] audit: type=1400 audit(101.250:125): avc: denied { ioctl } for pid=4251 comm="syz.1.231" path="socket:[4252]" dev="sockfs" ino=4252 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 101.533617][ T4262] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4262 comm=syz.1.235 [ 102.452373][ T29] audit: type=1400 audit(102.370:126): avc: denied { perfmon } for pid=4296 comm="syz.0.252" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 102.534862][ T29] audit: type=1400 audit(102.450:127): avc: denied { map_read map_write } for pid=4296 comm="syz.0.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 104.355123][ T29] audit: type=1400 audit(104.270:128): avc: denied { ioctl } for pid=4356 comm="syz.0.282" path="socket:[3952]" dev="sockfs" ino=3952 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 106.172506][ T29] audit: type=1400 audit(106.080:129): avc: denied { create } for pid=4425 comm="syz.0.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 106.172976][ T29] audit: type=1400 audit(106.090:130): avc: denied { ioctl } for pid=4425 comm="syz.0.316" path="socket:[4552]" dev="sockfs" ino=4552 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 106.621951][ T4448] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4448 comm=syz.0.327 [ 107.409328][ T29] audit: type=1400 audit(107.320:131): avc: denied { associate } for pid=4484 comm="syz.0.346" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 107.671518][ T45] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 107.889327][ T45] usb 2-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 107.889762][ T45] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 107.893419][ T45] usb 2-1: Product: syz [ 107.893597][ T45] usb 2-1: Manufacturer: syz [ 107.893687][ T45] usb 2-1: SerialNumber: syz [ 108.361584][ T45] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPROTO [ 108.362286][ T45] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Failed to sync IRQ enable register: -EPROTO [ 108.364694][ T45] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000010. ret = -EPROTO [ 108.365312][ T45] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 108.367056][ T45] lan78xx 2-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 108.374981][ T45] lan78xx 2-1:1.0: probe with driver lan78xx failed with error -71 [ 108.417203][ T45] usb 2-1: USB disconnect, device number 2 [ 109.125619][ T29] audit: type=1400 audit(109.040:132): avc: denied { setopt } for pid=4547 comm="syz.1.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 109.798416][ T29] audit: type=1400 audit(109.710:133): avc: denied { read write } for pid=4573 comm="syz.1.384" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 109.802342][ T29] audit: type=1400 audit(109.710:134): avc: denied { open } for pid=4573 comm="syz.1.384" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 109.808760][ T29] audit: type=1400 audit(109.720:135): avc: denied { ioctl } for pid=4573 comm="syz.1.384" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x620c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 109.814845][ T4575] binder: 4573:4575 ioctl c018620c 20000b00 returned -1 [ 111.314736][ T29] audit: type=1400 audit(111.230:136): avc: denied { read } for pid=4630 comm="syz.1.413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 111.404374][ T29] audit: type=1400 audit(111.320:137): avc: denied { setopt } for pid=4633 comm="syz.0.414" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 112.937133][ T29] audit: type=1400 audit(112.830:138): avc: denied { setopt } for pid=4658 comm="syz.1.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 114.949136][ T4712] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1281 sclass=netlink_route_socket pid=4712 comm=syz.0.452 [ 115.265667][ T29] audit: type=1400 audit(115.180:139): avc: denied { read } for pid=4723 comm="syz.0.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 116.036796][ T29] audit: type=1400 audit(115.950:140): avc: granted { setsecparam } for pid=4752 comm="syz.0.473" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 116.835128][ T4784] mmap: syz.1.488 (4784) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 117.255421][ T29] audit: type=1400 audit(117.170:141): avc: denied { lock } for pid=4800 comm="syz.1.497" path="socket:[6166]" dev="sockfs" ino=6166 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 117.327532][ T29] audit: type=1400 audit(117.240:142): avc: denied { create } for pid=4803 comm="syz.0.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 117.366525][ T29] audit: type=1400 audit(117.270:143): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 117.374194][ T29] audit: type=1400 audit(117.270:144): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 117.382814][ T29] audit: type=1400 audit(117.270:145): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 117.492415][ T29] audit: type=1400 audit(117.410:146): avc: denied { read write } for pid=4808 comm="syz.0.500" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 117.500907][ T29] audit: type=1400 audit(117.410:147): avc: denied { open } for pid=4808 comm="syz.0.500" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 117.732345][ T29] audit: type=1400 audit(117.650:148): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 117.741010][ T29] audit: type=1400 audit(117.650:149): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 117.747343][ T29] audit: type=1400 audit(117.660:150): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 121.292411][ T4867] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=531 sclass=netlink_audit_socket pid=4867 comm=syz.0.529 [ 122.041274][ T4880] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4880 comm=syz.1.535 [ 122.267606][ T4883] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=4883 comm=syz.0.541 [ 122.324296][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 122.327893][ T29] audit: type=1400 audit(122.240:268): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 122.328323][ T29] audit: type=1400 audit(122.240:269): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 122.334233][ T29] audit: type=1400 audit(122.250:270): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 122.357390][ T29] audit: type=1400 audit(122.270:271): avc: denied { read append } for pid=4882 comm="syz.1.536" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 122.365989][ T29] audit: type=1400 audit(122.280:272): avc: denied { read open } for pid=4882 comm="syz.1.536" path="/dev/ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 122.406119][ T29] audit: type=1400 audit(122.320:273): avc: denied { ioctl } for pid=4882 comm="syz.1.536" path="/dev/ttyprintk" dev="devtmpfs" ino=610 ioctlcmd=0x5419 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 122.516294][ T29] audit: type=1400 audit(122.430:274): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 122.527190][ T29] audit: type=1400 audit(122.430:275): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 122.527589][ T29] audit: type=1400 audit(122.440:276): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 122.581666][ T29] audit: type=1400 audit(122.500:277): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 122.958140][ T4893] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=4893 comm=syz.1.542 [ 126.902368][ T4956] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4956 comm=syz.0.574 [ 127.449048][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 127.449873][ T29] audit: type=1400 audit(127.360:403): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 127.462896][ T29] audit: type=1400 audit(127.380:404): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 127.475421][ T29] audit: type=1400 audit(127.390:405): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 127.594285][ T29] audit: type=1400 audit(127.510:406): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 127.597579][ T29] audit: type=1400 audit(127.510:407): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 127.621412][ T29] audit: type=1400 audit(127.530:408): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 127.803801][ T29] audit: type=1400 audit(127.720:409): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 127.807368][ T29] audit: type=1400 audit(127.720:410): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 127.818120][ T29] audit: type=1400 audit(127.730:411): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 127.900212][ T29] audit: type=1400 audit(127.810:412): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 132.467227][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 132.467578][ T29] audit: type=1400 audit(132.380:540): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 132.479262][ T29] audit: type=1400 audit(132.390:541): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 132.483506][ T29] audit: type=1400 audit(132.400:542): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 132.568951][ T29] audit: type=1400 audit(132.480:543): avc: denied { read write } for pid=5039 comm="syz.1.616" name="uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 132.573820][ T29] audit: type=1400 audit(132.490:544): avc: denied { read write open } for pid=5039 comm="syz.1.616" path="/dev/uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 132.596544][ T29] audit: type=1400 audit(132.510:545): avc: denied { ioctl } for pid=5039 comm="syz.1.616" path="/dev/uinput" dev="devtmpfs" ino=697 ioctlcmd=0x556c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 132.708483][ T29] audit: type=1400 audit(132.620:546): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 132.716974][ T29] audit: type=1400 audit(132.630:547): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 132.736647][ T29] audit: type=1400 audit(132.650:548): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 132.740241][ T29] audit: type=1400 audit(132.650:549): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 137.470984][ T29] kauditd_printk_skb: 134 callbacks suppressed [ 137.471326][ T29] audit: type=1400 audit(137.390:684): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 137.575869][ T29] audit: type=1400 audit(137.490:685): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 137.581191][ T29] audit: type=1400 audit(137.500:686): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 137.587688][ T29] audit: type=1400 audit(137.500:687): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 137.740183][ T29] audit: type=1400 audit(137.650:688): avc: denied { create } for pid=5122 comm="syz.1.657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 137.754938][ T29] audit: type=1400 audit(137.670:689): avc: denied { lock } for pid=5122 comm="syz.1.657" path="socket:[7212]" dev="sockfs" ino=7212 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 137.806798][ T29] audit: type=1400 audit(137.720:690): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 137.812605][ T29] audit: type=1400 audit(137.730:691): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 137.828719][ T29] audit: type=1400 audit(137.730:692): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 137.845602][ T29] audit: type=1400 audit(137.760:693): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 142.600982][ T29] kauditd_printk_skb: 120 callbacks suppressed [ 142.603883][ T29] audit: type=1400 audit(142.520:814): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 