last executing test programs: 27m2.947156169s ago: executing program 1 (id=2714): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) 26m32.489650611s ago: executing program 1 (id=2716): munmap(&(0x7f0000002000/0x4000)=nil, 0x4000) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x11, 0x12, &(0x7f00000000c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x20008f, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x700}, {0x85, 0x0, 0x0, 0x86}}, {}, [@jmp={0x5, 0x0, 0xb, 0x9, 0x0, 0xffffffffffffffff, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x5}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x2a}}}, &(0x7f0000000680)='syzkaller\x00', 0x7, 0x1016, &(0x7f0000001880)=""/4118, 0x0, 0x20}, 0x94) 26m32.220637372s ago: executing program 1 (id=2717): r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551a, &(0x7f00000001c0)={0x5, 0x8, [0x0, 0x0]}) 26m32.069444068s ago: executing program 1 (id=2718): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0xffffff, 0x10000}, 0x10) write(r0, &(0x7f0000000000)="240000001a00590214f9f407000904101f000000000000200000000008fe040001000000", 0x24) 26m31.899292035s ago: executing program 1 (id=2719): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000380)=0x2, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 26m31.750200892s ago: executing program 1 (id=2720): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000380)=0x2, 0x4) 25m46.082173924s ago: executing program 32 (id=2720): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000380)=0x2, 0x4) 5m31.899459037s ago: executing program 2 (id=4182): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x20044844, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @local, 0x1}, 0x80) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RWALK(r1, 0x0, 0x0) 5m30.662102898s ago: executing program 2 (id=4183): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x80000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='geneve1\x00', 0x10) connect$l2tp(r1, &(0x7f0000000340)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), r2) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x33}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x40800}, 0x200080c1) sendmsg$AUDIT_DEL_RULE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x9}, 0x40000) 5m27.509316037s ago: executing program 2 (id=4186): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x80000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000140)='geneve1\x00', 0x10) connect$l2tp(r1, &(0x7f0000000340)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, 0x10) ioctl$AUTOFS_IOC_FAIL(r0, 0x9361, 0x3ff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r2) ioctl$IOMMU_VFIO_IOMMU_UNMAP_DMA(r2, 0x3b72, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) 5m24.2597072s ago: executing program 2 (id=4189): r0 = socket(0x29, 0x2, 0x0) openat$selinux_mls(0xffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) close_range(r0, r0, 0x0) timer_create(0x0, 0x0, 0x0) r1 = openat$nvme_fabrics(0xffffff9c, &(0x7f0000000080), 0xa00, 0x0) close(r1) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000040)={0x1d, r3, 0x3}, 0x18) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000680)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x8800) sendmsg$NL80211_CMD_NEW_MPATH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x6a}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x8d5}, 0x400c010) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) sendmsg$NL80211_CMD_DEAUTHENTICATE(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x2, 0x70bd25, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x840) 5m21.970227344s ago: executing program 2 (id=4191): r0 = openat$loop_ctrl(0xffffff9c, &(0x7f000000adc0), 0x200, 0x0) r1 = dup2(r0, r0) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(r1, 0x3ba0, &(0x7f0000000000)={0x48}) 5m21.487917383s ago: executing program 2 (id=4192): openat$loop_ctrl(0xffffff9c, &(0x7f000000adc0), 0x200, 0x0) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_REPLACE(0xffffffffffffffff, 0x3ba0, &(0x7f0000000100)={0x48}) 5m21.487745453s ago: executing program 33 (id=4192): openat$loop_ctrl(0xffffff9c, &(0x7f000000adc0), 0x200, 0x0) ioctl$IOMMU_TEST_OP_MOCK_DOMAIN_REPLACE(0xffffffffffffffff, 0x3ba0, &(0x7f0000000100)={0x48}) 2.001196739s ago: executing program 3 (id=4596): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x26e1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x4c, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x38, 0x1, [@m_tunnel_key={0x34, 0x1, 0x0, 0x0, {{0xf}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}, 0x4c}}, 0x8000) close(r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(r0, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 1.74187029s ago: executing program 3 (id=4597): r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x1, 0x0) syz_usb_disconnect(r0) syz_usb_connect$cdc_ecm(0x6, 0x56, &(0x7f0000000000)=ANY=[], 0x0) ioctl$EVIOCRMFF(r0, 0x4004550d, 0x0) 1.74165019s ago: executing program 0 (id=4598): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="2c0000003e00070100000000fcdbdf25047c00000400000014000180060021dd"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 1.46833675s ago: executing program 0 (id=4599): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x28, r1, 0xacba0c1e6f3dd42b, 0x70bd29, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_SECLEVEL={0x5, 0x2a, 0x7}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0xc040084) 1.2522795s ago: executing program 3 (id=4600): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x26e1, 0x0) close(r0) r1 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x3406c012) sendmsg$sock(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x24040050) 970.068091ms ago: executing program 3 (id=4601): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'xfrm0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000180)="10030600e0ff020004004788aa96a13bb100001100007fca1a00", 0x10608, 0x0, &(0x7f0000000140)={0x11, 0x0, r1}, 0x14) 869.585845ms ago: executing program 0 (id=4602): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000480)={0x2020}, 0x2020) 710.516102ms ago: executing program 3 (id=4603): r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r1 = syz_io_uring_setup(0xcaf, &(0x7f0000000100)={0x0, 0xb601, 0x1, 0x5, 0x9c3}, &(0x7f00000001c0)=0x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r0, 0xc000000, 0x0, 0x0, 0x1e}) io_uring_enter(r1, 0x847ba, 0x0, 0xe, 0x0, 0x700) 629.796295ms ago: executing program 0 (id=4604): r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e20, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 417.503883ms ago: executing program 3 (id=4605): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x24, r0, 0x801, 0x0, 0x3, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_KEY={0x8, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x4}]}]}, 0x24}, 0x1, 0x0, 0x0, 0x88000}, 0x40000) 336.833247ms ago: executing program 0 (id=4606): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) ioctl$DRM_IOCTL_MODE_GETFB2(0xffffffffffffffff, 0xc06864ce, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000680)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x5a}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f900f5", 0x14, 0x6, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 0s ago: executing program 0 (id=4607): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000003c0)={'comedi_parport\x00', [0x4f27, 0xb, 0x0, 0x4cd, 0x5, 0x6, 0x40004, 0x7, 0x7fffffff, 0x104, 0x7, 0xfff, 0x5, 0x20003, 0x9, 0x101, 