last executing test programs: 1.927158737s ago: executing program 1 (id=25288): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[], 0x33fe0}}, 0x0) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40) 1.790923969s ago: executing program 1 (id=25289): syz_clone3(&(0x7f0000001200)={0x0, &(0x7f00000012c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) write$P9_RREADDIR(r0, &(0x7f0000000000)={0xb}, 0xb) 1.702505037s ago: executing program 1 (id=25290): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x14}, 0x14}}, 0x4040000) 1.642617603s ago: executing program 1 (id=25291): r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCGISO7816(r0, 0x5452, &(0x7f0000001300)) 1.570373249s ago: executing program 1 (id=25292): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$TCGETS(r0, 0x5451, 0x0) 1.471049878s ago: executing program 1 (id=25293): mlockall(0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mmap$binder(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) 244.705658ms ago: executing program 0 (id=25302): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x5450, 0x0) 150.363086ms ago: executing program 0 (id=25303): r0 = timerfd_create(0x0, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x5450, 0x0) 84.159452ms ago: executing program 0 (id=25304): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_REMOVE(r0, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0xacd}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)={0x14}, 0x14}}, 0x0) 83.893602ms ago: executing program 0 (id=25305): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x2000804, 0x0) 368.85µs ago: executing program 0 (id=25306): r0 = socket$netlink(0x10, 0x3, 0x8) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 0s ago: executing program 0 (id=25307): r0 = io_uring_setup(0xb3e, &(0x7f00000002c0)) r1 = socket(0x2b, 0x1, 0x1) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): xt=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6251.501185][ T31] audit: type=1400 audit(6763.456:113794): avc: denied { open } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6251.502016][ T31] audit: type=1400 audit(6763.456:113795): avc: denied { ioctl } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6251.573964][ T31] audit: type=1400 audit(6763.536:113796): avc: denied { read write } for pid=30879 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6251.575129][ T31] audit: type=1400 audit(6763.536:113797): avc: denied { open } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6251.576142][ T31] audit: type=1400 audit(6763.536:113798): avc: denied { ioctl } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6251.620162][ T31] audit: type=1400 audit(6763.576:113799): avc: denied { read } for pid=32446 comm="syz.0.23714" name="card0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6256.433516][ T31] kauditd_printk_skb: 166 callbacks suppressed [ 6256.434416][ T31] audit: type=1400 audit(6768.366:113966): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6256.435813][ T31] audit: type=1400 audit(6768.386:113967): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6256.438039][ T31] audit: type=1400 audit(6768.386:113968): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6256.674956][ T31] audit: type=1400 audit(6768.636:113969): avc: denied { create } for pid=32516 comm="syz.1.23745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6256.699795][ T31] audit: type=1400 audit(6768.646:113970): avc: denied { write } for pid=32516 comm="syz.1.23745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6256.761567][ T31] audit: type=1400 audit(6768.716:113971): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6256.762152][ T31] audit: type=1400 audit(6768.716:113972): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6256.762671][ T31] audit: type=1400 audit(6768.716:113973): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6256.807096][ T31] audit: type=1400 audit(6768.766:113974): avc: denied { read write } for pid=30879 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6256.807711][ T31] audit: type=1400 audit(6768.766:113975): avc: denied { read write open } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6257.032421][T32528] "syz.1.23750" (32528) uses obsolete ecb(arc4) skcipher [ 6261.519585][ T31] kauditd_printk_skb: 241 callbacks suppressed [ 6261.519722][ T31] audit: type=1400 audit(6773.476:114217): avc: denied { nlmsg_write } for pid=32622 comm="syz.1.23796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 6261.536217][ T31] audit: type=1400 audit(6773.496:114218): avc: denied { create } for pid=32622 comm="syz.1.23796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6261.556499][ T31] audit: type=1400 audit(6773.506:114219): avc: denied { write } for pid=32622 comm="syz.1.23796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6261.605057][ T31] audit: type=1400 audit(6773.566:114220): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6261.610179][ T31] audit: type=1400 audit(6773.566:114221): avc: denied { read write open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6261.612114][ T31] audit: type=1400 audit(6773.576:114222): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6261.765883][ T31] audit: type=1400 audit(6773.726:114223): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6261.782042][ T31] audit: type=1400 audit(6773.726:114224): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6261.782733][ T31] audit: type=1400 audit(6773.736:114225): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6261.945317][ T31] audit: type=1400 audit(6773.906:114226): avc: denied { create } for pid=32626 comm="syz.1.23798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6266.559014][ T31] kauditd_printk_skb: 145 callbacks suppressed [ 6266.559151][ T31] audit: type=1400 audit(6778.516:114372): avc: denied { read write } for pid=30879 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6266.561834][ T31] audit: type=1400 audit(6778.516:114373): avc: denied { open } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6266.563266][ T31] audit: type=1400 audit(6778.516:114374): avc: denied { ioctl } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6266.575866][ T31] audit: type=1400 audit(6778.536:114375): avc: denied { create } for pid=32691 comm="syz.1.23828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6266.613983][ T31] audit: type=1400 audit(6778.576:114376): avc: denied { getopt } for pid=32691 comm="syz.1.23828" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6266.689421][ T31] audit: type=1400 audit(6778.636:114377): avc: denied { create } for pid=32693 comm="syz.0.23829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6266.691780][ T31] audit: type=1400 audit(6778.636:114378): avc: denied { write } for pid=32693 comm="syz.0.23829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6266.692883][ T31] audit: type=1400 audit(6778.636:114379): avc: denied { read } for pid=32693 comm="syz.0.23829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6266.694102][ T31] audit: type=1400 audit(6778.646:114380): avc: denied { write } for pid=32693 comm="syz.0.23829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6266.695070][ T31] audit: type=1400 audit(6778.646:114381): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6268.824742][T32712] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=46 sclass=netlink_tcpdiag_socket pid=32712 comm=syz.1.23837 [ 6269.681740][T32746] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=32746 comm=syz.1.23849 [ 6271.235755][T32759] cgroup: Bad value for 'name' [ 6271.575687][ T31] kauditd_printk_skb: 147 callbacks suppressed [ 6271.575802][ T31] audit: type=1400 audit(6783.536:114529): avc: denied { read } for pid=32761 comm="syz.0.23854" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6271.577393][ T31] audit: type=1400 audit(6783.536:114530): avc: denied { open } for pid=32761 comm="syz.0.23854" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6271.613229][ T31] audit: type=1400 audit(6783.576:114531): avc: denied { read write } for pid=30879 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6271.614491][ T31] audit: type=1400 audit(6783.576:114532): avc: denied { open } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6271.615860][ T31] audit: type=1400 audit(6783.576:114533): avc: denied { ioctl } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6271.732519][ T31] audit: type=1400 audit(6783.686:114534): avc: denied { read } for pid=32763 comm="syz.0.23855" name="rtc0" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6271.733317][ T31] audit: type=1400 audit(6783.696:114535): avc: denied { open } for pid=32763 comm="syz.0.23855" path="/dev/rtc0" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6271.738223][ T31] audit: type=1400 audit(6783.696:114536): avc: denied { create } for pid=32763 comm="syz.0.23855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6271.746705][ T31] audit: type=1400 audit(6783.706:114537): avc: denied { ioctl } for pid=32763 comm="syz.0.23855" path="/dev/rtc0" dev="devtmpfs" ino=713 ioctlcmd=0x7006 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6271.781944][ T31] audit: type=1400 audit(6783.726:114538): avc: denied { read write } for pid=30879 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6278.989933][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 6278.989988][ T31] audit: type=1400 audit(6790.946:114579): avc: denied { unmount } for pid=23822 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 6279.001746][ T31] audit: type=1400 audit(6790.956:114580): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6279.002747][ T31] audit: type=1400 audit(6790.966:114581): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6279.003598][ T31] audit: type=1400 audit(6790.966:114582): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6279.065713][ T31] audit: type=1400 audit(6791.026:114583): avc: denied { read write } for pid=30879 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6279.066798][ T31] audit: type=1400 audit(6791.026:114584): avc: denied { open } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6279.067667][ T31] audit: type=1400 audit(6791.026:114585): avc: denied { ioctl } for pid=30879 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6279.074656][ T31] audit: type=1400 audit(6791.036:114586): avc: denied { read } for pid=314 comm="syz.1.23864" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6279.074789][ T31] audit: type=1400 audit(6791.036:114587): avc: denied { open } for pid=314 comm="syz.1.23864" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6279.079877][ T31] audit: type=1400 audit(6791.036:114588): avc: denied { ioctl } for pid=314 comm="syz.1.23864" path="/dev/vcsu" dev="devtmpfs" ino=14 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6279.329345][ T328] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=106 sclass=netlink_audit_socket pid=328 comm=syz.1.23871 [ 6285.051198][ T31] kauditd_printk_skb: 309 callbacks suppressed [ 6285.051254][ T31] audit: type=1400 audit(6797.016:114898): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6285.052169][ T31] audit: type=1400 audit(6797.016:114899): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6285.052988][ T31] audit: type=1400 audit(6797.016:114900): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6285.089279][ T31] audit: type=1400 audit(6797.046:114901): avc: denied { create } for pid=453 comm="syz.1.23932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6285.093937][ T31] audit: type=1400 audit(6797.056:114902): avc: denied { write } for pid=453 comm="syz.1.23932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6285.113118][ T31] audit: type=1400 audit(6797.076:114903): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6285.120825][ T31] audit: type=1400 audit(6797.076:114904): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6285.121544][ T31] audit: type=1400 audit(6797.076:114905): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6285.170978][ T31] audit: type=1400 audit(6797.126:114906): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6285.171818][ T31] audit: type=1400 audit(6797.126:114907): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6288.024227][ T566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=566 comm=syz.0.23987 [ 6288.176129][ T576] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=576 comm=syz.1.23992 [ 6289.739507][T30875] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6289.786677][T30875] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6289.847625][T30875] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6289.887735][T30875] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6290.061515][ T31] kauditd_printk_skb: 343 callbacks suppressed [ 6290.061630][ T31] audit: type=1400 audit(6802.016:115251): avc: denied { mounton } for pid=613 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 6290.063032][ T31] audit: type=1400 audit(6802.026:115252): avc: denied { mount } for pid=613 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6290.068310][ T31] audit: type=1400 audit(6802.026:115253): avc: denied { read } for pid=613 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6290.069517][ T31] audit: type=1400 audit(6802.026:115254): avc: denied { open } for pid=613 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6290.078661][ T31] audit: type=1400 audit(6802.026:115255): avc: denied { mounton } for pid=613 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 6290.094759][ T31] audit: type=1400 audit(6802.056:115256): avc: denied { module_request } for pid=613 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6290.110178][ T31] audit: type=1400 audit(6802.066:115257): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6290.121127][ T31] audit: type=1400 audit(6802.076:115258): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6290.121577][ T31] audit: type=1400 audit(6802.076:115259): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6290.146120][T30875] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6290.162879][T30875] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6290.171640][ T31] audit: type=1400 audit(6802.126:115260): avc: denied { sys_module } for pid=613 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6290.174443][T30875] bond0 (unregistering): Released all slaves [ 6290.259709][T30875] hsr_slave_0: left promiscuous mode [ 6290.268445][T30875] hsr_slave_1: left promiscuous mode [ 6290.279898][T30875] veth1_macvtap: left promiscuous mode [ 6290.280171][T30875] veth0_macvtap: left promiscuous mode [ 6290.280362][T30875] veth1_vlan: left promiscuous mode [ 6290.281291][T30875] veth0_vlan: left promiscuous mode [ 6291.167675][ T639] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2573 sclass=netlink_route_socket pid=639 comm=syz.1.24007 [ 6292.108483][ T790] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5125 sclass=netlink_audit_socket pid=790 comm=syz.1.24019 [ 6292.541672][ T613] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6292.553000][ T613] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6293.632455][ T613] hsr_slave_0: entered promiscuous mode [ 6293.636323][ T613] hsr_slave_1: entered promiscuous mode [ 6294.213535][ T613] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 6294.226167][ T613] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 6294.234446][ T613] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 6294.244129][ T613] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 6295.075114][ T31] kauditd_printk_skb: 391 callbacks suppressed [ 6295.075178][ T31] audit: type=1400 audit(6807.036:115652): avc: denied { write } for pid=1051 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6295.076496][ T31] audit: type=1400 audit(6807.036:115653): avc: denied { open } for pid=1051 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6295.077726][ T31] audit: type=1400 audit(6807.036:115654): avc: denied { getattr } for pid=1051 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6295.078880][ T31] audit: type=1400 audit(6807.036:115655): avc: denied { ioctl } for pid=1051 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6295.175731][ T613] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6295.209100][ T31] audit: type=1400 audit(6807.166:115656): avc: denied { module_request } for pid=613 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6295.218645][ T31] audit: type=1400 audit(6807.176:115657): avc: denied { write } for pid=1052 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6295.222236][ T31] audit: type=1400 audit(6807.186:115658): avc: denied { open } for pid=1052 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6295.223669][ T31] audit: type=1400 audit(6807.186:115659): avc: denied { getattr } for pid=1052 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6295.224777][ T31] audit: type=1400 audit(6807.186:115660): avc: denied { ioctl } for pid=1052 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6295.235001][ T31] audit: type=1400 audit(6807.196:115661): avc: denied { search } for pid=1052 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6298.515319][ T613] veth0_vlan: entered promiscuous mode [ 6298.525587][ T613] veth1_vlan: entered promiscuous mode [ 6298.568812][ T613] veth0_macvtap: entered promiscuous mode [ 6298.573930][ T613] veth1_macvtap: entered promiscuous mode [ 6298.575917][ T1131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=637 sclass=netlink_route_socket pid=1131 comm=syz.1.24039 [ 6298.612654][ T613] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6298.613009][ T613] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6298.613249][ T613] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6298.613503][ T613] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6300.130993][ T31] kauditd_printk_skb: 468 callbacks suppressed [ 6300.131058][ T31] audit: type=1400 audit(6812.076:116130): avc: denied { search } for pid=1162 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6300.266939][ T31] audit: type=1400 audit(6812.226:116131): avc: denied { write } for pid=1163 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6300.268531][ T31] audit: type=1400 audit(6812.226:116132): avc: denied { write open } for pid=1163 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6300.272636][ T31] audit: type=1400 audit(6812.236:116133): avc: denied { getattr } for pid=1163 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6300.274309][ T31] audit: type=1400 audit(6812.236:116134): avc: denied { ioctl } for pid=1163 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6300.291994][ T31] audit: type=1400 audit(6812.256:116135): avc: denied { search } for pid=1163 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6300.322016][ T31] audit: type=1400 audit(6812.276:116136): avc: denied { search } for pid=1164 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6300.322868][ T31] audit: type=1400 audit(6812.276:116137): avc: denied { read } for pid=1164 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6300.331819][ T31] audit: type=1400 audit(6812.276:116138): avc: denied { open } for pid=1164 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6300.332768][ T31] audit: type=1400 audit(6812.286:116139): avc: denied { getattr } for pid=1164 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6303.947018][ T1192] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1192 comm=syz.1.24052 [ 6305.142338][ T31] kauditd_printk_skb: 169 callbacks suppressed [ 6305.142408][ T31] audit: type=1400 audit(6817.106:116309): avc: denied { ioctl } for pid=1237 comm="syz.1.24074" path="socket:[189902]" dev="sockfs" ino=189902 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6305.152995][ T31] audit: type=1400 audit(6817.106:116310): avc: denied { read } for pid=1238 comm="syz.0.24073" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6305.153787][ T31] audit: type=1400 audit(6817.106:116311): avc: denied { open } for pid=1238 comm="syz.0.24073" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6305.154366][ T31] audit: type=1400 audit(6817.116:116312): avc: denied { create } for