142.615881][ T29] audit: type=1400 audit(142.530:815): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 142.622284][ T29] audit: type=1400 audit(142.540:816): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 142.754392][ T29] audit: type=1400 audit(142.670:817): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 142.758838][ T29] audit: type=1400 audit(142.670:818): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 142.767292][ T29] audit: type=1400 audit(142.680:819): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 142.945493][ T29] audit: type=1400 audit(142.860:820): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 142.948101][ T29] audit: type=1400 audit(142.860:821): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 142.966646][ T29] audit: type=1400 audit(142.880:822): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 143.022963][ T29] audit: type=1400 audit(142.940:823): avc: denied { module_request } for pid=5201 comm="syz.0.696" kmod="tcp_H" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 147.789988][ T29] kauditd_printk_skb: 115 callbacks suppressed [ 147.790380][ T29] audit: type=1400 audit(147.700:939): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 147.817894][ T29] audit: type=1400 audit(147.730:940): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 147.826756][ T29] audit: type=1400 audit(147.740:941): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 148.043741][ T29] audit: type=1400 audit(147.960:942): avc: denied { create } for pid=5269 comm="syz.1.729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 148.054243][ T29] audit: type=1400 audit(147.970:943): avc: denied { write } for pid=5269 comm="syz.1.729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 148.124468][ T29] audit: type=1400 audit(148.040:944): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 148.124811][ T29] audit: type=1400 audit(148.040:945): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 148.134858][ T29] audit: type=1400 audit(148.050:946): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 148.313462][ T29] audit: type=1400 audit(148.230:947): avc: denied { create } for pid=5271 comm="syz.1.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 148.328247][ T29] audit: type=1400 audit(148.240:948): avc: denied { setopt } for pid=5271 comm="syz.1.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 152.833361][ T29] kauditd_printk_skb: 112 callbacks suppressed [ 152.833709][ T29] audit: type=1400 audit(152.750:1061): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 152.846800][ T29] audit: type=1400 audit(152.760:1062): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 152.866213][ T29] audit: type=1400 audit(152.780:1063): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 152.872638][ T29] audit: type=1400 audit(152.780:1064): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 152.877502][ T29] audit: type=1400 audit(152.790:1065): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 152.892344][ T29] audit: type=1400 audit(152.800:1066): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 153.189219][ T29] audit: type=1400 audit(153.100:1067): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 153.207554][ T29] audit: type=1400 audit(153.120:1068): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 153.215193][ T29] audit: type=1400 audit(153.130:1069): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 153.228290][ T29] audit: type=1400 audit(153.140:1070): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 157.593182][ T5412] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=771 sclass=netlink_route_socket pid=5412 comm=syz.1.799 [ 157.856195][ T29] kauditd_printk_skb: 120 callbacks suppressed [ 157.856638][ T29] audit: type=1400 audit(157.770:1191): avc: denied { read } for pid=5414 comm="syz.1.801" name="system" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 157.866403][ T29] audit: type=1400 audit(157.780:1192): avc: denied { read open } for pid=5414 comm="syz.1.801" path="/dev/dma_heap/system" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 157.983725][ T29] audit: type=1400 audit(157.900:1193): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 157.990458][ T29] audit: type=1400 audit(157.900:1194): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 157.990845][ T29] audit: type=1400 audit(157.900:1195): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 157.991074][ T29] audit: type=1400 audit(157.900:1196): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 157.991247][ T29] audit: type=1400 audit(157.900:1197): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 157.998010][ T29] audit: type=1400 audit(157.910:1198): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 158.186714][ T29] audit: type=1400 audit(158.100:1199): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 158.192602][ T29] audit: type=1400 audit(158.100:1200): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.015484][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 163.016002][ T29] audit: type=1400 audit(162.930:1326): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.029044][ T29] audit: type=1400 audit(162.940:1327): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.030111][ T29] audit: type=1400 audit(162.940:1328): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.099418][ T29] audit: type=1400 audit(163.010:1329): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.104700][ T29] audit: type=1400 audit(163.020:1330): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.124361][ T29] audit: type=1400 audit(163.030:1331): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.339285][ T29] audit: type=1400 audit(163.250:1332): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.343939][ T29] audit: type=1400 audit(163.260:1333): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.355255][ T29] audit: type=1400 audit(163.270:1334): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 163.638548][ T29] audit: type=1400 audit(163.550:1335): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.110824][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 168.111229][ T29] audit: type=1400 audit(168.020:1432): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.111503][ T29] audit: type=1400 audit(168.020:1433): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.122973][ T29] audit: type=1400 audit(168.040:1434): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.125652][ T29] audit: type=1400 audit(168.040:1435): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.128440][ T29] audit: type=1400 audit(168.040:1436): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.133353][ T29] audit: type=1400 audit(168.040:1437): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.365559][ T29] audit: type=1400 audit(168.280:1438): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.371560][ T29] audit: type=1400 audit(168.290:1439): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.377134][ T29] audit: type=1400 audit(168.290:1440): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.476976][ T29] audit: type=1400 audit(168.390:1441): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 168.736810][ T5566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=5566 comm=syz.1.876 [ 173.178298][ T29] kauditd_printk_skb: 122 callbacks suppressed [ 173.178723][ T29] audit: type=1400 audit(173.090:1564): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.197342][ T29] audit: type=1400 audit(173.110:1565): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.211129][ T29] audit: type=1400 audit(173.120:1566): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.263110][ T5639] netlink: 4 bytes leftover after parsing attributes in process `syz.1.912'. [ 173.367306][ T29] audit: type=1400 audit(173.280:1567): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.375177][ T29] audit: type=1400 audit(173.290:1568): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.393840][ T29] audit: type=1400 audit(173.310:1569): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.476098][ T29] audit: type=1400 audit(173.390:1570): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.482345][ T29] audit: type=1400 audit(173.400:1571): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.487692][ T29] audit: type=1400 audit(173.400:1572): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 173.644922][ T29] audit: type=1400 audit(173.560:1573): avc: denied { read write } for pid=5643 comm="syz.0.915" name="adsp1" dev="devtmpfs" ino=736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 178.205456][ T29] kauditd_printk_skb: 123 callbacks suppressed [ 178.205833][ T29] audit: type=1400 audit(178.120:1697): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 178.216648][ T29] audit: type=1400 audit(178.130:1698): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 178.243433][ T29] audit: type=1400 audit(178.150:1699): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 178.379468][ T29] audit: type=1400 audit(178.290:1700): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 178.395180][ T29] audit: type=1400 audit(178.310:1701): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 178.403749][ T29] audit: type=1400 audit(178.320:1702): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 178.911405][ T29] audit: type=1400 audit(178.830:1703): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 178.915295][ T29] audit: type=1400 audit(178.830:1704): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 178.951009][ T29] audit: type=1400 audit(178.850:1705): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 179.511173][ T29] audit: type=1400 audit(179.430:1706): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 181.593004][ T5743] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5743 comm=syz.0.964 [ 183.246393][ T29] kauditd_printk_skb: 81 callbacks suppressed [ 183.246786][ T29] audit: type=1400 audit(183.160:1788): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.264056][ T29] audit: type=1400 audit(183.180:1789): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.269166][ T29] audit: type=1400 audit(183.180:1790): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.312363][ T29] audit: type=1400 audit(183.230:1791): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.315866][ T29] audit: type=1400 audit(183.230:1792): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.327109][ T29] audit: type=1400 audit(183.240:1793): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.517261][ T29] audit: type=1400 audit(183.430:1794): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.525614][ T29] audit: type=1400 audit(183.440:1795): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.538126][ T29] audit: type=1400 audit(183.450:1796): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 183.569255][ T29] audit: type=1400 audit(183.480:1797): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.273508][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 188.273865][ T29] audit: type=1400 audit(188.190:1927): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.288699][ T29] audit: type=1400 audit(188.200:1928): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.310247][ T29] audit: type=1400 audit(188.210:1929): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.448856][ T29] audit: type=1400 