0x3, 0x80000000, 0x5, 0x40000003, 0x87, 0xcaab, 0xe, 0xffffffff, 0xb, 0xe69, 0x3c, 0xc, 0x8000, 0x3a0, 0x3]}) kernel console output (not intermixed with test programs): 37][ T31] kauditd_printk_skb: 102 callbacks suppressed [ 3878.142036][ T31] audit: type=1400 audit(2000003767.240:61836): avc: denied { setopt } for pid=23153 comm="syz.3.4249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3878.619776][ T31] audit: type=1400 audit(2000003767.760:61837): avc: denied { ioctl } for pid=23153 comm="syz.3.4249" path="socket:[50441]" dev="sockfs" ino=50441 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3879.118589][ T31] audit: type=1400 audit(2000003768.260:61838): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3879.137525][ T31] audit: type=1400 audit(2000003768.260:61839): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3879.157235][ T31] audit: type=1400 audit(2000003768.260:61840): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3879.178982][ T31] audit: type=1400 audit(2000003768.310:61841): avc: denied { write } for pid=23153 comm="syz.3.4249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3879.252672][ T31] audit: type=1400 audit(2000003768.390:61842): avc: denied { create } for pid=23161 comm="syz.0.4252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3879.333571][ T31] audit: type=1400 audit(2000003768.470:61843): avc: denied { write } for pid=23161 comm="syz.0.4252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3879.410731][ T31] audit: type=1400 audit(2000003768.550:61844): avc: denied { write } for pid=23161 comm="syz.0.4252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3879.956222][ T31] audit: type=1400 audit(2000003769.090:61845): avc: denied { write } for pid=23161 comm="syz.0.4252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3883.299554][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 3883.299872][ T31] audit: type=1400 audit(2000003772.390:61865): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3883.300167][ T31] audit: type=1400 audit(2000003772.430:61866): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3883.300397][ T31] audit: type=1400 audit(2000003772.430:61867): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3883.434036][ T31] audit: type=1400 audit(2000003772.570:61868): avc: denied { read } for pid=23175 comm="syz.0.4255" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3883.457231][ T31] audit: type=1400 audit(2000003772.600:61869): avc: denied { read open } for pid=23175 comm="syz.0.4255" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3883.479802][ T31] audit: type=1400 audit(2000003772.620:61870): avc: denied { read } for pid=23175 comm="syz.0.4255" dev="nsfs" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3883.481433][ T31] audit: type=1400 audit(2000003772.620:61871): avc: denied { read open } for pid=23175 comm="syz.0.4255" path="net:[4026532677]" dev="nsfs" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3883.493718][ T31] audit: type=1400 audit(2000003772.630:61872): avc: denied { create } for pid=23175 comm="syz.0.4255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3883.512340][ T31] audit: type=1400 audit(2000003772.650:61873): avc: denied { ioctl } for pid=23175 comm="syz.0.4255" path="/dev/vcsu" dev="devtmpfs" ino=14 ioctlcmd=0x640a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3883.522469][ T31] audit: type=1400 audit(2000003772.660:61874): avc: denied { ioctl } for pid=23175 comm="syz.0.4255" path="/dev/vcsu" dev="devtmpfs" ino=14 ioctlcmd=0x640b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3885.126985][ C1] vkms_vblank_simulate: vblank timer overrun [ 3886.490135][ C1] vkms_vblank_simulate: vblank timer overrun [ 3888.195055][ C1] vkms_vblank_simulate: vblank timer overrun [ 3889.453100][ T31] kauditd_printk_skb: 81 callbacks suppressed [ 3889.453417][ T31] audit: type=1400 audit(2000003778.590:61956): avc: denied { read } for pid=23204 comm="syz.3.4267" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3889.482063][ T31] audit: type=1400 audit(2000003778.620:61957): avc: denied { read open } for pid=23204 comm="syz.3.4267" path="net:[4026532649]" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3889.491414][ T31] audit: type=1400 audit(2000003778.630:61958): avc: denied { create } for pid=23204 comm="syz.3.4267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3889.535183][ T31] audit: type=1400 audit(2000003778.670:61959): avc: denied { ioctl } for pid=23204 comm="syz.3.4267" path="socket:[50547]" dev="sockfs" ino=50547 ioctlcmd=0x640a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3889.727396][ T31] audit: type=1400 audit(2000003778.870:61960): avc: denied { create } for pid=23206 comm="syz.3.4268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3889.741067][ T31] audit: type=1400 audit(2000003778.880:61961): avc: denied { write } for pid=23206 comm="syz.3.4268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3889.776233][ T31] audit: type=1400 audit(2000003778.910:61962): avc: denied { write } for pid=23206 comm="syz.3.4268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3890.198985][ T31] audit: type=1400 audit(2000003779.340:61963): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3890.205692][ T31] audit: type=1400 audit(2000003779.340:61964): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3890.208597][ T31] audit: type=1400 audit(2000003779.350:61965): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3894.849353][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 3894.850419][ T31] audit: type=1400 audit(2000003783.990:62009): avc: denied { create } for pid=23226 comm="syz.3.4274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3894.881277][ T31] audit: type=1400 audit(2000003784.010:62010): avc: denied { setopt } for pid=23226 comm="syz.3.4274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3894.898119][ T31] audit: type=1400 audit(2000003784.030:62011): avc: denied { connect } for pid=23226 comm="syz.3.4274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3895.461587][ T31] audit: type=1400 audit(2000003784.590:62012): avc: denied { ioctl } for pid=23226 comm="syz.3.4274" path="socket:[50578]" dev="sockfs" ino=50578 ioctlcmd=0x9361 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3895.959931][ T31] audit: type=1400 audit(2000003785.080:62013): avc: denied { write } for pid=23226 comm="syz.3.4274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3896.474265][ T31] audit: type=1400 audit(2000003785.610:62014): avc: denied { ioctl } for pid=23226 comm="syz.3.4274" path="socket:[50578]" dev="sockfs" ino=50578 ioctlcmd=0x3b72 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3896.792070][ T31] audit: type=1400 audit(2000003785.930:62015): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3896.815516][ T31] audit: type=1400 audit(2000003785.950:62016): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3896.815947][ T31] audit: type=1400 audit(2000003785.950:62017): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3896.957302][ T31] audit: type=1400 audit(2000003786.100:62018): avc: denied { create } for pid=23232 comm="syz.0.4275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3900.190273][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 3900.190583][ T31] audit: type=1400 audit(2000003789.330:62043): avc: denied { write } for pid=23240 comm="syz.3.4277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3900.546617][ T31] audit: type=1400 audit(2000003789.690:62044): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3900.550001][ T31] audit: type=1400 audit(2000003789.690:62045): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3900.562962][ T31] audit: type=1400 audit(2000003789.700:62046): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3900.757548][ T31] audit: type=1400 audit(2000003789.880:62047): avc: denied { read } for pid=23243 comm="syz.0.4278" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3900.757907][ T31] audit: type=1400 audit(2000003789.880:62048): avc: denied { read open } for pid=23243 comm="syz.0.4278" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3900.790652][ T31] audit: type=1400 audit(2000003789.930:62049): avc: denied { read } for pid=23240 comm="syz.3.4277" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3900.790953][ T31] audit: type=1400 audit(2000003789.930:62050): avc: denied { read open } for pid=23240 comm="syz.3.4277" path="pid:[4026532644]" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3900.836491][ T31] audit: type=1400 audit(2000003789.940:62051): avc: denied { ioctl } for pid=23240 comm="syz.3.4277" path="pid:[4026532644]" dev="nsfs" ino=4026532644 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3900.871269][ T31] audit: type=1400 audit(2000003789.980:62052): avc: denied { read } for pid=23243 comm="syz.0.4278" dev="nsfs" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3905.559879][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 3905.560227][ T31] audit: type=1400 audit(2000003794.700:62112): avc: denied { write } for pid=23263 comm="syz.3.4284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3906.092580][ T31] audit: type=1400 audit(2000003795.230:62113): avc: denied { read } for pid=23263 comm="syz.3.4284" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3906.100021][ T31] audit: type=1400 audit(2000003795.230:62114): avc: denied { read open } for pid=23263 comm="syz.3.4284" path="pid:[4026532644]" dev="nsfs" ino=4026532644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3906.116189][ T31] audit: type=1400 audit(2000003795.250:62115): avc: denied { ioctl } for pid=23263 comm="syz.3.4284" path="pid:[4026532644]" dev="nsfs" ino=4026532644 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3906.139712][ T31] audit: type=1400 audit(2000003795.280:62116): avc: denied { write } for pid=23263 comm="syz.3.4284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3906.221267][ T31] audit: type=1400 audit(2000003795.360:62117): avc: denied { write } for pid=23263 comm="syz.3.4284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3906.392396][ T31] audit: type=1400 audit(2000003795.530:62118): avc: denied { write } for pid=23263 comm="syz.3.4284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3906.407468][ T31] audit: type=1400 audit(2000003795.550:62119): avc: denied { write } for pid=23263 comm="syz.3.4284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3906.513907][ T31] audit: type=1400 audit(2000003795.650:62120): avc: denied { write } for pid=23263 comm="syz.3.4284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3906.580374][ T31] audit: type=1400 audit(2000003795.720:62121): avc: denied { write } for pid=23263 comm="syz.3.4284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3910.604101][ T31] kauditd_printk_skb: 55 callbacks suppressed [ 3910.606856][ T31] audit: type=1400 audit(2000003799.750:62177): avc: denied { create } for pid=23283 comm="syz.0.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3910.651840][ T31] audit: type=1400 audit(2000003799.790:62178): avc: denied { write } for pid=23283 comm="syz.0.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3910.682146][ T31] audit: type=1400 audit(2000003799.820:62179): avc: denied { write } for pid=23283 comm="syz.0.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3911.225298][ T31] audit: type=1400 audit(2000003800.360:62180): avc: denied { write } for pid=23283 comm="syz.0.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3911.793685][ T31] audit: type=1400 audit(2000003800.930:62181): avc: denied { read } for pid=23283 comm="syz.0.4291" dev="nsfs" ino=4026532637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3911.818262][ T31] audit: type=1400 audit(2000003800.960:62182): avc: denied { read open } for pid=23283 comm="syz.0.4291" path="pid:[4026532637]" dev="nsfs" ino=4026532637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3911.824023][ T31] audit: type=1400 audit(2000003800.960:62183): avc: denied { ioctl } for pid=23283 comm="syz.0.4291" path="pid:[4026532637]" dev="nsfs" ino=4026532637 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3911.888037][ T31] audit: type=1400 audit(2000003801.030:62184): avc: denied { write } for pid=23283 comm="syz.0.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3911.889682][ T31] audit: type=1400 audit(2000003801.030:62185): avc: denied { write } for pid=23283 comm="syz.0.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3912.109647][ T31] audit: type=1400 audit(2000003801.250:62186): avc: denied { write } for pid=23283 comm="syz.0.4291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3916.460205][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 3916.460425][ T31] audit: type=1400 audit(2000003805.600:62226): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3916.465536][ T31] audit: type=1400 audit(2000003805.600:62227): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3916.476693][ T31] audit: type=1400 audit(2000003805.620:62228): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3916.587485][ T31] audit: type=1400 audit(2000003805.730:62229): avc: denied { create } for pid=23298 comm="syz.0.4297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3916.625419][ T31] audit: type=1400 audit(2000003805.760:62230): avc: denied { write } for pid=23298 comm="syz.0.4297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3916.695944][ T31] audit: type=1400 audit(2000003805.840:62231): avc: denied { write } for pid=23298 comm="syz.0.4297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3916.762334][ T31] audit: type=1400 audit(2000003805.900:62232): avc: denied { read } for pid=23300 comm="syz.3.4298" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3916.768163][ T31] audit: type=1400 audit(2000003805.910:62233): avc: denied { read open } for pid=23300 comm="syz.3.4298" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3916.931257][ T31] audit: type=1400 audit(2000003806.070:62234): avc: denied { create } for pid=23302 comm="syz.3.4299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3916.969434][ T31] audit: type=1400 audit(2000003806.110:62235): avc: denied { accept } for pid=23302 comm="syz.3.4299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3922.262295][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 3922.262582][ T31] audit: type=1400 audit(2000003811.400:62256): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3922.268597][ T31] audit: type=1400 audit(2000003811.410:62257): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3922.283736][ T31] audit: type=1400 audit(2000003811.410:62258): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3922.387555][ T31] audit: type=1400 audit(2000003811.530:62259): avc: denied { read } for pid=23314 comm="syz.0.4303" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3922.404239][ T31] audit: type=1400 audit(2000003811.540:62260): avc: denied { read open } for pid=23314 comm="syz.0.4303" path="/dev/vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3922.530388][ T31] audit: type=1400 audit(2000003811.650:62261): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3922.530791][ T31] audit: type=1400 audit(2000003811.650:62262): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3922.531111][ T31] audit: type=1400 audit(2000003811.660:62263): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3922.663827][ T31] audit: type=1400 audit(2000003811.800:62264): avc: denied { create } for pid=23316 comm="syz.0.4304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3922.682799][ T31] audit: type=1400 audit(2000003811.820:62265): avc: denied { accept } for pid=23316 comm="syz.0.4304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3927.700821][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 3927.703413][ T31] audit: type=1400 audit(2000003816.850:62302): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3927.711363][ T31] audit: type=1400 audit(2000003816.850:62303): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3927.718017][ T31] audit: type=1400 audit(2000003816.850:62304): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3927.818463][ T31] audit: type=1400 audit(2000003816.960:62305): avc: denied { create } for pid=23340 comm="syz.0.4313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3927.844244][ T31] audit: type=1400 audit(2000003816.980:62306): avc: denied { write } for pid=23340 comm="syz.0.4313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3927.883980][ T31] audit: type=1400 audit(2000003817.020:62307): avc: denied { write } for pid=23340 comm="syz.0.4313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3928.425714][ T31] audit: type=1400 audit(2000003817.560:62308): avc: denied { write } for pid=23340 comm="syz.0.4313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3928.633001][ T31] audit: type=1400 audit(2000003817.760:62309): avc: denied { create } for pid=23345 comm="syz.3.4315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3928.658509][ T31] audit: type=1400 audit(2000003817.800:62310): avc: denied { accept } for pid=23345 comm="syz.3.4315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3928.810610][ T31] audit: type=1400 audit(2000003817.950:62311): avc: denied { read } for pid=23347 comm="syz.3.4316" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3932.894454][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 3932.894954][ T31] audit: type=1400 audit(2000003822.010:62344): avc: denied { write } for pid=23363 comm="syz.0.4322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3933.040195][ T31] audit: type=1400 audit(2000003822.160:62345): avc: denied { ioctl } for pid=23359 comm="syz.3.4320" path="socket:[50785]" dev="sockfs" ino=50785 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3933.563899][ T31] audit: type=1400 audit(2000003822.700:62346): avc: denied { ioctl } for pid=23359 comm="syz.3.4320" path="socket:[50785]" dev="sockfs" ino=50785 ioctlcmd=0x510d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3933.738746][ T31] audit: type=1400 audit(2000003822.870:62347): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3933.739127][ T31] audit: type=1400 audit(2000003822.870:62348): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3933.763371][ T31] audit: type=1400 audit(2000003822.890:62349): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3934.023979][ T31] audit: type=1400 audit(2000003823.150:62350): avc: denied { create } for pid=23370 comm="syz.0.4323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3934.027578][ T31] audit: type=1400 audit(2000003823.170:62351): avc: denied { write } for pid=23370 comm="syz.0.4323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3934.045147][ T31] audit: type=1400 audit(2000003823.190:62352): avc: denied { module_request } for pid=23370 comm="syz.0.4323" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3934.348908][ T31] audit: type=1400 audit(2000003823.490:62353): avc: denied { read } for pid=23370 comm="syz.0.4323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3937.902680][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 3937.903031][ T31] audit: type=1400 audit(2000003827.040:62377): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3937.965454][ T31] audit: type=1400 audit(2000003827.100:62378): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3937.970489][ T31] audit: type=1400 audit(2000003827.110:62379): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3938.072170][ T31] audit: type=1400 audit(2000003827.210:62380): avc: denied { create } for pid=23384 comm="syz.0.4328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3938.082679][ T31] audit: type=1400 audit(2000003827.220:62381): avc: denied { write } for pid=23384 comm="syz.0.4328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3938.102715][ T31] audit: type=1400 audit(2000003827.240:62382): avc: denied { module_request } for pid=23384 comm="syz.0.4328" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3938.413433][ T31] audit: type=1400 audit(2000003827.550:62383): avc: denied { read } for pid=23384 comm="syz.0.4328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3939.290920][ T31] audit: type=1400 audit(2000003828.430:62384): avc: denied { create } for pid=23387 comm="syz.3.4330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3939.304175][ T31] audit: type=1400 audit(2000003828.440:62385): avc: denied { accept } for pid=23387 comm="syz.3.4330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3939.315960][ T31] audit: type=1400 audit(2000003828.460:62386): avc: denied { setopt } for pid=23387 comm="syz.3.4330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3942.975396][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 3942.975636][ T31] audit: type=1400 audit(2000003832.120:62423): avc: denied { create } for pid=23401 comm="syz.0.4333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3943.042938][ T31] audit: type=1400 audit(2000003832.190:62424): avc: denied { write } for pid=23401 comm="syz.0.4333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3943.088613][ T31] audit: type=1400 audit(2000003832.230:62425): avc: denied { write } for pid=23401 comm="syz.0.4333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3943.362691][ T31] audit: type=1400 audit(2000003832.500:62426): avc: denied { write } for pid=23397 comm="syz.3.4332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3943.623618][ T31] audit: type=1400 audit(2000003832.760:62427): avc: denied { write } for pid=23401 comm="syz.0.4333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3944.153827][ T31] audit: type=1400 audit(2000003833.290:62428): avc: denied { read } for pid=23401 comm="syz.0.4333" dev="nsfs" ino=4026532637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3944.157768][ T31] audit: type=1400 audit(2000003833.300:62429): avc: denied { read open } for pid=23401 comm="syz.0.4333" path="pid:[4026532637]" dev="nsfs" ino=4026532637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3944.175158][ T31] audit: type=1400 audit(2000003833.310:62430): avc: denied { ioctl } for pid=23401 comm="syz.0.4333" path="pid:[4026532637]" dev="nsfs" ino=4026532637 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3945.258350][ T31] audit: type=1400 audit(2000003834.390:62431): avc: denied { create } for pid=23406 comm="syz.3.4334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3945.261227][ T31] audit: type=1400 audit(2000003834.390:62432): avc: denied { write } for pid=23406 comm="syz.3.4334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3948.099447][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 3948.099732][ T31] audit: type=1400 audit(2000003837.240:62451): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3948.125797][ T31] audit: type=1400 audit(2000003837.250:62452): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3948.126169][ T31] audit: type=1400 audit(2000003837.250:62453): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3948.312371][ T31] audit: type=1400 audit(2000003837.420:62454): avc: denied { ioctl } for pid=23412 comm="syz.3.4337" path="socket:[50849]" dev="sockfs" ino=50849 ioctlcmd=0x510d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3948.363263][ T31] audit: type=1400 audit(2000003837.490:62455): avc: denied { read } for pid=23416 comm="syz.0.4338" dev="nsfs" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3948.379913][ T31] audit: type=1400 audit(2000003837.510:62456): avc: denied { read open } for pid=23416 comm="syz.0.4338" path="net:[4026532677]" dev="nsfs" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3948.381605][ T31] audit: type=1400 audit(2000003837.510:62457): avc: denied { create } for pid=23416 comm="syz.0.4338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3948.382970][ T31] audit: type=1400 audit(2000003837.510:62458): avc: denied { ioctl } for pid=23416 comm="syz.0.4338" path="socket:[50861]" dev="sockfs" ino=50861 ioctlcmd=0x9435 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 3948.578074][ T31] audit: type=1400 audit(2000003837.720:62459): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3948.581457][ T31] audit: type=1400 audit(2000003837.720:62460): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3953.294029][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 3953.294365][ T31] audit: type=1400 audit(2000003842.420:62486): avc: denied { write } for pid=23429 comm="syz.3.4342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3953.737420][ T31] audit: type=1400 audit(2000003842.880:62487): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3953.742120][ T31] audit: type=1400 audit(2000003842.880:62488): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3953.749139][ T31] audit: type=1400 audit(2000003842.890:62489): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3953.842821][ T31] audit: type=1400 audit(2000003842.990:62490): avc: denied { create } for pid=23432 comm="syz.0.4343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3953.860843][ T31] audit: type=1400 audit(2000003843.000:62491): avc: denied { write } for pid=23432 comm="syz.0.4343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3953.871274][ T31] audit: type=1400 audit(2000003843.010:62492): avc: denied { create } for pid=23432 comm="syz.0.4343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3953.897991][ T31] audit: type=1400 audit(2000003843.040:62493): avc: denied { setopt } for pid=23432 comm="syz.0.4343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3953.902824][ T31] audit: type=1400 audit(2000003843.040:62494): avc: denied { connect } for pid=23432 comm="syz.0.4343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3954.416703][ T31] audit: type=1400 audit(2000003843.550:62495): avc: denied { write } for pid=23432 comm="syz.0.4343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3958.780141][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 3958.780461][ T31] audit: type=1400 audit(2000003847.910:62529): avc: denied { write } for pid=23445 comm="syz.3.4346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3960.032212][ T31] audit: type=1400 audit(2000003849.170:62530): avc: denied { create } for pid=23460 comm="syz.3.4349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3960.043286][ T31] audit: type=1400 audit(2000003849.180:62531): avc: denied { ioctl } for pid=23460 comm="syz.3.4349" path="socket:[49896]" dev="sockfs" ino=49896 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3960.053493][ T31] audit: type=1400 audit(2000003849.200:62532): avc: denied { bind } for pid=23460 comm="syz.3.4349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3960.059177][ T31] audit: type=1400 audit(2000003849.200:62533): avc: denied { write } for pid=23460 comm="syz.3.4349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3960.070538][ T31] audit: type=1400 audit(2000003849.210:62534): avc: denied { write } for pid=23460 comm="syz.3.4349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3960.331845][ T31] audit: type=1400 audit(2000003849.470:62535): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3960.356516][ T31] audit: type=1400 audit(2000003849.470:62536): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3960.359775][ T31] audit: type=1400 audit(2000003849.500:62537): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3960.456478][ T31] audit: type=1400 audit(2000003849.600:62538): avc: denied { create } for pid=23462 comm="syz.0.4350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3963.775730][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 3963.776125][ T31] audit: type=1400 audit(2000003852.910:62554): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3963.807467][ T31] audit: type=1400 audit(2000003852.940:62555): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3963.846297][ T31] audit: type=1400 audit(2000003852.970:62556): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3964.021524][ T31] audit: type=1400 audit(2000003853.160:62557): avc: denied { create } for pid=23474 comm="syz.0.4352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3964.040166][ T31] audit: type=1400 audit(2000003853.180:62558): avc: denied { write } for pid=23465 comm="syz.3.4351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3964.083382][ T31] audit: type=1400 audit(2000003853.220:62559): avc: denied { write } for pid=23474 comm="syz.0.4352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3964.149977][ T31] audit: type=1400 audit(2000003853.290:62560): avc: denied { write } for pid=23474 comm="syz.0.4352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3964.969256][ T31] audit: type=1400 audit(2000003854.110:62561): avc: denied { read } for pid=23478 comm="syz.3.4353" name="timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3964.971146][ T31] audit: type=1400 audit(2000003854.110:62562): avc: denied { read open } for pid=23478 comm="syz.3.4353" path="/dev/snd/timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3964.985447][ T31] audit: type=1400 audit(2000003854.120:62563): avc: denied { read } for pid=23478 comm="syz.3.4353" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3968.979364][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 3968.979698][ T31] audit: type=1400 audit(2000003858.120:62591): avc: denied { write } for pid=23488 comm="syz.3.4356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3969.181596][ T31] audit: type=1400 audit(2000003858.310:62592): avc: denied { ioctl } for pid=23491 comm="syz.0.4357" path="socket:[51015]" dev="sockfs" ino=51015 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3969.503937][ T31] audit: type=1400 audit(2000003858.640:62593): avc: denied { write } for pid=23488 comm="syz.3.4356" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3969.710711][ T31] audit: type=1400 audit(2000003858.840:62594): avc: denied { write } for pid=23491 comm="syz.0.4357" path="socket:[51015]" dev="sockfs" ino=51015 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3969.712568][ T31] audit: type=1400 audit(2000003858.840:62595): avc: denied { write } for pid=23491 comm="syz.0.4357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3970.209641][ T31] audit: type=1400 audit(2000003859.340:62596): avc: denied { ioctl } for pid=23491 comm="syz.0.4357" path="socket:[51015]" dev="sockfs" ino=51015 