pid=1238 comm="syz.0.24073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6305.161162][ T31] audit: type=1400 audit(6817.116:116313): avc: denied { ioctl } for pid=1238 comm="syz.0.24073" path="socket:[189903]" dev="sockfs" ino=189903 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6305.161866][ T31] audit: type=1400 audit(6817.116:116314): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6305.162526][ T31] audit: type=1400 audit(6817.116:116315): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6305.163065][ T31] audit: type=1400 audit(6817.116:116316): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6305.239263][ T31] audit: type=1400 audit(6817.196:116317): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6305.242192][ T31] audit: type=1400 audit(6817.206:116318): avc: denied { read write open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6308.453114][ T1294] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=1294 comm=syz.0.24100 [ 6310.026225][ T1390] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2573 sclass=netlink_xfrm_socket pid=1390 comm=syz.0.24146 [ 6310.159233][ T31] kauditd_printk_skb: 314 callbacks suppressed [ 6310.159314][ T31] audit: type=1400 audit(6822.116:116633): avc: denied { create } for pid=1399 comm="syz.1.24152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6310.161658][ T31] audit: type=1400 audit(6822.126:116634): avc: denied { write } for pid=1399 comm="syz.1.24152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6310.162273][ T31] audit: type=1400 audit(6822.126:116635): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6310.162906][ T31] audit: type=1400 audit(6822.126:116636): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6310.163642][ T31] audit: type=1400 audit(6822.126:116637): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6310.178006][ T31] audit: type=1400 audit(6822.136:116638): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6310.179048][ T31] audit: type=1400 audit(6822.136:116639): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6310.191689][ T31] audit: type=1400 audit(6822.136:116640): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6310.210065][ T31] audit: type=1400 audit(6822.166:116641): avc: denied { create } for pid=1403 comm="syz.1.24154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6310.215865][ T31] audit: type=1400 audit(6822.176:116642): avc: denied { ioctl } for pid=1403 comm="syz.1.24154" path="socket:[189427]" dev="sockfs" ino=189427 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6314.100026][ T1496] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=513 sclass=netlink_audit_socket pid=1496 comm=syz.1.24197 [ 6314.304795][ T1502] sctp: [Deprecated]: syz.1.24200 (pid 1502) Use of int in max_burst socket option. [ 6314.304795][ T1502] Use struct sctp_assoc_value instead [ 6314.358203][ C0] vxcan0: j1939_tp_rxtimer: 0x84fd6000: rx timeout, send abort [ 6314.859623][ C0] vxcan0: j1939_tp_rxtimer: 0x84fd6000: abort rx timeout. Force session deactivation [ 6315.453603][ T31] kauditd_printk_skb: 302 callbacks suppressed [ 6315.453747][ T31] audit: type=1400 audit(6827.416:116945): avc: denied { write } for pid=1519 comm="syz.0.24209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6315.584950][ T31] audit: type=1400 audit(6827.546:116946): avc: denied { unmount } for pid=23822 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6315.605690][ T31] audit: type=1400 audit(6827.566:116947): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6315.607174][ T31] audit: type=1400 audit(6827.566:116948): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6315.608136][ T31] audit: type=1400 audit(6827.566:116949): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6315.687696][ T31] audit: type=1400 audit(6827.646:116950): avc: denied { module_request } for pid=1527 comm="syz.1.24211" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6315.770058][ T31] audit: type=1400 audit(6827.726:116951): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6315.773100][ T31] audit: type=1400 audit(6827.726:116952): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6315.774262][ T31] audit: type=1400 audit(6827.726:116953): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6315.848872][ T31] audit: type=1400 audit(6827.806:116954): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6317.291719][ T1552] serio: Serial port pts0 [ 6332.254056][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 6332.254169][ T31] audit: type=1400 audit(6844.206:117021): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6332.255159][ T31] audit: type=1400 audit(6844.216:117022): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6332.256220][ T31] audit: type=1400 audit(6844.216:117023): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6332.305242][ T31] audit: type=1400 audit(6844.256:117024): avc: denied { create } for pid=1566 comm="syz.1.24228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6332.310431][ T31] audit: type=1400 audit(6844.266:117025): avc: denied { write } for pid=1566 comm="syz.1.24228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6332.331231][ T31] audit: type=1400 audit(6844.286:117026): avc: denied { read } for pid=1570 comm="syz.0.24227" name="ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6332.332080][ T31] audit: type=1400 audit(6844.286:117027): avc: denied { open } for pid=1570 comm="syz.0.24227" path="/dev/ttyS3" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6332.341382][ T31] audit: type=1400 audit(6844.296:117028): avc: denied { ioctl } for pid=1570 comm="syz.0.24227" path="/dev/ttyS3" dev="devtmpfs" ino=609 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6332.344791][ T31] audit: type=1400 audit(6844.306:117029): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6332.345675][ T31] audit: type=1400 audit(6844.306:117030): avc: denied { read write open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6332.632901][ T1589] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=1589 comm=syz.0.24233 [ 6333.269662][ T1618] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=1618 comm=syz.0.24247 [ 6333.274903][ T1618] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1618 comm=syz.0.24247 [ 6336.777920][ T1698] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1698 comm=syz.0.24281 [ 6337.807248][ T31] kauditd_printk_skb: 279 callbacks suppressed [ 6337.807370][ T31] audit: type=1400 audit(6849.766:117310): avc: denied { write } for pid=1709 comm="syz.1.24287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6337.855358][ T31] audit: type=1400 audit(6849.816:117311): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6337.856146][ T31] audit: type=1400 audit(6849.816:117312): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6337.856712][ T31] audit: type=1400 audit(6849.816:117313): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6337.976763][ T31] audit: type=1400 audit(6849.936:117314): avc: denied { create } for pid=1715 comm="syz.0.24289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6338.015806][ T31] audit: type=1400 audit(6849.976:117315): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6338.017306][ T31] audit: type=1400 audit(6849.976:117316): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6338.017877][ T31] audit: type=1400 audit(6849.976:117317): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6338.174792][ T31] audit: type=1400 audit(6850.136:117318): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6338.175713][ T31] audit: type=1400 audit(6850.136:117319): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6343.106162][ T31] kauditd_printk_skb: 131 callbacks suppressed [ 6343.106259][ T31] audit: type=1400 audit(6855.066:117451): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6343.110005][ T31] audit: type=1400 audit(6855.066:117452): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6343.111752][ T31] audit: type=1400 audit(6855.066:117453): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6343.167747][ T31] audit: type=1400 audit(6855.126:117454): avc: denied { read } for pid=1781 comm="syz.0.24320" name="dsp" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.168892][ T31] audit: type=1400 audit(6855.126:117455): avc: denied { read open } for pid=1781 comm="syz.0.24320" path="/dev/dsp" dev="devtmpfs" ino=732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.172170][ T31] audit: type=1400 audit(6855.136:117456): avc: denied { ioctl } for pid=1781 comm="syz.0.24320" path="/dev/dsp" dev="devtmpfs" ino=732 ioctlcmd=0x500a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6343.195744][ T31] audit: type=1400 audit(6855.156:117457): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6343.196777][ T31] audit: type=1400 audit(6855.156:117458): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6343.197667][ T31] audit: type=1400 audit(6855.156:117459): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6343.272329][ T31] audit: type=1400 audit(6855.236:117460): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6345.759512][ T1874] serio: Serial port pts0 [ 6348.255695][ T31] kauditd_printk_skb: 248 callbacks suppressed [ 6348.255766][ T31] audit: type=1400 audit(6860.216:117709): avc: denied { create } for pid=1892 comm="syz.1.24369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6348.284904][ T31] audit: type=1400 audit(6860.246:117710): avc: denied { write } for pid=1892 comm="syz.1.24369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6348.302401][ T31] audit: type=1400 audit(6860.256:117711): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6348.306257][ T31] audit: type=1400 audit(6860.266:117712): avc: denied { read write open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6348.307669][ T31] audit: type=1400 audit(6860.266:117713): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6348.350083][ T31] audit: type=1400 audit(6860.306:117714): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6348.360839][ T31] audit: type=1400 audit(6860.316:117715): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6348.362125][ T31] audit: type=1400 audit(6860.316:117716): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6348.398781][ T31] audit: type=1400 audit(6860.356:117717): avc: denied { create } for pid=1897 comm="syz.1.24371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6348.402805][ T31] audit: type=1400 audit(6860.366:117718): avc: denied { ioctl } for pid=1897 comm="syz.1.24371" path="socket:[191005]" dev="sockfs" ino=191005 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6350.984678][ T1933] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1933 comm=syz.1.24384 [ 6352.030416][ T1959] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=1959 comm=syz.1.24390 [ 6353.304548][ T31] kauditd_printk_skb: 122 callbacks suppressed [ 6353.304619][ T31] audit: type=1400 audit(6865.266:117841): avc: denied { write } for pid=1968 comm="syz.1.24395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6353.320004][ T31] audit: type=1400 audit(6865.276:117842): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6353.321120][ T31] audit: type=1400 audit(6865.286:117843): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6353.322142][ T31] audit: type=1400 audit(6865.286:117844): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6353.472813][ T31] audit: type=1400 audit(6865.426:117845): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6353.483716][ T31] audit: type=1400 audit(6865.446:117846): avc: denied { read write open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6353.484947][ T31] audit: type=1400 audit(6865.446:117847): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6353.660908][ T31] audit: type=1400 audit(6865.616:117848): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6353.661669][ T31] audit: type=1400 audit(6865.616:117849): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6353.662456][ T31] audit: type=1400 audit(6865.616:117850): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6356.884973][ T1984] sctp: [Deprecated]: syz.0.24401 (pid 1984) Use of struct sctp_assoc_value in delayed_ack socket option. [ 6356.884973][ T1984] Use struct sctp_sack_info instead [ 6358.718833][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 6358.718883][ T31] audit: type=1400 audit(6870.676:117874): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6358.719981][ T31] audit: type=1400 audit(6870.676:117875): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6358.721306][ T31] audit: type=1400 audit(6870.686:117876): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6358.916088][ T31] audit: type=1400 audit(6870.876:117877): avc: denied { read } for pid=1989 comm="syz.1.24404" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6358.917663][ T31] audit: type=1400 audit(6870.876:117878): avc: denied { open } for pid=1989 comm="syz.1.24404" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6358.923999][ T31] audit: type=1400 audit(6870.886:117879): avc: denied { create } for pid=1989 comm="syz.1.24404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6358.926528][ T31] audit: type=1400 audit(6870.886:117880): avc: denied { write } for pid=1989 comm="syz.1.24404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6358.948942][ T31] audit: type=1400 audit(6870.906:117881): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6358.950324][ T31] audit: type=1400 audit(6870.906:117882): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6358.951959][ T31] audit: type=1400 audit(6870.916:117883): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6362.208722][ T2020] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2020 comm=syz.1.24418 [ 6364.214924][ T31] kauditd_printk_skb: 69 callbacks suppressed [ 6364.215035][ T31] audit: type=1400 audit(6876.176:117953): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6364.216513][ T31] audit: type=1400 audit(6876.176:117954): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6364.217327][ T31] audit: type=1400 audit(6876.176:117955): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6364.248648][ T31] audit: type=1400 audit(6876.206:117956): avc: denied { create } for pid=2025 comm="syz.0.24420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6364.252919][ T31] audit: type=1400 audit(6876.206:117957): avc: denied { ioctl } for pid=2025 comm="syz.0.24420" path="socket:[192356]" dev="sockfs" ino=192356 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6364.274753][ T31] audit: type=1400 audit(6876.236:117958): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6364.281283][ T31] audit: type=1400 audit(6876.236:117959): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6364.282094][ T31] audit: type=1400 audit(6876.236:117960): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6364.387166][ T31] audit: type=1400 audit(6876.346:117961): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6364.401129][ T31] audit: type=1400 audit(6876.356:117962): avc: denied { create } for pid=2030 comm="syz.1.24422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6364.659161][ T2041] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=2041 comm=syz.1.24426 [ 6366.131415][ T3772] usb 2-1: new high-speed USB device number 21 using dummy_hcd [ 6366.311330][ T3772] usb 2-1: Using ep0 maxpacket: 16 [ 6366.323106][ T3772] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 6366.336783][ T3772] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 6366.337220][ T3772] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6366.337494][ T3772] usb 2-1: Product: syz [ 6366.337661][ T3772] usb 2-1: Manufacturer: syz [ 6366.337829][ T3772] usb 2-1: SerialNumber: syz [ 6366.563110][ T3772] usb 2-1: USB disconnect, device number 21 [ 6369.577850][ T31] kauditd_printk_skb: 207 callbacks suppressed [ 6369.577982][ T31] audit: type=1400 audit(6881.536:118170): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6369.581760][ T31] audit: type=1400 audit(6881.536:118171): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6369.582928][ T31] audit: type=1400 audit(6881.536:118172): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6369.653015][ T31] audit: type=1400 audit(6881.616:118173): avc: denied { create } for pid=2127 comm="syz.1.24461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6369.657670][ T31] audit: type=1400 audit(6881.616:118174): avc: denied { create } for pid=2127 comm="syz.1.24461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 6369.659144][ T31] audit: type=1400 audit(6881.616:118175): avc: denied { module_request } for pid=2127 comm="syz.1.24461" kmod="net-pf-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6369.694300][ T31] audit: type=1400 audit(6881.656:118176): avc: denied { ioctl } for pid=2124 comm="syz.0.24460" path="/dev/snd/seq" dev="devtmpfs" ino=727 ioctlcmd=0x5330 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6369.794508][ T31] audit: type=1400 audit(6881.756:118177): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6369.801000][ T31] audit: type=1400 audit(6881.756:118178): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6369.801572][ T31] audit: type=1400 audit(6881.756:118179): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6373.576565][ T2184] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=513 sclass=netlink_audit_socket pid=2184 comm=syz.0.24483 [ 6374.584847][ T31] kauditd_printk_skb: 180 callbacks suppressed [ 6374.584971][ T31] audit: type=1400 audit(6886.546:118360): avc: denied { create } for pid=2215 comm="syz.1.24499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6374.586315][ T31] audit: type=1400 audit(6886.546:118361): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6374.587285][ T31] audit: type=1400 audit(6886.546:118362): avc: denied { read write open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6374.589870][ T31] audit: type=1400 audit(6886.546:118363): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6374.621254][ T31] audit: type=1400 audit(6886.576:118364): avc: denied { create } for pid=2215 comm="syz.1.24499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6374.624218][ T31] audit: type=1400 audit(6886.576:118365): avc: denied { setopt } for pid=2215 comm="syz.1.24499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6374.627964][ T31] audit: type=1400 audit(6886.586:118366): avc: denied { write } for pid=2215 comm="syz.1.24499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6374.635686][ T31] audit: type=1400 audit(6886.596:118367): avc: denied { create } for pid=2215 comm="syz.1.24499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6374.648171][ T31] audit: type=1400 audit(6886.606:118368): avc: denied { read write } for pid=2215 comm="syz.1.24499" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6374.649739][ T31] audit: type=1400 audit(6886.606:118369): avc: denied { open } for pid=2215 comm="syz.1.24499" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6374.998492][ T2232] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=2232 comm=syz.1.24506 [ 6375.088830][ T2234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2234 comm=syz.1.24507 [ 6375.878317][ T2252] serio: Serial port pts0 [ 6377.894126][ T2276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2276 comm=syz.0.24525 [ 6381.605676][ T31] kauditd_printk_skb: 138 callbacks suppressed [ 6381.605787][ T31] audit: type=1400 audit(6893.566:118508): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6381.606937][ T31] audit: type=1400 audit(6893.566:118509): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6381.608244][ T31] audit: type=1400 audit(6893.566:118510): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6381.660052][ T31] audit: type=1400 audit(6893.616:118511): avc: denied { read } for pid=2285 comm="syz.0.24529" dev="nsfs" ino=4026532658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6381.662309][ T31] audit: type=1400 audit(6893.616:118512): avc: denied { open } for pid=2285 comm="syz.0.24529" path="net:[4026532658]" dev="nsfs" ino=4026532658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6381.663269][ T31] audit: type=1400 audit(6893.626:118513): avc: denied { create } for pid=2285 comm="syz.0.24529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6381.664647][ T31] audit: type=1400 audit(6893.626:118514): avc: denied { write } for pid=2285 comm="syz.0.24529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6381.678218][ T31] audit: type=1400 audit(6893.636:118515): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6381.679293][ T31] audit: type=1400 audit(6893.636:118516): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6381.680295][ T31] audit: type=1400 audit(6893.636:118517): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6383.728917][ T2308] serio: Serial port pts1 [ 6389.337161][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 6389.337340][ T31] audit: type=1400 audit(6901.296:118558): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6389.338863][ T31] audit: type=1400 audit(6901.296:118559): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6389.339841][ T31] audit: type=1400 audit(6901.296:118560): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6389.402819][ T31] audit: type=1400 audit(6901.366:118561): avc: denied { read } for pid=2313 comm="syz.0.24539" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6389.404170][ T31] audit: type=1400 audit(6901.366:118562): avc: denied { open } for pid=2313 comm="syz.0.24539" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6389.428387][ T31] audit: type=1400 audit(6901.386:118563): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6389.429648][ T31] audit: type=1400 audit(6901.386:118564): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6389.430463][ T31] audit: type=1400 audit(6901.386:118565): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6389.496867][ T31] audit: type=1400 audit(6901.456:118566): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6389.498134][ T31] audit: type=1400 audit(6901.456:118567): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6389.644729][ T2322] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=2322 comm=syz.0.24543 [ 6389.749700][ T2326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2326 comm=syz.0.24545 [ 6390.913923][ T2351] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1546 sclass=netlink_audit_socket pid=2351 comm=syz.1.24556 [ 6393.943616][ T2429] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2429 comm=syz.0.24594 [ 6394.819372][ T31] kauditd_printk_skb: 290 callbacks suppressed [ 6394.853759][ T31] audit: type=1400 audit(6906.776:118858): avc: denied { write } for pid=2435 comm="syz.1.24597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6394.869003][ T31] audit: type=1400 audit(6906.826:118859): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6394.870097][ T31] audit: type=1400 audit(6906.826:118860): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6394.881167][ T31] audit: type=1400 audit(6906.826:118861): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6394.978615][ T31] audit: type=1400 audit(6906.936:118862): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6394.979237][ T31] audit: type=1400 audit(6906.936:118863): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6394.979854][ T31] audit: type=1400 audit(6906.936:118864): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6395.053306][ T31] audit: type=1400 audit(6907.016:118865): avc: denied { write } for pid=2441 comm="syz.0.24599" name="seq" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6395.054094][ T31] audit: type=1400 audit(6907.016:118866): avc: denied { open } for pid=2441 comm="syz.0.24599" path="/dev/snd/seq" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6395.062074][ T31] audit: type=1400 audit(6907.026:118867): avc: denied { ioctl } for pid=2441 comm="syz.0.24599" path="/dev/snd/seq" dev="devtmpfs" ino=727 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6395.345355][ T2448] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=2448 comm=syz.0.24602 [ 6400.098869][ T31] kauditd_printk_skb: 106 callbacks suppressed [ 6400.099034][ T31] audit: type=1400 audit(6912.056:118974): avc: denied { create } for pid=2483 comm="syz.0.24620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6400.649732][ T31] audit: type=1400 audit(6912.606:118975): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6400.653725][ T31] audit: type=1400 audit(6912.616:118976): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6400.661149][ T31] audit: type=1400 audit(6912.616:118977): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6400.707172][ T31] audit: type=1400 audit(6912.666:118978): avc: denied { create } for pid=2486 comm="syz.1.24621" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6400.714989][ T31] audit: type=1400 audit(6912.676:118979): avc: denied { ioctl } for pid=2486 comm="syz.1.24621" path="socket:[193708]" dev="sockfs" ino=193708 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6400.729032][ T31] audit: type=1400 audit(6912.686:118980): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6400.731268][ T31] audit: type=1400 audit(6912.686:118981): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6400.732721][ T31] audit: type=1400 audit(6912.696:118982): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6400.775015][ T31] audit: type=1400 audit(6912.736:118983): avc: denied { create } for pid=2488 comm="syz.1.24622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6402.943072][ T2495] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1015 sclass=netlink_xfrm_socket pid=2495 comm=syz.1.24624 [ 6405.137196][ T31] kauditd_printk_skb: 141 callbacks suppressed [ 6405.137333][ T31] audit: type=1400 audit(6917.096:119125): avc: denied { create } for pid=2546 comm="syz.1.24649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6405.150222][ T31] audit: type=1400 audit(6917.106:119126): avc: denied { write } for pid=2546 comm="syz.1.24649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6405.173587][ T31] audit: type=1400 audit(6917.136:119127): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6405.174798][ T31] audit: type=1400 audit(6917.136:119128): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6405.175658][ T31] audit: type=1400 audit(6917.136:119129): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6405.237633][ T31] audit: type=1400 audit(6917.196:119130): avc: denied { create } for pid=2548 comm="syz.1.24650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6405.240466][ T31] audit: type=1400 audit(6917.196:119131): avc: denied { write } for pid=2548 comm="syz.1.24650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6405.267238][ T31] audit: type=1400 audit(6917.226:119132): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6405.271637][ T31] audit: type=1400 audit(6917.226:119133): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6405.272388][ T31] audit: type=1400 audit(6917.226:119134): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6407.748629][ T2608] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=2608 comm=syz.1.24679 [ 6410.221211][ T31] kauditd_printk_skb: 203 callbacks suppressed [ 6410.221290][ T31] audit: type=1400 audit(6922.176:119338): avc: denied { create } for pid=2628 comm="syz.0.24689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6410.332321][ T31] audit: type=1400 audit(6922.296:119339): avc: denied { read } for pid=2629 comm="syz.1.24690" name="audio" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6410.332927][ T31] audit: type=1400 audit(6922.296:119341): avc: denied { read open } for pid=2629 comm="syz.1.24690" path="/dev/audio" dev="devtmpfs" ino=733 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6410.333296][ T31] audit: type=1400 audit(6922.296:119340): avc: denied { write } for pid=2628 comm="syz.0.24689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6410.335633][ T31] audit: type=1400 audit(6922.296:119342): avc: denied { ioctl } for pid=2629 comm="syz.1.24690" path="/dev/audio" dev="devtmpfs" ino=733 ioctlcmd=0x500b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6410.371001][ T31] audit: type=1400 audit(6922.326:119343): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6410.371775][ T31] audit: type=1400 audit(6922.326:119344): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6410.372373][ T31] audit: type=1400 audit(6922.326:119345): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6410.577388][ T31] audit: type=1400 audit(6922.536:119346): avc: denied { create } for pid=2633 comm="syz.1.24691" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6410.601007][ T31] audit: type=1400 audit(6922.556:119347): avc: denied { write } for pid=2633 comm="syz.1.24691" path="socket:[194665]" dev="sockfs" ino=194665 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6415.257047][ T31] kauditd_printk_skb: 208 callbacks suppressed [ 6415.257173][ T31] audit: type=1400 audit(6927.216:119556): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6415.261677][ T31] audit: type=1400 audit(6927.216:119557): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6415.262431][ T31] audit: type=1400 audit(6927.216:119558): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6415.348916][ T31] audit: type=1400 audit(6927.306:119559): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6415.350271][ T31] audit: type=1400 audit(6927.306:119560): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6415.353645][ T31] audit: type=1400 audit(6927.306:119561): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6415.377192][ T31] audit: type=1400 audit(6927.336:119562): avc: denied { setopt } for pid=2724 comm="syz.0.24736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6415.430026][ T31] audit: type=1400 audit(6927.386:119563): avc: denied { read } for pid=2737 comm="syz.1.24739" dev="nsfs" ino=4026532986 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6415.436367][ T31] audit: type=1400 audit(6927.386:119564): avc: denied { open } for pid=2737 comm="syz.1.24739" path="net:[4026532986]" dev="nsfs" ino=4026532986 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6415.463135][ T31] audit: type=1400 audit(6927.426:119565): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6415.515850][ T2740] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1544 sclass=netlink_xfrm_socket pid=2740 comm=syz.1.24740 [ 6420.537421][ T31] kauditd_printk_skb: 133 callbacks suppressed [ 6420.538303][ T31] audit: type=1400 audit(6932.496:119699): avc: denied { read write } for pid=2792 comm="syz.1.24762" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6420.543574][ T31] audit: type=1400 audit(6932.496:119700): avc: denied { open } for pid=2792 comm="syz.1.24762" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6420.555127][ T31] audit: type=1400 audit(6932.516:119701): avc: denied { ioctl } for pid=2792 comm="syz.1.24762" path="/dev/fuse" dev="devtmpfs" ino=89 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6420.609915][ T31] audit: type=1400 audit(6932.556:119702): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6420.621342][ T31] audit: type=1400 audit(6932.556:119703): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6420.622665][ T31] audit: type=1400 audit(6932.566:119704): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6420.652570][ T31] audit: type=1400 audit(6932.616:119705): avc: denied { unmount } for pid=613 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6420.731788][ T31] audit: type=1400 audit(6932.676:119706): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6420.733436][ T31] audit: type=1400 audit(6932.676:119707): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6420.739616][ T31] audit: type=1400 audit(6932.676:119708): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6422.882524][ T2834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=2834 comm=syz.0.24781 [ 6425.542464][ T31] kauditd_printk_skb: 143 callbacks suppressed [ 6425.542794][ T31] audit: type=1400 audit(6937.506:119852): avc: denied { write } for pid=2863 comm="syz.0.24793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6425.592904][ T31] audit: type=1400 audit(6937.556:119853): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6425.593800][ T31] audit: type=1400 audit(6937.556:119854): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6425.594375][ T31] audit: type=1400 audit(6937.556:119855): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6425.939899][ T31] audit: type=1400 audit(6937.896:119856): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6425.942992][ T31] audit: type=1400 audit(6937.896:119857): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6425.943900][ T31] audit: type=1400 audit(6937.896:119858): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6426.011580][ T31] audit: type=1400 audit(6937.966:119859): avc: denied { create } for pid=2867 comm="syz.1.24795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6426.051799][ T31] audit: type=1400 audit(6938.006:119860): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6426.053253][ T31] audit: type=1400 audit(6938.006:119861): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6426.372083][ C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies. [ 6431.927757][ T31] kauditd_printk_skb: 205 callbacks suppressed [ 6431.928311][ T31] audit: type=1400 audit(6943.886:120067): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6431.929786][ T31] audit: type=1400 audit(6943.886:120068): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6431.931147][ T31] audit: type=1400 audit(6943.896:120069): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6431.978938][ T31] audit: type=1400 audit(6943.936:120070): avc: denied { write } for pid=2983 comm="syz.1.24844" name="dmmidi2" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6431.979870][ T31] audit: type=1400 audit(6943.936:120071): avc: denied { open } for pid=2983 comm="syz.1.24844" path="/dev/dmmidi2" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6431.981972][ T31] audit: type=1400 audit(6943.936:120072): avc: denied { ioctl } for pid=2983 comm="syz.1.24844" path="/dev/dmmidi2" dev="devtmpfs" ino=747 ioctlcmd=0x5701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6431.999800][ T31] audit: type=1400 audit(6943.956:120073): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6432.002044][ T31] audit: type=1400 audit(6943.966:120074): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6432.002795][ T31] audit: type=1400 audit(6943.966:120075): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6432.047116][ T31] audit: type=1400 audit(6944.006:120076): avc: denied { create } for pid=2985 comm="syz.1.24845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6433.031297][ T3026] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3026 comm=syz.0.24865 [ 6433.646677][ T3068] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1025 sclass=netlink_audit_socket pid=3068 comm=syz.1.24884 [ 6433.743701][ T3080] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3080 comm=syz.0.24887 [ 6436.944151][ T31] kauditd_printk_skb: 356 callbacks suppressed [ 6436.944290][ T31] audit: type=1400 audit(6948.906:120433): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6436.945483][ T31] audit: type=1400 audit(6948.906:120434): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6436.946031][ T31] audit: type=1400 audit(6948.906:120435): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6436.979682][ T31] audit: type=1400 audit(6948.936:120436): avc: denied { create } for pid=3150 comm="syz.0.24920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6436.985781][ T31] audit: type=1400 audit(6948.946:120437): avc: denied { ioctl } for pid=3150 comm="syz.0.24920" path="socket:[195817]" dev="sockfs" ino=195817 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6437.000880][ T31] audit: type=1400 audit(6948.956:120438): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6437.001639][ T31] audit: type=1400 audit(6948.956:120439): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6437.002041][ T31] audit: type=1400 audit(6948.966:120440): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6437.034934][ T31] audit: type=1400 audit(6948.996:120441): avc: denied { create } for pid=3152 comm="syz.0.24921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6437.038283][ T31] audit: type=1400 audit(6948.996:120442): avc: denied { write } for pid=3152 comm="syz.0.24921" path="socket:[195824]" dev="sockfs" ino=195824 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6441.966009][ T31] kauditd_printk_skb: 154 callbacks suppressed [ 6441.966098][ T31] audit: type=1400 audit(6953.926:120597): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6441.966704][ T31] audit: type=1400 audit(6953.926:120598): avc: denied { create } for pid=3215 comm="syz.0.24952" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6441.967311][ T31] audit: type=1400 audit(6953.926:120599): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6441.968173][ T31] audit: type=1400 audit(6953.926:120600): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6442.438553][ T31] audit: type=1400 audit(6954.396:120601): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6442.441870][ T31] audit: type=1400 audit(6954.396:120602): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6442.443108][ T31] audit: type=1400 audit(6954.396:120603): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6442.526067][ T31] audit: type=1400 audit(6954.486:120604): avc: denied { create } for pid=3215 comm="syz.0.24952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6442.579128][ T31] audit: type=1400 audit(6954.536:120605): avc: denied { write } for pid=3215 comm="syz.0.24952" path="socket:[196039]" dev="sockfs" ino=196039 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6442.691792][ T31] audit: type=1400 audit(6954.646:120606): avc: denied { read } for pid=3226 comm="syz.1.24956" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6442.751293][ T3227] serio: Serial port pts0 [ 6444.866883][ T3234] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3234 comm=syz.0.24957 [ 6446.253232][ T3267] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3267 comm=syz.0.24970 [ 6446.537375][ T3277] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3277 comm=syz.0.24975 [ 6447.321386][ T31] kauditd_printk_skb: 121 callbacks suppressed [ 6447.321465][ T31] audit: type=1400 audit(6959.276:120728): avc: denied { read } for pid=3286 comm="syz.0.24980" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6447.322265][ T31] audit: type=1400 audit(6959.286:120729): avc: denied { open } for pid=3286 comm="syz.0.24980" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6447.322674][ T31] audit: type=1400 audit(6959.286:120730): avc: denied { create } for pid=3286 comm="syz.0.24980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6447.326162][ T31] audit: type=1400 audit(6959.286:120731): avc: denied { create } for pid=3286 comm="syz.0.24980" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6447.328106][ T31] audit: type=1400 audit(6959.286:120732): avc: denied { ioctl } for pid=3286 comm="syz.0.24980" path="socket:[196217]" dev="sockfs" ino=196217 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 6447.331997][ T31] audit: type=1400 audit(6959.296:120733): avc: denied { ioctl } for pid=3286 comm="syz.0.24980" path="/dev/full" dev="devtmpfs" ino=6 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6449.331709][ T31] audit: type=1400 audit(6961.296:120734): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6449.334547][ T31] audit: type=1400 audit(6961.296:120735): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6449.335441][ T31] audit: type=1400 audit(6961.296:120736): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6449.406050][ T31] audit: type=1400 audit(6961.366:120737): avc: denied { create } for pid=3289 comm="syz.0.24981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6453.066206][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 6453.066416][ T31] audit: type=1400 audit(6965.026:120754): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6453.068183][ T31] audit: type=1400 