audit(188.360:1930): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.453609][ T29] audit: type=1400 audit(188.370:1931): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.466439][ T29] audit: type=1400 audit(188.380:1932): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.626082][ T29] audit: type=1400 audit(188.540:1933): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.631455][ T29] audit: type=1400 audit(188.550:1934): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.643828][ T29] audit: type=1400 audit(188.560:1935): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 188.802123][ T29] audit: type=1400 audit(188.720:1936): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 193.308402][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 193.309989][ T29] audit: type=1400 audit(193.220:2058): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 193.324337][ T29] audit: type=1400 audit(193.240:2059): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 193.333843][ T29] audit: type=1400 audit(193.250:2060): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 193.554247][ T29] audit: type=1400 audit(193.470:2061): avc: denied { create } for pid=5931 comm="syz.1.1059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 193.565235][ T29] audit: type=1400 audit(193.480:2062): avc: denied { write } for pid=5931 comm="syz.1.1059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 193.587367][ T29] audit: type=1400 audit(193.500:2063): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 193.592651][ T29] audit: type=1400 audit(193.510:2064): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 193.612698][ T29] audit: type=1400 audit(193.530:2065): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 193.704330][ T29] audit: type=1400 audit(193.620:2066): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 193.708425][ T29] audit: type=1400 audit(193.620:2067): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 194.341934][ T5943] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=5943 comm=syz.0.1064 [ 196.416440][ T5976] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=5976 comm=syz.1.1079 [ 198.314841][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 198.317931][ T29] audit: type=1400 audit(198.230:2196): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 198.570825][ T29] audit: type=1400 audit(198.480:2197): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 198.573286][ T29] audit: type=1400 audit(198.490:2198): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 198.576495][ T29] audit: type=1400 audit(198.490:2199): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 198.579310][ T29] audit: type=1400 audit(198.490:2200): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 198.590425][ T29] audit: type=1400 audit(198.490:2201): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 198.592923][ T29] audit: type=1400 audit(198.500:2202): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 198.754113][ T29] audit: type=1400 audit(198.670:2203): avc: denied { write } for pid=6015 comm="syz.0.1101" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 198.756487][ T29] audit: type=1400 audit(198.670:2204): avc: denied { write open } for pid=6015 comm="syz.0.1101" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 198.798911][ T29] audit: type=1400 audit(198.710:2205): avc: denied { create } for pid=6016 comm="syz.1.1100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 201.335234][ T6052] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6052 comm=syz.0.1118 [ 203.363482][ T29] kauditd_printk_skb: 116 callbacks suppressed [ 203.364004][ T29] audit: type=1400 audit(203.280:2322): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 203.368104][ T29] audit: type=1400 audit(203.280:2323): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 203.389278][ T29] audit: type=1400 audit(203.290:2324): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 203.397758][ T29] audit: type=1400 audit(203.310:2325): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 203.406069][ T29] audit: type=1400 audit(203.320:2326): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 203.415316][ T29] audit: type=1400 audit(203.330:2327): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 203.647914][ T29] audit: type=1400 audit(203.550:2328): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 203.662692][ T29] audit: type=1400 audit(203.580:2329): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 203.666841][ T29] audit: type=1400 audit(203.580:2330): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 203.746670][ T29] audit: type=1400 audit(203.660:2331): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 204.987154][ T6102] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=6102 comm=syz.0.1143 [ 208.374683][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 208.377256][ T29] audit: type=1400 audit(208.290:2432): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 208.428229][ T29] audit: type=1400 audit(208.340:2433): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 208.433225][ T29] audit: type=1400 audit(208.340:2434): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 208.435591][ T29] audit: type=1400 audit(208.340:2435): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 208.664900][ T29] audit: type=1400 audit(208.580:2436): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 208.674977][ T29] audit: type=1400 audit(208.590:2437): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 208.681666][ T29] audit: type=1400 audit(208.600:2438): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 208.721002][ T29] audit: type=1400 audit(208.640:2439): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 208.723535][ T29] audit: type=1400 audit(208.640:2440): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 208.736311][ T29] audit: type=1400 audit(208.650:2441): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 209.134434][ T6158] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6158 comm=syz.1.1171 [ 213.545499][ T29] kauditd_printk_skb: 119 callbacks suppressed [ 213.546700][ T29] audit: type=1400 audit(213.450:2561): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 213.553496][ T29] audit: type=1400 audit(213.470:2562): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 213.556578][ T29] audit: type=1400 audit(213.470:2563): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 213.674494][ T29] audit: type=1400 audit(213.590:2564): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 213.681513][ T29] audit: type=1400 audit(213.590:2565): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 213.688073][ T29] audit: type=1400 audit(213.600:2566): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 213.952231][ T29] audit: type=1400 audit(213.870:2567): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 213.960493][ T29] audit: type=1400 audit(213.870:2568): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 213.962454][ T29] audit: type=1400 audit(213.870:2569): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 214.012622][ T29] audit: type=1400 audit(213.930:2570): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 214.454224][ T6239] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 218.599109][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 218.601380][ T29] audit: type=1400 audit(218.510:2700): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 218.606674][ T29] audit: type=1400 audit(218.520:2701): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 218.608752][ T29] audit: type=1400 audit(218.520:2702): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 218.615720][ T29] audit: type=1400 audit(218.530:2703): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 218.624168][ T29] audit: type=1400 audit(218.540:2704): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 218.626909][ T29] audit: type=1400 audit(218.540:2705): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 218.841956][ T29] audit: type=1400 audit(218.760:2706): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 218.860902][ T29] audit: type=1400 audit(218.770:2707): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 218.873243][ T29] audit: type=1400 audit(218.790:2708): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 218.922403][ T29] audit: type=1400 audit(218.840:2709): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 219.305411][ T6313] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=6313 comm=syz.0.1248 [ 223.600810][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 223.601146][ T29] audit: type=1400 audit(223.510:2837): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 223.716717][ T29] audit: type=1400 audit(223.630:2838): avc: denied { read } for pid=6378 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.740643][ T29] audit: type=1400 audit(223.650:2839): avc: denied { read } for pid=6379 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 223.760401][ T29] audit: type=1400 audit(223.670:2840): avc: denied { create } for pid=6378 comm="syz.1.1281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 223.783551][ T29] audit: type=1400 audit(223.700:2841): avc: denied { write } for pid=6378 comm="syz.1.1281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 223.865456][ T29] audit: type=1400 audit(223.780:2842): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 223.871380][ T29] audit: type=1400 audit(223.790:2843): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 223.876548][ T29] audit: type=1400 audit(223.790:2844): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 223.934285][ T29] audit: type=1400 audit(223.850:2845): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 223.937972][ T29] audit: type=1400 audit(223.850:2846): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 228.636168][ T29] kauditd_printk_skb: 175 callbacks suppressed [ 228.636675][ T29] audit: type=1400 audit(228.550:3022): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 228.657119][ T29] audit: type=1400 audit(228.570:3023): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 228.671649][ T29] audit: type=1400 audit(228.580:3024): avc: denied { read } for pid=6460 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 228.672083][ T29] audit: type=1400 audit(228.580:3025): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 228.784492][ T29] audit: type=1400 audit(228.700:3026): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 228.790328][ T29] audit: type=1400 audit(228.700:3027): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 228.803835][ T29] audit: type=1400 audit(228.720:3028): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 228.925364][ T29] audit: type=1400 audit(228.840:3029): avc: denied { read } for pid=6462 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 228.937059][ T29] audit: type=1400 audit(228.850:3030): avc: denied { read } for pid=6463 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 229.030689][ T29] audit: type=1400 audit(228.940:3031): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 229.234897][ T6467] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=515 sclass=netlink_audit_socket pid=6467 comm=syz.1.1325 [ 231.493718][ T6497] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6497 comm=syz.0.1340 [ 233.911822][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 