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3970.729351][ T31] audit: type=1400 audit(2000003859.870:62597): avc: denied { write } for pid=23491 comm="syz.0.4357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3971.271201][ T31] audit: type=1400 audit(2000003860.400:62598): avc: denied { read write } for pid=23500 comm="syz.3.4358" name="vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3971.275134][ T31] audit: type=1400 audit(2000003860.400:62599): avc: denied { read write open } for pid=23500 comm="syz.3.4358" path="/dev/vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3971.275439][ T31] audit: type=1400 audit(2000003860.400:62600): avc: denied { ioctl } for pid=23500 comm="syz.3.4358" path="/dev/vhost-net" dev="devtmpfs" ino=708 ioctlcmd=0x1500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3974.460992][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 3974.461422][ T31] audit: type=1400 audit(2000003863.600:62625): avc: denied { ioctl } for pid=23512 comm="syz.0.4362" path="socket:[51056]" dev="sockfs" ino=51056 ioctlcmd=0x9361 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3974.980992][ T31] audit: type=1400 audit(2000003864.120:62626): avc: denied { write } for pid=23512 comm="syz.0.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3974.998434][ T31] audit: type=1400 audit(2000003864.130:62627): avc: denied { create } for pid=23515 comm="syz.3.4363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3975.030731][ T31] audit: type=1400 audit(2000003864.170:62628): avc: denied { write } for pid=23515 comm="syz.3.4363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3975.540222][ T31] audit: type=1400 audit(2000003864.680:62629): avc: denied { write } for pid=23512 comm="syz.0.4362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3977.224076][ T31] audit: type=1400 audit(2000003866.370:62630): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3977.250232][ T31] audit: type=1400 audit(2000003866.390:62631): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3977.275316][ T31] audit: type=1400 audit(2000003866.410:62632): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3977.368921][ T31] audit: type=1400 audit(2000003866.500:62633): avc: denied { create } for pid=23520 comm="syz.3.4365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3977.483252][ T31] audit: type=1400 audit(2000003866.620:62634): avc: denied { create } for pid=23521 comm="syz.0.4364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3979.816713][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 3979.816990][ T31] audit: type=1400 audit(2000003868.940:62660): avc: denied { write } for pid=23521 comm="syz.0.4364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3980.354200][ T31] audit: type=1400 audit(2000003869.490:62661): avc: denied { write } for pid=23521 comm="syz.0.4364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3980.489184][ T31] audit: type=1400 audit(2000003869.630:62662): avc: denied { create } for pid=23533 comm="syz.3.4368" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3980.498486][ T31] audit: type=1400 audit(2000003869.650:62663): avc: denied { read write } for pid=23533 comm="syz.3.4368" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3980.500783][ T31] audit: type=1400 audit(2000003869.650:62664): avc: denied { read write open } for pid=23533 comm="syz.3.4368" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3980.507810][ T31] audit: type=1400 audit(2000003869.650:62665): avc: denied { mounton } for pid=23533 comm="syz.3.4368" path="/73/file0" dev="tmpfs" ino=408 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3980.525263][ T31] audit: type=1400 audit(2000003869.670:62666): avc: denied { mount } for pid=23533 comm="syz.3.4368" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3980.919777][ T31] audit: type=1400 audit(2000003870.060:62667): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3980.932132][ T31] audit: type=1400 audit(2000003870.060:62668): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3980.940512][ T31] audit: type=1400 audit(2000003870.080:62669): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3985.359737][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 3985.360016][ T31] audit: type=1400 audit(2000003874.500:62700): avc: denied { read } for pid=23547 comm="syz.3.4371" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3985.360278][ T31] audit: type=1400 audit(2000003874.500:62701): avc: denied { read open } for pid=23547 comm="syz.3.4371" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3985.418926][ T31] audit: type=1400 audit(2000003874.550:62702): avc: denied { write } for pid=23546 comm="syz.0.4372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3985.466984][ T31] audit: type=1400 audit(2000003874.600:62703): avc: denied { write } for pid=23547 comm="syz.3.4371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3985.981197][ T31] audit: type=1400 audit(2000003875.120:62704): avc: denied { read } for pid=23546 comm="syz.0.4372" dev="nsfs" ino=4026532637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3985.992165][ T31] audit: type=1400 audit(2000003875.130:62705): avc: denied { read open } for pid=23546 comm="syz.0.4372" path="pid:[4026532637]" dev="nsfs" ino=4026532637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3986.026879][ T31] audit: type=1400 audit(2000003875.160:62706): avc: denied { ioctl } for pid=23546 comm="syz.0.4372" path="pid:[4026532637]" dev="nsfs" ino=4026532637 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3986.114434][ T31] audit: type=1400 audit(2000003875.250:62707): avc: denied { write } for pid=23546 comm="syz.0.4372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3986.808688][ T31] audit: type=1400 audit(2000003875.950:62708): avc: denied { ioctl } for pid=23547 comm="syz.3.4371" path="/dev/fuse" dev="devtmpfs" ino=89 ioctlcmd=0x581f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3987.837645][ T31] audit: type=1400 audit(2000003876.980:62709): avc: denied { unmount } for pid=22585 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3990.701873][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 3990.702243][ T31] audit: type=1400 audit(2000003879.830:62731): avc: denied { write } for pid=23557 comm="syz.3.4373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3991.618363][ T31] audit: type=1400 audit(2000003880.760:62732): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3991.622788][ T31] audit: type=1400 audit(2000003880.760:62733): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3991.635379][ T31] audit: type=1400 audit(2000003880.780:62734): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3991.668485][ T31] audit: type=1400 audit(2000003880.810:62735): avc: denied { read write } for pid=23569 comm="syz.3.4377" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3991.672291][ T31] audit: type=1400 audit(2000003880.810:62736): avc: denied { read write open } for pid=23569 comm="syz.3.4377" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3991.686735][ T31] audit: type=1400 audit(2000003880.830:62737): avc: denied { mounton } for pid=23569 comm="syz.3.4377" path="/77/file0" dev="tmpfs" ino=431 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 3991.706087][ T31] audit: type=1400 audit(2000003880.850:62738): avc: denied { mount } for pid=23569 comm="syz.3.4377" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3991.741767][ T31] audit: type=1400 audit(2000003880.880:62739): avc: denied { read } for pid=23569 