audit(6965.026:120755): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6453.069092][ T31] audit: type=1400 audit(6965.026:120756): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6453.111530][ T31] audit: type=1400 audit(6965.066:120757): avc: denied { create } for pid=3296 comm="syz.0.24984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6453.115432][ T31] audit: type=1400 audit(6965.076:120758): avc: denied { write } for pid=3296 comm="syz.0.24984" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6453.134540][ T31] audit: type=1400 audit(6965.096:120759): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6453.135919][ T31] audit: type=1400 audit(6965.096:120760): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6453.136525][ T31] audit: type=1400 audit(6965.096:120761): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6453.172558][ T31] audit: type=1400 audit(6965.136:120762): avc: denied { read } for pid=3298 comm="syz.0.24985" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6453.173455][ T31] audit: type=1400 audit(6965.136:120763): avc: denied { open } for pid=3298 comm="syz.0.24985" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6456.418651][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 6458.083826][ T31] kauditd_printk_skb: 183 callbacks suppressed [ 6458.083913][ T31] audit: type=1400 audit(6970.046:120947): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6458.084709][ T31] audit: type=1400 audit(6970.046:120948): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6458.085147][ T31] audit: type=1400 audit(6970.046:120949): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6458.193626][ T31] audit: type=1400 audit(6970.156:120950): avc: denied { read write } for pid=3383 comm="syz.0.25024" name="virtual_nci" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6458.194632][ T31] audit: type=1400 audit(6970.156:120951): avc: denied { open } for pid=3383 comm="syz.0.25024" path="/dev/virtual_nci" dev="devtmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6458.245787][ T31] audit: type=1400 audit(6970.206:120952): avc: denied { ioctl } for pid=3383 comm="syz.0.25024" path="/dev/virtual_nci" dev="devtmpfs" ino=674 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6458.263933][ T31] audit: type=1400 audit(6970.226:120953): avc: denied { read } for pid=3383 comm="syz.0.25024" dev="nsfs" ino=4026532658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6458.264790][ T31] audit: type=1400 audit(6970.226:120954): avc: denied { open } for pid=3383 comm="syz.0.25024" path="net:[4026532658]" dev="nsfs" ino=4026532658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6458.265432][ T31] audit: type=1400 audit(6970.226:120955): avc: denied { create } for pid=3383 comm="syz.0.25024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6458.268643][ T31] audit: type=1400 audit(6970.226:120956): avc: denied { write } for pid=3383 comm="syz.0.25024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6463.301154][ T3384] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 6463.303095][ T31] kauditd_printk_skb: 74 callbacks suppressed [ 6463.303154][ T31] audit: type=1400 audit(6975.266:121031): avc: denied { read } for pid=3383 comm="syz.0.25024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6463.304191][ T31] audit: type=1400 audit(6975.266:121032): avc: denied { module_request } for pid=3420 comm="syz.1.25038" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6463.381193][ T31] audit: type=1400 audit(6975.336:121033): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6463.382181][ T31] audit: type=1400 audit(6975.336:121034): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6463.382936][ T31] audit: type=1400 audit(6975.336:121035): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6463.431490][ T31] audit: type=1400 audit(6975.386:121036): avc: denied { read } for pid=3420 comm="syz.1.25038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6463.458681][ T31] audit: type=1400 audit(6975.416:121037): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6463.471945][ T31] audit: type=1400 audit(6975.416:121038): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6463.473132][ T31] audit: type=1400 audit(6975.426:121039): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6463.517103][ T31] audit: type=1400 audit(6975.476:121040): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6464.270375][ T3465] serio: Serial port pts0 [ 6464.427659][ T3472] SELinux: Context system_u:object_r:dhcpc_state_t:s0 is not valid (left unmapped). [ 6464.724006][ T3482] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2304 sclass=netlink_tcpdiag_socket pid=3482 comm=syz.1.25066 [ 6469.815731][ T31] kauditd_printk_skb: 251 callbacks suppressed [ 6469.816088][ T31] audit: type=1400 audit(6981.776:121292): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6469.831062][ T31] audit: type=1400 audit(6981.776:121293): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6469.831814][ T31] audit: type=1400 audit(6981.776:121294): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6469.923410][ T31] audit: type=1400 audit(6981.886:121295): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6469.924142][ T31] audit: type=1400 audit(6981.886:121296): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6469.924806][ T31] audit: type=1400 audit(6981.886:121297): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6470.034467][ T31] audit: type=1400 audit(6981.996:121298): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6470.035381][ T31] audit: type=1400 audit(6981.996:121299): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6470.036028][ T31] audit: type=1400 audit(6981.996:121300): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6470.161848][ T31] audit: type=1400 audit(6982.116:121301): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6473.126319][ T3583] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3583 comm=syz.0.25114 [ 6473.341829][ T3587] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3587 comm=syz.0.25116 [ 6474.838617][ T31] kauditd_printk_skb: 172 callbacks suppressed [ 6474.838710][ T31] audit: type=1400 audit(6986.796:121474): avc: denied { create } for pid=3622 comm="syz.0.25134" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6474.839842][ T31] audit: type=1400 audit(6986.796:121475): avc: denied { map } for pid=3622 comm="syz.0.25134" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=198068 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6474.840478][ T31] audit: type=1400 audit(6986.796:121476): avc: denied { read write } for pid=3622 comm="syz.0.25134" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=198068 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6474.857359][ T31] audit: type=1400 audit(6986.816:121477): avc: denied { getopt } for pid=3622 comm="syz.0.25134" lport=58315 faddr=fc01:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6474.857898][ T31] audit: type=1400 audit(6986.816:121478): avc: denied { connect } for pid=3622 comm="syz.0.25134" lport=58315 faddr=fc01:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6474.858221][ T31] audit: type=1400 audit(6986.816:121479): avc: denied { name_connect } for pid=3622 comm="syz.0.25134" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 6475.369974][ T31] audit: type=1400 audit(6987.326:121480): avc: denied { shutdown } for pid=3622 comm="syz.0.25134" laddr=fe80::12 lport=58315 faddr=fe80:: scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6475.411219][ T31] audit: type=1400 audit(6987.366:121481): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6475.411990][ T31] audit: type=1400 audit(6987.376:121482): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6475.412362][ T31] audit: type=1400 audit(6987.376:121483): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6475.908840][ T3645] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=3645 comm=syz.0.25144 [ 6477.483404][ T3672] netlink: 'syz.0.25155': attribute type 27 has an invalid length. [ 6477.628934][ T3672] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6477.629588][ T3672] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6477.629799][ T3672] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6477.629999][ T3672] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6477.737903][ T3672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6477.783668][ T3672] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 6477.784056][ T3672] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 6477.785793][ T3672] veth1_vlan: left promiscuous mode [ 6477.787353][ T3672] veth0_vlan: left promiscuous mode [ 6477.788537][ T3672] veth0_vlan: entered promiscuous mode [ 6477.789937][ T3672] veth1_vlan: entered promiscuous mode [ 6477.793385][ T3672] veth1_macvtap: left promiscuous mode [ 6477.794076][ T3672] veth0_macvtap: left promiscuous mode [ 6477.794678][ T3672] veth0_macvtap: entered promiscuous mode [ 6477.795301][ T3672] veth1_macvtap: entered promiscuous mode [ 6477.796226][ T3672] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6477.796477][ T3672] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6477.797255][ T3672] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6477.797513][ T3672] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6477.802553][ T3672] A link change request failed with some changes committed already. Interface vlan0000 may have been left with an inconsistent configuration, please check. [ 6480.418873][ T31] kauditd_printk_skb: 127 callbacks suppressed [ 6480.418951][ T31] audit: type=1400 audit(6992.376:121611): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6480.419810][ T31] audit: type=1400 audit(6992.376:121612): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6480.420240][ T31] audit: type=1400 audit(6992.376:121613): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6480.496204][ T31] audit: type=1400 audit(6992.456:121614): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6480.496790][ T31] audit: type=1400 audit(6992.456:121615): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6480.497268][ T31] audit: type=1400 audit(6992.456:121616): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6480.540999][ T31] audit: type=1400 audit(6992.496:121617): avc: denied { read write } for pid=3679 comm="syz.0.25158" name="vhost-vsock" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6480.541621][ T31] audit: type=1400 audit(6992.496:121618): avc: denied { open } for pid=3679 comm="syz.0.25158" path="/dev/vhost-vsock" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6480.542118][ T31] audit: type=1400 audit(6992.496:121619): avc: denied { ioctl } for pid=3679 comm="syz.0.25158" path="/dev/vhost-vsock" dev="devtmpfs" ino=724 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6480.572022][ T31] audit: type=1400 audit(6992.526:121620): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6485.963518][ T31] kauditd_printk_skb: 87 callbacks suppressed [ 6485.963911][ T31] audit: type=1400 audit(6997.926:121708): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6485.970998][ T31] audit: type=1400 audit(6997.926:121709): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6485.971531][ T31] audit: type=1400 audit(6997.926:121710): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6486.003110][ T31] audit: type=1400 audit(6997.966:121711): avc: denied { create } for pid=3720 comm="syz.0.25177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6486.005804][ T31] audit: type=1400 audit(6997.966:121712): avc: denied { write } for pid=3720 comm="syz.0.25177" path="socket:[198412]" dev="sockfs" ino=198412 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6486.022446][ T31] audit: type=1400 audit(6997.986:121713): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6486.023294][ T31] audit: type=1400 audit(6997.986:121714): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6486.024271][ T31] audit: type=1400 audit(6997.986:121715): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6486.056897][ T31] audit: type=1400 audit(6998.016:121716): avc: denied { mount } for pid=3722 comm="syz.0.25178" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 6486.071783][ T31] audit: type=1400 audit(6998.026:121717): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6491.116492][ T31] kauditd_printk_skb: 90 callbacks suppressed [ 6491.116580][ T31] audit: type=1400 audit(7003.076:121808): avc: denied { unmount } for pid=613 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6491.131319][ T31] audit: type=1400 audit(7003.086:121809): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6491.136381][ T31] audit: type=1400 audit(7003.096:121810): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6491.141233][ T31] audit: type=1400 audit(7003.096:121811): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6491.185417][ T31] audit: type=1400 audit(7003.146:121812): avc: denied { read } for pid=3767 comm="syz.0.25197" name="mice" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6491.186067][ T31] audit: type=1400 audit(7003.146:121813): avc: denied { open } for pid=3767 comm="syz.0.25197" path="/dev/input/mice" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6491.207192][ T31] audit: type=1400 audit(7003.166:121814): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6491.207911][ T31] audit: type=1400 audit(7003.166:121815): avc: denied { open } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6491.208610][ T31] audit: type=1400 audit(7003.166:121816): avc: denied { ioctl } for pid=613 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=877 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6491.236135][ T31] audit: type=1400 audit(7003.196:121817): avc: denied { create } for pid=3769 comm="syz.0.25198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6494.364261][ T3815] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3815 comm=syz.0.25218 [ 6495.221370][ T8855] usb 1-1: new high-speed USB device number 23 using dummy_hcd [ 6495.428954][ T8855] usb 1-1: config 0 has no interfaces? [ 6495.436431][ T8855] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 6495.437068][ T8855] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6495.437429][ T8855] usb 1-1: Product: syz [ 6495.437657][ T8855] usb 1-1: Manufacturer: syz [ 6495.437883][ T8855] usb 1-1: SerialNumber: syz [ 6495.449077][ T8855] usb 1-1: config 0 descriptor?? [ 6495.687191][ T8855] usb 1-1: USB disconnect, device number 23 [ 6496.123831][ T31] kauditd_printk_skb: 182 callbacks suppressed [ 6496.123979][ T31] audit: type=1400 audit(7008.086:122000): avc: denied { write } for pid=3854 comm="syz.0.25233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6496.133082][ T31] audit: type=1400 audit(7008.096:122001): avc: denied { read write } for pid=3855 comm="syz.1.25234" name="udmabuf" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6496.133881][ T31] audit: type=1400 audit(7008.096:122002): avc: denied { open } for pid=3855 comm="syz.1.25234" path="/dev/udmabuf" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6496.146566][ T31] audit: type=1400 audit(7008.106:122003): avc: denied { read write } for pid=613 comm="syz-executor" name="loop0" dev="devtmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6496.147287][ T31] audit: type=1400 audit(7008.106:122004): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6496.147947][ T31] audit: type=1400 audit(7008.106:122005): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6496.148595][ T31] audit: type=1400 audit(7008.106:122006): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6496.193917][ T31] audit: type=1400 audit(7008.146:122007): avc: denied { create } for pid=3858 comm="syz.0.25235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6496.201259][ T31] audit: type=1400 audit(7008.156:122008): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6496.202327][ T31] audit: type=1400 audit(7008.156:122009): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6500.829356][ T3910] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3910 comm=syz.1.25258 [ 6501.141422][ T31] kauditd_printk_skb: 139 callbacks suppressed [ 6501.141511][ T31] audit: type=1400 audit(7013.096:122149): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6501.142169][ T31] audit: type=1400 audit(7013.096:122150): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6501.142762][ T31] audit: type=1400 audit(7013.096:122151): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6501.194891][ T31] audit: type=1400 audit(7013.156:122152): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6501.195733][ T31] audit: type=1400 audit(7013.156:122153): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6501.196323][ T31] audit: type=1400 audit(7013.156:122154): avc: denied { ioctl } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6501.227596][ T31] audit: type=1400 audit(7013.186:122155): avc: denied { create } for pid=3923 comm="syz.1.25265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6501.239860][ T31] audit: type=1400 audit(7013.196:122156): avc: denied { write } for pid=3923 comm="syz.1.25265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6501.258207][ T31] audit: type=1400 audit(7013.216:122157): avc: denied { read write } for pid=23822 comm="syz-executor" name="loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6501.259213][ T31] audit: type=1400 audit(7013.216:122158): avc: denied { open } for pid=23822 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6505.014526][ T3998] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=3998 comm=syz.0.25299 [ 6505.081727][ T4001] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4001 comm=syz.0.25300 [ 6506.105307][ C0] Dead loop on virtual device ipvlan1, fix it urgently! [ 6506.107437][ T0] Kernel panic - not syncing: corrupted stack end detected inside scheduler [ 6506.108650][ T0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.11.0-rc1-syzkaller #0 [ 6506.109171][ T0] Hardware name: ARM-Versatile Express [ 6506.109732][ T0] Call trace: [ 6506.110245][ T0] [<81953788>] (dump_backtrace) from [<81953884>] (show_stack+0x18/0x1c) [ 6506.112162][ T0] r7:00000000 r6:826228c4 r5:00000000 r4:8200ba44 [ 6506.112817][ T0] [<8195386c>] (show_stack) from [<81971558>] (dump_stack_lvl+0x54/0x7c) [ 6506.113303][ T0] [<81971504>] (dump_stack_lvl) from [<81971598>] (dump_stack+0x18/0x1c) [ 6506.113803][ T0] r5:00000000 r4:8286bd18 [ 6506.114023][ T0] [<81971580>] (dump_stack) from [<8195432c>] (panic+0x120/0x358) [ 6506.114519][ T0] [<8195420c>] (panic) from [<81975dcc>] (__schedule+0xb68/0xb6c) [ 6506.114862][ T0] r3:57ac6e9d r2:00000001 r1:8200ba44 r0:81fff174 [ 6506.115223][ T0] r7:824b9340 [ 6506.115448][ T0] [<81975264>] (__schedule) from [<819760e8>] (schedule_idle+0x24/0x68) [ 6506.115826][ T0] r10:00000000 r9:00000000 r8:00000000 r7:8260c5fc r6:8261ae40 r5:8260c5d0 [ 6506.116307][ T0] r4:8261ae40 [ 6506.116550][ T0] [<819760c4>] (schedule_idle) from [<80297e98>] (do_idle+0x19c/0x2cc) [ 6506.117080][ T0] r5:8260c5d0 r4:00000000 [ 6506.117364][ T0] [<80297cfc>] (do_idle) from [<802982fc>] (cpu_startup_entry+0x30/0x34) [ 6506.117908][ T0] r10:8261a970 r9:82128ec4 r8:8260c580 r7:00000000 r6:deffc061 r5:82625864 [ 6506.118429][ T0] r4:000000ee [ 6506.118630][ T0] [<802982cc>] (cpu_startup_entry) from [<819738a8>] (kernel_init+0x0/0x138) [ 6506.118978][ T0] [<819737c8>] (rest_init) from [<82401398>] (start_kernel+0x75c/0x778) [ 6506.119419][ T0] [<82400c3c>] (start_kernel) from [<00000000>] (0x0) [ 6506.122006][ T0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 10:02:54 Registers: info registers vcpu 0 CPU#0 R00=82601da0 R01=00000000 R02=ffffffd0 R03=00000000 R04=0000000a R05=82601e4c R06=e92dd8f0 R07=82601da0 R08=00000000 R09=81ff67e4 R10=82601da0 R11=82601e20 R12=82601df0 R13=82601d94 R14=8020c350 R15=8020c350 PSR=40000093 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=80219a38 R02=90f00000 R03=83d94800 R04=83d94800 R05=ffedc000 R06=00c00000 R07=0000071f R08=00000000 R09=844e5840 R10=82fcad00 R11=eb47dd54 R12=eb47dd28 R13=eb47dd38 R14=804813cc R15=81972a90 PSR=20000013 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000