233.912290][ T29] audit: type=1400 audit(233.830:3158): avc: denied { read } for pid=6518 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 233.975655][ T29] audit: type=1400 audit(233.890:3159): avc: denied { create } for pid=6518 comm="syz.0.1351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 234.085308][ T29] audit: type=1400 audit(234.000:3160): avc: denied { write } for pid=6518 comm="syz.0.1351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 234.180930][ T29] audit: type=1400 audit(234.090:3161): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 234.205800][ T29] audit: type=1400 audit(234.120:3162): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 234.206302][ T29] audit: type=1400 audit(234.120:3163): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 234.278997][ T29] audit: type=1400 audit(234.190:3164): avc: denied { read } for pid=6520 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 234.680291][ T29] audit: type=1400 audit(234.590:3165): avc: denied { read } for pid=6521 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 234.781183][ T29] audit: type=1400 audit(234.690:3166): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 234.784171][ T29] audit: type=1400 audit(234.690:3167): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 238.993502][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 238.994579][ T29] audit: type=1400 audit(238.890:3219): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 238.996451][ T29] audit: type=1400 audit(238.910:3220): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 239.081130][ T29] audit: type=1400 audit(238.960:3221): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 239.374717][ T29] audit: type=1400 audit(239.290:3222): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 239.400500][ T29] audit: type=1400 audit(239.310:3223): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 239.403140][ T29] audit: type=1400 audit(239.310:3224): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 239.560209][ T29] audit: type=1400 audit(239.470:3225): avc: denied { read } for pid=6547 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 239.942833][ T29] audit: type=1400 audit(239.860:3226): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 240.052327][ T29] audit: type=1400 audit(239.970:3227): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 240.052756][ T29] audit: type=1400 audit(239.970:3228): avc: denied { read } for pid=6549 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 242.164760][ T6579] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65534 sclass=netlink_audit_socket pid=6579 comm=syz.1.1381 [ 243.595754][ T6604] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6604 comm=syz.1.1392 [ 244.066970][ T29] kauditd_printk_skb: 135 callbacks suppressed [ 244.067377][ T29] audit: type=1400 audit(243.980:3364): avc: denied { read } for pid=6609 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 244.095117][ T29] audit: type=1400 audit(244.010:3365): avc: denied { create } for pid=6609 comm="syz.0.1396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 244.105261][ T29] audit: type=1400 audit(244.020:3366): avc: denied { ioctl } for pid=6609 comm="syz.0.1396" path="socket:[12303]" dev="sockfs" ino=12303 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 244.166048][ T29] audit: type=1400 audit(244.080:3367): avc: denied { read } for pid=6611 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 244.237924][ T29] audit: type=1400 audit(244.150:3368): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.245707][ T29] audit: type=1400 audit(244.160:3369): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.268590][ T29] audit: type=1400 audit(244.170:3370): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.269076][ T29] audit: type=1400 audit(244.170:3371): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.269269][ T29] audit: type=1400 audit(244.170:3372): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 244.269328][ T29] audit: type=1400 audit(244.180:3373): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 248.356964][ T6683] SELinux: Context system_u:object_r:crack_db_t:s0 is not valid (left unmapped). [ 249.151994][ T29] kauditd_printk_skb: 164 callbacks suppressed [ 249.156199][ T29] audit: type=1400 audit(249.070:3538): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 249.176087][ T29] audit: type=1400 audit(249.090:3539): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 249.193152][ T29] audit: type=1400 audit(249.110:3540): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 249.276310][ T29] audit: type=1400 audit(249.190:3541): avc: denied { read } for pid=6696 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.316085][ T29] audit: type=1400 audit(249.230:3542): avc: denied { read write } for pid=6696 comm="syz.0.1436" name="midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.325086][ T29] audit: type=1400 audit(249.230:3543): avc: denied { read open } for pid=6696 comm="syz.0.1436" path="/dev/midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.371747][ T29] audit: type=1400 audit(249.290:3544): avc: denied { read } for pid=6698 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.402048][ T29] audit: type=1400 audit(249.320:3545): avc: denied { read } for pid=6698 comm="syz.1.1437" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.407839][ T29] audit: type=1400 audit(249.320:3546): avc: denied { read open } for pid=6698 comm="syz.1.1437" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 249.422517][ T29] audit: type=1400 audit(249.340:3547): avc: denied { ioctl } for pid=6698 comm="syz.1.1437" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 ioctlcmd=0x6401 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 254.161008][ T29] kauditd_printk_skb: 179 callbacks suppressed [ 254.162306][ T29] audit: type=1400 audit(254.070:3727): avc: denied { read } for pid=6778 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 254.267755][ T29] audit: type=1400 audit(254.180:3728): avc: denied { read } for pid=6780 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 254.326781][ T29] audit: type=1400 audit(254.230:3729): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.340259][ T29] audit: type=1400 audit(254.240:3730): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.340664][ T29] audit: type=1400 audit(254.250:3731): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.381729][ T29] audit: type=1400 audit(254.300:3732): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.392714][ T29] audit: type=1400 audit(254.310:3733): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.403994][ T29] audit: type=1400 audit(254.320:3734): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 254.507181][ T29] audit: type=1400 audit(254.420:3735): avc: denied { read } for pid=6783 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 254.508909][ T29] audit: type=1400 audit(254.420:3736): avc: denied { read } for pid=6782 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 259.175702][ T29] kauditd_printk_skb: 163 callbacks suppressed [ 259.176326][ T29] audit: type=1400 audit(259.090:3900): avc: denied { read write } for pid=6859 comm="syz.0.1517" name="nvme-fabrics" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 259.181833][ T6860] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=6860 comm=syz.1.1518 [ 259.201799][ T29] audit: type=1400 audit(259.120:3901): avc: denied { ioctl open } for pid=6859 comm="syz.0.1517" path="/dev/nvme-fabrics" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 259.224067][ T29] audit: type=1400 audit(259.140:3902): avc: denied { ioctl } for pid=6859 comm="syz.0.1517" path="/dev/nvme-fabrics" dev="devtmpfs" ino=664 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 259.238115][ T29] audit: type=1400 audit(259.150:3903): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 259.243961][ T29] audit: type=1400 audit(259.160:3904): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 259.248575][ T29] audit: type=1400 audit(259.160:3905): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 259.342966][ T29] audit: type=1400 audit(259.260:3906): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 259.346322][ T29] audit: type=1400 audit(259.260:3907): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 259.360705][ T29] audit: type=1400 audit(259.270:3908): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 259.402550][ T29] audit: type=1400 audit(259.320:3909): avc: denied { read } for pid=6862 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 262.013284][ T6901] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=262 sclass=netlink_audit_socket pid=6901 comm=syz.1.1538 [ 263.009097][ T6914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6914 comm=syz.0.1544 [ 264.219455][ T29] kauditd_printk_skb: 146 callbacks suppressed [ 264.226468][ T29] audit: type=1400 audit(264.130:4056): avc: denied { read } for pid=6931 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 264.295048][ T29] audit: type=1400 audit(264.210:4057): avc: denied { read } for pid=6932 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 264.390473][ T29] audit: type=1400 audit(264.300:4058): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 264.390885][ T29] audit: type=1400 audit(264.300:4059): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 264.391294][ T29] audit: type=1400 audit(264.300:4060): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 264.394906][ T29] audit: type=1400 audit(264.310:4061): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 264.400254][ T29] audit: type=1400 audit(264.310:4062): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 264.415542][ T29] audit: type=1400 audit(264.320:4063): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 264.522769][ T29] audit: type=1400 audit(264.440:4064): avc: denied { read } for pid=6935 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 264.540510][ T29] audit: type=1400 audit(264.450:4065): avc: denied { read } for pid=6936 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 267.499012][ T6971] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6971 comm=syz.0.1570 [ 269.172873][ T7002] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7002 comm=syz.0.1584 [ 269.225260][ T29] kauditd_printk_skb: 276 callbacks suppressed [ 269.225788][ T29] audit: type=1400 audit(269.140:4342): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 269.229302][ T29] audit: type=1400 audit(269.140:4343): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 269.280643][ T29] audit: type=1400 audit(269.190:4344): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 269.284562][ T29] audit: type=1400 audit(269.200:4345): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 269.298534][ T29] audit: type=1400 audit(269.210:4346): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 269.387571][ T29] audit: type=1400 audit(269.300:4347): avc: denied { read } for pid=7003 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 269.423372][ T29] audit: type=1400 audit(269.340:4348): avc: denied { read } for pid=7004 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 269.505943][ T29] audit: type=1400 audit(269.420:4349): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 269.514014][ T29] audit: type=1400 audit(269.430:4350): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 269.520953][ T29] audit: type=1400 audit(269.430:4351): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 274.261070][ T29] kauditd_printk_skb: 148 callbacks suppressed [ 274.261431][ T29] audit: type=1400 audit(274.180:4500): avc: denied { read } for pid=7073 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 274.298827][ T29] audit: type=1400 audit(274.210:4501): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 274.309295][ T29] audit: type=1400 audit(274.220:4502): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 274.316223][ T29] audit: type=1400 audit(274.230:4503): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 274.323763][ T29] audit: type=1400 audit(274.240:4504): avc: denied { create } for pid=7073 comm="syz.1.