comm="syz.3.4377" name="vsock" dev="devtmpfs" ino=755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3991.742424][ T31] audit: type=1400 audit(2000003880.880:62740): avc: denied { read open } for pid=23569 comm="syz.3.4377" path="/dev/vsock" dev="devtmpfs" ino=755 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3995.985419][ T31] kauditd_printk_skb: 65 callbacks suppressed [ 3995.985924][ T31] audit: type=1400 audit(2000003885.120:62806): avc: denied { create } for pid=23588 comm="syz.3.4382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3995.986267][ T31] audit: type=1400 audit(2000003885.120:62807): avc: denied { write } for pid=23588 comm="syz.3.4382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3995.986477][ T31] audit: type=1400 audit(2000003885.120:62808): avc: denied { module_request } for pid=23588 comm="syz.3.4382" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3996.327352][ T31] audit: type=1400 audit(2000003885.470:62809): avc: denied { read } for pid=23588 comm="syz.3.4382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3996.333593][ T31] audit: type=1400 audit(2000003885.470:62810): avc: denied { write } for pid=23588 comm="syz.3.4382" path="socket:[50075]" dev="sockfs" ino=50075 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3996.346696][ T31] audit: type=1400 audit(2000003885.490:62811): avc: denied { write } for pid=23588 comm="syz.3.4382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3996.948966][ T31] audit: type=1400 audit(2000003886.090:62812): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3996.956777][ T31] audit: type=1400 audit(2000003886.090:62813): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3996.960812][ T31] audit: type=1400 audit(2000003886.100:62814): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3997.051704][ T31] audit: type=1400 audit(2000003886.190:62815): avc: denied { create } for pid=23596 comm="syz.0.4383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4001.310026][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 4001.310263][ T31] audit: type=1400 audit(2000003890.450:62851): avc: denied { unmount } for pid=23610 comm="syz.0.4387" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4001.525464][ T31] audit: type=1400 audit(2000003890.660:62852): avc: denied { unlink } for pid=19757 comm="syz-executor" name="file0" dev="tmpfs" ino=1975 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 4001.641527][ T31] audit: type=1400 audit(2000003890.740:62853): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4001.642016][ T31] audit: type=1400 audit(2000003890.740:62854): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4001.642112][ T31] audit: type=1400 audit(2000003890.740:62855): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4001.795603][ T31] audit: type=1400 audit(2000003890.910:62856): avc: denied { create } for pid=23617 comm="syz.0.4388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4001.796049][ T31] audit: type=1400 audit(2000003890.930:62857): avc: denied { setopt } for pid=23617 comm="syz.0.4388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4001.812600][ T31] audit: type=1400 audit(2000003890.940:62858): avc: denied { read append } for pid=23617 comm="syz.0.4388" name="mouse0" dev="devtmpfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4001.829868][ T31] audit: type=1400 audit(2000003890.960:62859): avc: denied { read open } for pid=23617 comm="syz.0.4388" path="/dev/input/mouse0" dev="devtmpfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4001.867096][ T31] audit: type=1400 audit(2000003891.000:62860): avc: denied { create } for pid=23616 comm="syz.3.4389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4006.719765][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 4006.720047][ T31] audit: type=1400 audit(2000003895.850:62919): avc: denied { read } for pid=23638 comm="syz.0.4394" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4006.720288][ T31] audit: type=1400 audit(2000003895.850:62920): avc: denied { read open } for pid=23638 comm="syz.0.4394" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4006.758412][ T31] audit: type=1400 audit(2000003895.900:62921): avc: denied { write } for pid=23637 comm="syz.3.4395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4006.761408][ T31] audit: type=1400 audit(2000003895.900:62922): avc: denied { write } for pid=23638 comm="syz.0.4394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4007.327939][ T31] audit: type=1400 audit(2000003896.460:62923): avc: denied { write } for pid=23637 comm="syz.3.4395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4007.352438][ T31] audit: type=1400 audit(2000003896.490:62924): avc: denied { write } for pid=23637 comm="syz.3.4395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4007.382257][ T31] audit: type=1400 audit(2000003896.520:62925): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4007.397820][ T31] audit: type=1400 audit(2000003896.540:62926): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4007.410839][ T31] audit: type=1400 audit(2000003896.550:62927): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4007.632939][ T31] audit: type=1400 audit(2000003896.770:62928): avc: denied { read append } for pid=23637 comm="syz.3.4395" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4011.755409][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 4011.755801][ T31] audit: type=1400 audit(2000003900.880:62986): avc: denied { setopt } for pid=23664 comm="syz.0.4404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4011.795468][ T31] audit: type=1400 audit(2000003900.930:62987): avc: denied { connect } for pid=23664 comm="syz.0.4404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4011.822997][ T31] audit: type=1400 audit(2000003900.940:62988): avc: denied { write } for pid=23664 comm="syz.0.4404" path="socket:[51332]" dev="sockfs" ino=51332 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4011.825221][ T31] audit: type=1400 audit(2000003900.960:62989): avc: denied { write } for pid=23664 comm="syz.0.4404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4011.839854][ T31] audit: type=1400 audit(2000003900.980:62990): avc: denied { ioctl } for pid=23664 comm="syz.0.4404" path="socket:[51332]" dev="sockfs" ino=51332 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4011.853095][ T31] audit: type=1400 audit(2000003900.990:62991): avc: denied { ioctl } for pid=23664 comm="syz.0.4404" path="socket:[51332]" dev="sockfs" ino=51332 ioctlcmd=0x510d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4012.061617][ T31] audit: type=1400 audit(2000003901.200:62992): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4012.090827][ T31] audit: type=1400 audit(2000003901.220:62993): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4012.116447][ T31] audit: type=1400 audit(2000003901.220:62994): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4012.243743][ T31] audit: type=1400 audit(2000003901.380:62995): avc: denied { write } for pid=23665 comm="syz.3.4403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4017.671405][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 4017.674136][ T31] audit: type=1400 audit(2000003906.810:63059): avc: denied { create } for pid=23687 comm="syz.3.4412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4017.785603][ T31] audit: type=1400 audit(2000003906.910:63060): avc: denied { ioctl } for pid=23687 comm="syz.3.4412" path="socket:[51361]" dev="sockfs" ino=51361 ioctlcmd=0x941b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4017.815435][ T31] audit: type=1400 