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 274.348575][ T29] audit: type=1400 audit(274.260:4505): avc: denied { setopt } for pid=7073 comm="syz.1.1621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 274.431998][ T29] audit: type=1400 audit(274.350:4506): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 274.440441][ T29] audit: type=1400 audit(274.350:4507): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 274.454846][ T29] audit: type=1400 audit(274.370:4508): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 274.527629][ T29] audit: type=1400 audit(274.440:4509): avc: denied { read } for pid=7075 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 276.494022][ T7106] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7106 comm=syz.1.1637 [ 276.973912][ T7115] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7115 comm=syz.1.1640 [ 279.307710][ T29] kauditd_printk_skb: 158 callbacks suppressed [ 279.309033][ T29] audit: type=1400 audit(279.220:4668): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 279.334213][ T29] audit: type=1400 audit(279.250:4669): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 279.337198][ T29] audit: type=1400 audit(279.250:4670): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 279.356460][ T29] audit: type=1400 audit(279.270:4671): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 279.363088][ T29] audit: type=1400 audit(279.280:4672): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 279.370698][ T29] audit: type=1400 audit(279.280:4673): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 279.489000][ T29] audit: type=1400 audit(279.400:4674): avc: denied { read } for pid=7152 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.530212][ T29] audit: type=1400 audit(279.440:4675): avc: denied { read } for pid=7153 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 279.611469][ T29] audit: type=1400 audit(279.530:4676): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 279.617100][ T29] audit: type=1400 audit(279.530:4677): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 279.858853][ T7159] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=27 sclass=netlink_tcpdiag_socket pid=7159 comm=syz.0.1663 [ 284.356659][ T29] kauditd_printk_skb: 162 callbacks suppressed [ 284.357754][ T29] audit: type=1400 audit(284.270:4840): avc: denied { read } for pid=7231 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 284.385437][ T29] audit: type=1400 audit(284.300:4841): avc: denied { create } for pid=7231 comm="syz.0.1699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 284.393331][ T29] audit: type=1400 audit(284.310:4842): avc: denied { read } for pid=7232 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 284.400502][ T29] audit: type=1400 audit(284.310:4843): avc: denied { write } for pid=7231 comm="syz.0.1699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 284.482846][ T29] audit: type=1400 audit(284.400:4844): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 284.487741][ T29] audit: type=1400 audit(284.400:4845): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 284.494043][ T29] audit: type=1400 audit(284.410:4846): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 284.535584][ T29] audit: type=1400 audit(284.450:4847): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 284.538336][ T29] audit: type=1400 audit(284.450:4848): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 284.564365][ T29] audit: type=1400 audit(284.480:4849): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 285.843275][ T7259] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=7259 comm=syz.1.1712 [ 289.369480][ T29] kauditd_printk_skb: 139 callbacks suppressed [ 289.380336][ T29] audit: type=1400 audit(289.280:4989): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 289.382586][ T29] audit: type=1400 audit(289.290:4990): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 289.385012][ T29] audit: type=1400 audit(289.290:4991): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 289.542372][ T29] audit: type=1400 audit(289.460:4992): avc: denied { read } for pid=7302 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 289.609100][ T29] audit: type=1400 audit(289.520:4993): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 289.614134][ T29] audit: type=1400 audit(289.530:4994): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 289.619006][ T29] audit: type=1400 audit(289.530:4995): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 289.762345][ T29] audit: type=1400 audit(289.680:4996): avc: denied { read } for pid=7304 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 289.860242][ T29] audit: type=1400 audit(289.770:4997): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 289.860693][ T29] audit: type=1400 audit(289.770:4998): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 294.394394][ T29] kauditd_printk_skb: 143 callbacks suppressed [ 294.394763][ T29] audit: type=1400 audit(294.310:5142): avc: denied { read } for pid=7365 comm="syz.1.1766" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 294.400759][ T29] audit: type=1400 audit(294.310:5143): avc: denied { read open } for pid=7365 comm="syz.1.1766" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 294.421150][ T29] audit: type=1400 audit(294.330:5144): avc: denied { map } for pid=7365 comm="syz.1.1766" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 294.421514][ T29] audit: type=1400 audit(294.330:5145): avc: denied { read } for pid=7365 comm="syz.1.1766" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 294.421735][ T29] audit: type=1400 audit(294.330:5146): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 294.435944][ T29] audit: type=1400 audit(294.330:5147): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 294.442746][ T29] audit: type=1400 audit(294.360:5148): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 294.525012][ T29] audit: type=1400 audit(294.440:5149): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 294.530101][ T29] audit: type=1400 audit(294.440:5150): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 294.543496][ T29] audit: type=1400 audit(294.450:5151): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 299.440188][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 299.440440][ T29] audit: type=1400 audit(299.350:5279): avc: denied { read } for pid=7425 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 299.473822][ T29] audit: type=1400 audit(299.390:5280): avc: denied { read } for pid=7426 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 299.580301][ T29] audit: type=1400 audit(299.480:5281): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 299.592911][ T29] audit: type=1400 audit(299.510:5282): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 299.595433][ T29] audit: type=1400 audit(299.510:5283): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 299.617040][ T29] audit: type=1400 audit(299.530:5284): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 299.624351][ T29] audit: type=1400 audit(299.540:5285): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 299.631947][ T29] audit: type=1400 audit(299.550:5286): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 299.753506][ T29] audit: type=1400 audit(299.670:5287): avc: denied { read } for pid=7429 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 299.780060][ T29] audit: type=1400 audit(299.690:5288): avc: denied { read } for pid=7430 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 299.853801][ T7432] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7432 comm=syz.1.1797 [ 301.795416][ T7461] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7461 comm=syz.0.1812 [ 304.508895][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 304.512686][ T29] audit: type=1400 audit(304.420:5434): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 304.530538][ T29] audit: type=1400 audit(304.440:5435): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 304.532372][ T29] audit: type=1400 audit(304.440:5436): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 304.588309][ T29] audit: type=1400 audit(304.500:5437): avc: denied { read } for pid=7499 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 304.646407][ T29] audit: type=1400 audit(304.560:5438): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 304.654186][ T29] audit: type=1400 audit(304.560:5439): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 304.675728][ T29] audit: type=1400 audit(304.590:5440): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 304.711357][ T29] audit: type=1400 audit(304.620:5441): avc: denied { read } for pid=7501 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 304.829358][ T29] audit: type=1400 audit(304.740:5442): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 304.834223][ T29] audit: type=1400 audit(304.750:5443): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 308.336971][ T7558] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pid=7558 comm=syz.1.1860 [ 309.568175][ T29] kauditd_printk_skb: 156 callbacks suppressed [ 309.568687][ T29] audit: type=1400 audit(309.480:5600): avc: denied { read } for pid=7573 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 309.603858][ T29] audit: type=1400 audit(309.520:5601): avc: denied { read write } for pid=7573 comm="syz.1.1868" name="uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 309.610669][ T29] audit: type=1400 audit(309.520:5602): avc: denied { read write open } for pid=7573 comm="syz.1.1868" path="/dev/uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 309.618814][ T29] audit: type=1400 audit(309.530:5603): avc: denied { ioctl } for pid=7573 comm="syz.1.1868" path="/dev/uinput" dev="devtmpfs" ino=697 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 309.685493][ T29] audit: type=1400 audit(309.600:5604): avc: denied { read } for pid=7575 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 309.697432][ T29] audit: type=1400 audit(309.610:5605): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 309.703544][ T29] audit: type=1400 audit(309.620:5606): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 309.710687][ T29] audit: type=1400 audit(309.620:5607): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 309.871061][ T29] audit: type=1400 audit(309.790:5608): avc: denied { read } for pid=7577 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 309.878720][ T29] audit: type=1400 audit(309.790:5609): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 310.125377][ T7581] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7581 comm=syz.1.1872 [ 314.573870][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 314.574289][ T29] audit: type=1400 audit(314.490:5735): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 314.677600][ T29] audit: type=1400 audit(314.590:5736): avc: denied { read } for pid=7635 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 314.695163][ T29] audit: type=1400 audit(314.610:5737): avc: denied { read } for pid=7636 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 314.719242][ T29] audit: type=1400 audit(314.630:5738): avc: denied { write } for pid=7635 comm="syz.0.1899" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 314.726349][ T29] audit: type=1400 audit(314.640:5739): avc: denied { write open } for pid=7635 comm="syz.0.1899" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 314.821756][ T29] audit: type=1400 audit(314.720:5740): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 314.822242][ T29] audit: type=1400 audit(314.730:5741): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 314.822598][ T29] audit: type=1400 audit(314.730:5742): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 314.895158][ T29] audit: type=1400 audit(314.810:5743): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 314.899293][ T29] audit: type=1400 audit(314.810:5744): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 316.311655][ T7659] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7659 comm=syz.0.1911 [ 319.605428][ T29] kauditd_printk_skb: 168 callbacks suppressed [ 319.607278][ T29] audit: type=1400 audit(319.520:5913): avc: denied { read } for pid=7710 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 319.727106][ T29] audit: type=1400 audit(319.640:5914): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 319.742978][ T29] audit: type=1400 audit(319.650:5915): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 319.743668][ T29] audit: type=1400 audit(319.650:5916): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 319.923047][ T29] audit: type=1400 audit(319.840:5917): avc: denied { read } for pid=7712 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 320.036333][ T29] audit: type=1400 audit(319.950:5918): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 320.050534][ T29] audit: type=1400 audit(319.960:5919): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 320.061942][ T29] audit: type=1400 audit(319.970:5920): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 320.237647][ T29] audit: type=1400 audit(320.150:5921): avc: denied { read } for pid=7714 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 320.342687][ T29] audit: type=1400 audit(320.260:5922): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 322.571651][ T7745] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7745 comm=syz.0.1953 [ 324.662737][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 324.663123][ T29] audit: type=1400 audit(324.580:6049): avc: denied { read } for pid=7775 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 324.699351][ T29] audit: type=1400 audit(324.610:6050): avc: denied { read } for pid=7776 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 324.796301][ T29] audit: type=1400 audit(324.710:6051): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 324.796900][ T29] audit: type=1400 audit(324.710:6052): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 324.811068][ T29] audit: type=1400 audit(324.720:6053): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 324.902878][ T29] audit: type=1400 audit(324.820:6054): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 324.930660][ T29] audit: type=1400 audit(324.820:6055): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 324.931095][ T29] audit: type=1400 audit(324.830:6056): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 325.023434][ T29] audit: type=1400 audit(324.940:6057): avc: denied { read } for pid=7779 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 325.131729][ T29] audit: type=1400 audit(325.050:6058): avc: denied { read } for pid=7781 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 329.676521][ T29] kauditd_printk_skb: 149 callbacks suppressed [ 329.676956][ T29] audit: type=1400 audit(329.590:6208): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 329.680393][ T29] audit: type=1400 audit(329.590:6209): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 329.698235][ T29] audit: type=1400 audit(329.610:6210): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 329.791056][ T29] audit: type=1400 audit(329.700:6211): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 329.793735][ T29] audit: type=1400 audit(329.710:6212): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 329.800899][ T29] audit: type=1400 audit(329.710:6213): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 329.862947][ T29] audit: type=1400 audit(329.780:6214): avc: denied { read } for pid=7855 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 329.976909][ T29] audit: type=1400 audit(329.890:6215): avc: denied { read } for pid=7857 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 330.006818][ T29] audit: type=1400 audit(329.920:6216): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 330.020969][ T29] audit: type=1400 audit(329.930:6217): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 334.701730][ T29] kauditd_printk_skb: 154 callbacks suppressed [ 334.702094][ T29] audit: type=1400 audit(334.620:6372): avc: denied { read } for pid=7926 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 334.734178][ T29] audit: type=1400 audit(334.650:6373): avc: denied { read } for pid=7926 comm="syz.1.2043" dev="nsfs" ino=4026532714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 334.754209][ T29] audit: type=1400 audit(334.670:6374): avc: denied { read open } for pid=7926 comm="syz.1.2043" path="net:[4026532714]" dev="nsfs" ino=4026532714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 334.762525][ T29] audit: type=1400 audit(334.680:6375): avc: denied { create } for pid=7926 comm="syz.1.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 334.774838][ T29] audit: type=1400 audit(334.690:6376): avc: denied { write } for pid=7926 comm="syz.1.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 334.821779][ T29] audit: type=1400 audit(334.740:6377): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 334.825067][ T29] audit: type=1400 audit(334.740:6378): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 334.835259][ T29] audit: type=1400 audit(334.750:6379): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 334.890395][ T29] audit: type=1400 audit(334.790:6380): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 334.890821][ T29] audit: type=1400 audit(334.800:6381): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 339.747704][ T29] kauditd_printk_skb: 147 callbacks suppressed [ 339.748236][ T29] audit: type=1400 audit(339.660:6529): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 339.756019][ T29] audit: type=1400 audit(339.670:6530): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 339.764387][ T29] audit: type=1400 audit(339.680:6531): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 339.817681][ T29] audit: type=1400 audit(339.730:6532): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 339.841928][ T29] audit: type=1400 audit(339.760:6533): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 339.847642][ T29] audit: type=1400 audit(339.760:6534): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 339.938796][ T29] audit: type=1400 audit(339.850:6535): avc: denied { read } for pid=8003 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 339.970775][ T29] audit: type=1400 audit(339.880:6536): avc: denied { read } for pid=8004 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 340.093026][ T29] audit: type=1400 audit(340.010:6537): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 340.098924][ T29] audit: type=1400 audit(340.010:6538): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 344.796644][ T29] kauditd_printk_skb: 146 callbacks suppressed [ 344.804140][ T29] audit: type=1400 audit(344.710:6685): avc: denied { read } for pid=8071 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 344.817086][ T29] audit: type=1400 audit(344.730:6686): avc: denied { read } for pid=8072 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 344.914568][ T29] audit: type=1400 audit(344.830:6687): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 344.933059][ T29] audit: type=1400 audit(344.830:6688): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 344.933471][ T29] audit: type=1400 audit(344.840:6689): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 344.975482][ T29] audit: type=1400 audit(344.870:6690): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 344.975932][ T29] audit: type=1400 audit(344.880:6691): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 344.976011][ T29] audit: type=1400 audit(344.880:6692): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 345.087706][ T29] audit: type=1400 audit(345.000:6693): avc: denied { read } for pid=8075 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 345.109055][ T29] audit: type=1400 audit(345.020:6694): avc: denied { read } for pid=8076 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 349.822843][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 349.823291][ T29] audit: type=1400 audit(349.740:6840): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 349.842983][ T29] audit: type=1400 audit(349.760:6841): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 349.847766][ T29] audit: type=1400 audit(349.760:6842): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 349.913170][ T29] audit: type=1400 audit(349.830:6843): avc: denied { read } for pid=8143 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 349.943862][ T29] audit: type=1400 audit(349.860:6844): avc: denied { read write } for pid=8143 comm="syz.0.2152" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 349.947381][ T29] audit: type=1400 audit(349.860:6845): avc: denied { read open } for pid=8143 comm="syz.0.2152" path="/dev/rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 350.021711][ T29] audit: type=1400 audit(349.940:6846): avc: denied { read } for pid=8145 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 350.070512][ T29] audit: type=1400 audit(349.980:6847): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 350.070978][ T29] audit: type=1400 audit(349.980:6848): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 350.080807][ T29] audit: type=1400 audit(349.990:6849): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 354.848751][ T29] kauditd_printk_skb: 155 callbacks suppressed [ 354.853079][ T29] audit: type=1400 audit(354.760:7005): avc: denied { read } for pid=8217 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 354.940871][ T29] audit: type=1400 audit(354.850:7006): avc: denied { read } for pid=8218 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 354.946355][ T29] audit: type=1400 audit(354.860:7007): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 354.952605][ T29] audit: type=1400 audit(354.870:7008): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 354.958496][ T29] audit: type=1400 audit(354.870:7009): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 355.127334][ T29] audit: type=1400 audit(355.040:7010): avc: denied { read } for pid=8221 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 355.145331][ T29] audit: type=1400 audit(355.060:7011): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 355.149102][ T29] audit: type=1400 audit(355.060:7012): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 355.160562][ T29] audit: type=1400 audit(355.070:7013): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 355.179152][ T29] audit: type=1400 audit(355.080:7014): avc: denied { create } for pid=8221 comm="syz.0.2191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 356.563413][ T8242] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=261 sclass=netlink_tcpdiag_socket pid=8242 comm=syz.0.2200 [ 357.335814][ T8254] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8254 comm=syz.1.2207 [ 359.860766][ T29] kauditd_printk_skb: 149 callbacks suppressed [ 359.861189][ T29] audit: type=1400 audit(359.750:7164): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 359.861428][ T29] audit: type=1400 audit(359.770:7165): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 359.954737][ T29] audit: type=1400 audit(359.870:7166): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 359.957624][ T29] audit: type=1400 audit(359.870:7167): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 359.977190][ T29] audit: type=1400 audit(359.890:7168): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.011020][ T29] audit: type=1400 audit(359.930:7169): avc: denied { read } for pid=8291 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 360.093798][ T29] audit: type=1400 audit(360.010:7170): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.098537][ T29] audit: type=1400 audit(360.010:7171): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.104298][ T29] audit: type=1400 audit(360.020:7172): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 360.201402][ T29] audit: type=1400 audit(360.110:7173): avc: denied { read } for pid=8293 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 364.943543][ T29] kauditd_printk_skb: 101 callbacks suppressed [ 364.944657][ T29] audit: type=1400 audit(364.860:7275): avc: denied { read } for pid=8339 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 365.110175][ T29] audit: type=1400 audit(365.020:7276): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 365.143829][ T29] audit: type=1400 audit(365.060:7277): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 365.146890][ T29] audit: type=1400 audit(365.060:7278): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 365.232122][ T29] audit: type=1400 audit(365.150:7279): avc: denied { read } for pid=8341 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 365.376762][ T29] audit: type=1400 audit(365.290:7280): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 365.382745][ T29] audit: type=1400 audit(365.300:7281): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 365.390522][ T29] audit: type=1400 audit(365.300:7282): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 365.617166][ T29] audit: type=1400 audit(365.530:7283): avc: denied { read } for pid=8343 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 365.745712][ T29] audit: type=1400 audit(365.660:7284): avc: denied { read } for pid=8343 comm="syz.1.2252" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 370.059244][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 370.071097][ T29] audit: type=1400 audit(369.970:7337): avc: denied { read } for pid=8367 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 370.100901][ T29] audit: type=1400 audit(370.000:7338): avc: denied { read } for pid=8368 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 370.180372][ T29] audit: type=1400 audit(370.090:7339): avc: denied { read } for pid=8367 comm="syz.0.2264" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 370.200345][ T29] audit: type=1400 audit(370.110:7340): avc: denied { read open } for pid=8367 comm="syz.0.2264" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 370.236889][ T29] audit: type=1400 audit(370.150:7341): avc: denied { ioctl } for pid=8367 comm="syz.0.2264" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5413 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 370.270528][ T29] audit: type=1400 audit(370.180:7342): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 370.270942][ T29] audit: type=1400 audit(370.180:7343): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 370.271183][ T29] audit: type=1400 audit(370.180:7344): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 370.457044][ T29] audit: type=1400 audit(370.370:7345): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 370.474123][ T29] audit: type=1400 audit(370.390:7346): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 375.086976][ T29] kauditd_printk_skb: 168 callbacks suppressed [ 375.087955][ T29] audit: type=1400 audit(375.000:7515): avc: denied { read } for pid=8449 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 375.125610][ T29] audit: type=1400 audit(375.040:7516): avc: denied { read } for pid=8450 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 375.162007][ T29] audit: type=1400 audit(375.080:7517): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 375.164139][ T29] audit: type=1400 audit(375.080:7518): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 375.166096][ T29] audit: type=1400 audit(375.080:7519): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 375.171831][ T29] audit: type=1400 audit(375.090:7520): avc: denied { create } for pid=8450 comm="syz.1.2304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 375.223333][ T29] audit: type=1400 audit(375.140:7521): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 375.230617][ T29] audit: type=1400 audit(375.140:7522): avc: denied { open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 375.232856][ T29] audit: type=1400 audit(375.140:7523): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 375.275909][ T29] audit: type=1400 audit(375.190:7524): avc: denied { read } for pid=8453 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 376.824882][ T8499] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1541 sclass=netlink_audit_socket pid=8499 comm=syz.1.2327 [ 380.102453][ T29] kauditd_printk_skb: 279 callbacks suppressed [ 380.102877][ T29] audit: type=1400 audit(380.020:7804): avc: denied { read } for pid=8578 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 380.151601][ T29] audit: type=1400 audit(380.070:7805): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 380.152075][ T29] audit: type=1400 audit(380.070:7806): avc: denied { open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 380.157833][ T29] audit: type=1400 audit(380.070:7807): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 380.225043][ T29] audit: type=1400 audit(380.140:7808): avc: denied { read } for pid=8581 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 380.252755][ T29] audit: type=1400 audit(380.150:7809): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 380.264780][ T29] audit: type=1400 audit(380.180:7810): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 380.282208][ T29] audit: type=1400 audit(380.190:7811): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 380.314371][ T29] audit: type=1400 audit(380.230:7812): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 380.315947][ T29] audit: type=1400 audit(380.230:7813): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 385.112269][ T29] kauditd_printk_skb: 252 callbacks suppressed [ 385.112643][ T29] audit: type=1400 audit(385.020:8066): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 385.112953][ T29] audit: type=1400 audit(385.020:8067): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 385.113187][ T29] audit: type=1400 audit(385.020:8068): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 385.161181][ T29] audit: type=1400 audit(385.070:8069): avc: denied { read } for pid=8699 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 385.227571][ T29] audit: type=1400 audit(385.140:8070): avc: denied { read } for pid=8701 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 385.244325][ T29] audit: type=1400 audit(385.160:8071): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 385.246842][ T29] audit: type=1400 audit(385.160:8072): avc: denied { open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 385.248746][ T29] audit: type=1400 audit(385.160:8073): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 385.316095][ T29] audit: type=1400 audit(385.230:8074): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 385.321596][ T29] audit: type=1400 audit(385.240:8075): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 387.542684][ T8755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=8755 comm=syz.0.2455 [ 388.334842][ T8767] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8767 comm=syz.0.2461 [ 388.975739][ T8780] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 390.156159][ T29] kauditd_printk_skb: 243 callbacks suppressed [ 390.162031][ T29] audit: type=1400 audit(390.070:8319): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 390.167670][ T29] audit: type=1400 audit(390.080:8320): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 390.168149][ T29] audit: type=1400 audit(390.080:8321): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 390.186474][ T29] audit: type=1400 audit(390.100:8322): avc: denied { read } for pid=8813 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 390.232594][ T29] audit: type=1400 audit(390.150:8323): avc: denied { read } for pid=8814 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 390.285261][ T29] audit: type=1400 audit(390.200:8324): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 390.286012][ T29] audit: type=1400 audit(390.200:8325): avc: denied { open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 390.286947][ T29] audit: type=1400 audit(390.200:8326): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 390.291384][ T29] audit: type=1400 audit(390.210:8327): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 390.295492][ T29] audit: type=1400 audit(390.210:8328): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 390.776487][ T8832] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1016 sclass=netlink_route_socket pid=8832 comm=syz.1.2493 [ 393.025330][ T8882] block nbd0: NBD_DISCONNECT [ 393.481140][ T3790] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 393.765220][ T3790] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 393.765657][ T3790] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 393.768377][ T3790] usb 1-1: Product: syz [ 393.768772][ T3790] usb 1-1: Manufacturer: syz [ 393.769021][ T3790] usb 1-1: SerialNumber: syz [ 394.198955][ T3790] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPROTO [ 394.200231][ T3790] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): lan78xx_setup_irq_domain() failed : -71 [ 394.200578][ T3790] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 394.216642][ T3790] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -71 [ 394.236630][ T3790] usb 1-1: USB disconnect, device number 2 [ 395.167561][ T29] kauditd_printk_skb: 259 callbacks suppressed [ 395.173641][ T29] audit: type=1400 audit(395.080:8588): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 395.186081][ T29] audit: type=1400 audit(395.100:8589): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 395.212587][ T29] audit: type=1400 audit(395.130:8590): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 395.249269][ T29] audit: type=1400 audit(395.160:8591): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 395.252377][ T29] audit: type=1400 audit(395.160:8592): avc: denied { open } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 395.260445][ T29] audit: type=1400 audit(395.170:8593): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 395.333960][ T29] audit: type=1400 audit(395.250:8594): avc: denied { read } for pid=8935 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 395.360566][ T29] audit: type=1400 audit(395.270:8595): avc: denied { read } for pid=8936 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 395.395195][ T29] audit: type=1400 audit(395.310:8596): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 395.398255][ T29] audit: type=1400 audit(395.310:8597): avc: denied { open } for pid=3099 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 398.237820][ T12] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.298023][ T12] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.351231][ T12] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.429040][ T12] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.791425][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 398.802516][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 398.813090][ T12] bond0 (unregistering): Released all slaves [ 398.910379][ T12] hsr_slave_0: left promiscuous mode [ 398.913951][ T12] hsr_slave_1: left promiscuous mode [ 398.926938][ T12] veth1_macvtap: left promiscuous mode [ 398.927528][ T12] veth0_macvtap: left promiscuous mode [ 398.928018][ T12] veth1_vlan: left promiscuous mode [ 398.928564][ T12] veth0_vlan: left promiscuous mode [ 399.677083][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 399.755372][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 399.813555][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 399.884273][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 400.186623][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 400.201001][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 400.209957][ T12] bond0 (unregistering): Released all slaves [ 400.222996][ T29] kauditd_printk_skb: 215 callbacks suppressed [ 400.223374][ T29] audit: type=1400 audit(400.130:8813): avc: denied { search } for pid=9041 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 400.223593][ T29] audit: type=1400 audit(400.140:8814): avc: denied { write } for pid=9041 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.310124][ T12] hsr_slave_0: left promiscuous mode [ 400.313477][ T12] hsr_slave_1: left promiscuous mode [ 400.327803][ T12] veth1_macvtap: left promiscuous mode [ 400.332589][ T12] veth0_macvtap: left promiscuous mode [ 400.333662][ T12] veth1_vlan: left promiscuous mode [ 400.336614][ T12] veth0_vlan: left promiscuous mode [ 400.387207][ T29] audit: type=1400 audit(400.300:8815): avc: denied { search } for pid=9042 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 400.395134][ T29] audit: type=1400 audit(400.310:8816): avc: denied { write } for pid=9042 comm="chmod" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.535552][ T29] audit: type=1400 audit(400.450:8817): avc: denied { search } for pid=9043 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 400.546150][ T29] audit: type=1400 audit(400.460:8818): avc: denied { write } for pid=9043 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.592871][ T29] audit: type=1400 audit(400.510:8819): avc: denied { search } for pid=9026 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 401.072328][ T29] audit: type=1400 audit(400.990:8820): avc: denied { write } for pid=9045 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 401.074544][ T29] audit: type=1400 audit(400.990:8821): avc: denied { write } for pid=9045 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 401.077991][ T29] audit: type=1400 audit(400.990:8822): avc: denied { write } for pid=9045 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.266924][ T29] kauditd_printk_skb: 310 callbacks suppressed [ 405.267489][ T29] audit: type=1400 audit(405.180:9133): avc: denied { search } for pid=9073 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 405.276594][ T29] audit: type=1400 audit(405.190:9134): avc: denied { write } for pid=9073 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.407720][ T29] audit: type=1400 audit(405.320:9135): avc: denied { search } for pid=9074 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 405.415801][ T29] audit: type=1400 audit(405.330:9136): avc: denied { write } for pid=9074 comm="chmod" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.534309][ T29] audit: type=1400 audit(405.450:9137): avc: denied { search } for pid=9075 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 405.538723][ T29] audit: type=1400 audit(405.450:9138): avc: denied { write } for pid=9075 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.568185][ T29] audit: type=1400 audit(405.480:9139): avc: denied { search } for pid=9070 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 405.936009][ T29] audit: type=1400 audit(405.850:9140): avc: denied { write } for pid=9077 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.941416][ T29] audit: type=1400 audit(405.850:9141): avc: denied { write } for pid=9077 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.947631][ T29] audit: type=1400 audit(405.850:9142): avc: denied { write } for pid=9077 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 410.410861][ T29] kauditd_printk_skb: 282 callbacks suppressed [ 410.414433][ T29] audit: type=1400 audit(410.320:9425): avc: denied { write } for pid=9104 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 410.418937][ T29] audit: type=1400 audit(410.330:9426): avc: denied { write } for pid=9104 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 410.430531][ T29] audit: type=1400 audit(410.330:9427): avc: denied { write } for pid=9104 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 410.430874][ T29] audit: type=1400 audit(410.330:9428): avc: denied { write } for pid=9104 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 410.431119][ T29] audit: type=1400 audit(410.330:9429): avc: denied { write } for pid=9104 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 410.431344][ T29] audit: type=1400 audit(410.330:9430): avc: denied { write } for pid=9104 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 410.646159][ T29] audit: type=1400 audit(410.560:9431): avc: denied { write } for pid=9105 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 410.646824][ T29] audit: type=1400 audit(410.560:9432): avc: denied { write } for pid=9105 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 410.647332][ T29] audit: type=1400 audit(410.560:9433): avc: denied { write } for pid=9105 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 410.647427][ T29] audit: type=1400 audit(410.560:9434): avc: denied { write } for pid=9105 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.337772][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 420.338335][ T29] audit: type=1400 audit(420.250:9449): avc: denied { write } for pid=9124 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.338631][ T29] audit: type=1400 audit(420.250:9450): avc: denied { write } for pid=9124 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.350346][ T29] audit: type=1400 audit(420.260:9451): avc: denied { write } for pid=9124 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.350748][ T29] audit: type=1400 audit(420.260:9452): avc: denied { write } for pid=9124 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.351111][ T29] audit: type=1400 audit(420.260:9453): avc: denied { write } for pid=9124 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.351184][ T29] audit: type=1400 audit(420.260:9454): avc: denied { write } for pid=9124 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 420.375330][ T29] audit: type=1400 audit(420.290:9455): avc: denied { search } for pid=9124 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 420.411687][ T29] audit: type=1400 audit(420.330:9456): avc: denied { search } for pid=9125 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 420.416377][ T29] audit: type=1400 audit(420.330:9457): avc: denied { search } for pid=9125 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 420.426707][ T29] audit: type=1400 audit(420.340:9458): avc: denied { search } for pid=9125 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 425.454497][ T29] kauditd_printk_skb: 483 callbacks suppressed [ 425.454982][ T29] audit: type=1400 audit(425.370:9942): avc: denied { search } for pid=9164 comm="chmod" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 425.463679][ T29] audit: type=1400 audit(425.370:9943): avc: denied { write } for pid=9164 comm="chmod" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 425.590797][ T29] audit: type=1400 audit(425.510:9944): avc: denied { search } for pid=9165 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 425.593413][ T29] audit: type=1400 audit(425.510:9945): avc: denied { write } for pid=9165 comm="rm" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 425.659417][ T29] audit: type=1400 audit(425.570:9946): avc: denied { search } for pid=9160 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 425.830970][ T29] audit: type=1400 audit(425.740:9947): avc: denied { write } for pid=9167 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 425.837323][ T29] audit: type=1400 audit(425.750:9948): avc: denied { write } for pid=9167 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 425.844983][ T29] audit: type=1400 audit(425.750:9949): avc: denied { write } for pid=9167 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 425.847875][ T29] audit: type=1400 audit(425.750:9950): avc: denied { write } for pid=9167 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 425.848213][ T29] audit: type=1400 audit(425.750:9951): avc: denied { write } for pid=9167 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 VM DIAGNOSIS: 22:39:25 Registers: info registers vcpu 0 CPU#0 R00=829c8ad0 R01=824029d0 R02=cd87ee80 R03=81a612f0 R04=82abd340 R05=a6c9b800 R06=00014898 R07=00000063 R08=dddc7000 R09=cd87ee80 R10=dddc7000 R11=82801dfc R12=82801e00 R13=82801df0 R14=8130a838 R15=81a61300 PSR=600d0093 -ZC- A S svc32 s00=72657475 s01=76612073 d00=7661207372657475 s02=00000001 s03=76eeea88 d01=76eeea8800000001 s04=e4000000 s05=e4000000 d02=e4000000e4000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=c0200400 d04=c020040000000000 s10=00040000 s11=80402000 d05=8040200000040000 s12=08040201 s13=80402010 d06=8040201008040201 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=829c8ad0 R01=00000000 R02=00000feb R03=81a612f0 R04=00014898 R05=828f6e88 R06=828f6e88 R07=00000038 R08=828f6e40 R09=00000000 R10=00000063 R11=df879d74 R12=df879d78 R13=df879d68 R14=8130a838 R15=81a61300 PSR=60000093 -ZC- A S svc32 s00=2e393631 s01=2e343532 d00=2e3435322e393631 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=63538263 s11=37010135 d05=3701013563538263 s12=0379010e s13=1a0f0c06 d06=1a0f0c060379010e s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 80000010