audit(2000003906.950:63061): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4017.828214][ T31] audit: type=1400 audit(2000003906.960:63062): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4017.832687][ T31] audit: type=1400 audit(2000003906.970:63063): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4017.870880][ T31] audit: type=1400 audit(2000003907.010:63064): avc: denied { create } for pid=23687 comm="syz.3.4412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4017.879777][ T31] audit: type=1400 audit(2000003907.020:63065): avc: denied { write } for pid=23687 comm="syz.3.4412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4017.943199][ T31] audit: type=1400 audit(2000003907.080:63066): avc: denied { create } for pid=23689 comm="syz.0.4413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4017.954541][ T31] audit: type=1400 audit(2000003907.090:63067): avc: denied { write } for pid=23689 comm="syz.0.4413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4018.043684][ T31] audit: type=1400 audit(2000003907.180:63068): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4022.753052][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 4022.753461][ T31] audit: type=1400 audit(2000003911.890:63121): avc: denied { create } for pid=23710 comm="syz.3.4420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4022.782123][ T31] audit: type=1400 audit(2000003911.920:63122): avc: denied { ioctl } for pid=23710 comm="syz.3.4420" path="socket:[52284]" dev="sockfs" ino=52284 ioctlcmd=0x941b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4023.116810][ T31] audit: type=1400 audit(2000003912.260:63123): avc: denied { create } for pid=23712 comm="syz.3.4421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4023.168337][ T31] audit: type=1400 audit(2000003912.310:63124): avc: denied { accept } for pid=23712 comm="syz.3.4421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4023.189519][ T31] audit: type=1400 audit(2000003912.310:63125): avc: denied { setopt } for pid=23712 comm="syz.3.4421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4023.195587][ T31] audit: type=1400 audit(2000003912.310:63126): avc: denied { connect } for pid=23712 comm="syz.3.4421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4023.208642][ T31] audit: type=1400 audit(2000003912.310:63127): avc: denied { write } for pid=23712 comm="syz.3.4421" path="socket:[51402]" dev="sockfs" ino=51402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4023.223661][ T31] audit: type=1400 audit(2000003912.350:63128): avc: denied { write } for pid=23712 comm="syz.3.4421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4023.223992][ T31] audit: type=1400 audit(2000003912.350:63129): avc: denied { ioctl } for pid=23712 comm="syz.3.4421" path="socket:[51402]" dev="sockfs" ino=51402 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4023.313593][ T31] audit: type=1400 audit(2000003912.450:63130): avc: denied { ioctl } for pid=23712 comm="syz.3.4421" path="socket:[51402]" dev="sockfs" ino=51402 ioctlcmd=0x510d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4027.768119][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 4027.769322][ T31] audit: type=1400 audit(2000003916.910:63189): avc: denied { write } for pid=23734 comm="syz.3.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4028.039004][ T31] audit: type=1400 audit(2000003917.180:63190): avc: denied { create } for pid=23734 comm="syz.3.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4028.071170][ T31] audit: type=1400 audit(2000003917.210:63191): avc: denied { bind } for pid=23734 comm="syz.3.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4028.245337][ T31] audit: type=1400 audit(2000003917.370:63192): avc: denied { write } for pid=23734 comm="syz.3.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4028.624363][ T31] audit: type=1400 audit(2000003917.760:63193): avc: denied { write } for pid=23734 comm="syz.3.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4028.632454][ T31] audit: type=1400 audit(2000003917.770:63194): avc: denied { write } for pid=23734 comm="syz.3.4429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4028.861364][ T31] audit: type=1400 audit(2000003918.000:63195): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4028.879618][ T31] audit: type=1400 audit(2000003918.020:63196): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4028.887121][ T31] audit: type=1400 audit(2000003918.030:63197): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4028.972517][ T31] audit: type=1400 audit(2000003918.110:63198): avc: denied { create } for pid=23737 comm="syz.0.4430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4033.053525][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 4033.053885][ T31] audit: type=1400 audit(2000003922.190:63246): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4033.065392][ T31] audit: type=1400 audit(2000003922.200:63247): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4033.065792][ T31] audit: type=1400 audit(2000003922.200:63248): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4033.099581][ T31] audit: type=1400 audit(2000003922.240:63249): avc: denied { create } for pid=23747 comm="syz.3.4434" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4033.112919][ T31] audit: type=1400 audit(2000003922.250:63250): avc: denied { ioctl } for pid=23747 comm="syz.3.4434" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=51469 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4033.138951][ T31] audit: type=1400 audit(2000003922.280:63251): avc: denied { ioctl } for pid=23747 comm="syz.3.4434" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=51469 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4033.149212][ T31] audit: type=1400 audit(2000003922.290:63252): avc: denied { ioctl } for pid=23747 comm="syz.3.4434" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=51469 ioctlcmd=0xaa08 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4033.169686][ T31] audit: type=1400 audit(2000003922.310:63253): avc: denied { ioctl } for pid=23747 comm="syz.3.4434" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=51469 ioctlcmd=0x940a scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4033.182652][ T31] audit: type=1400 audit(2000003922.320:63254): avc: denied { write } for pid=23747 comm="syz.3.4434" path="socket:[51448]" dev="sockfs" ino=51448 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4033.194290][ T31] audit: type=1400 audit(2000003922.330:63255): avc: denied { write } for pid=23747 comm="syz.3.4434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4036.762333][T23774] SELinux: syz.0.4443 (23774) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 4037.383508][T23776] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23776 comm=syz.0.4443 [ 4038.113303][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 4038.118292][ T31] audit: type=1400 audit(2000003927.250:63314): avc: denied { ioctl } for pid=23771 comm="syz.3.4442" path="socket:[52397]" dev="sockfs" ino=52397 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4038.633315][ T31] audit: type=1400 audit(2000003927.770:63315): avc: denied { create } for pid=23771 comm="syz.3.4442" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4038.642101][ T31] audit: type=1400 audit(2000003927.780:63316): avc: denied { ioctl } for pid=23771 comm="syz.3.4442" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=52402 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4038.652407][ T31] audit: type=1400 audit(2000003927.790:63317): avc: denied { ioctl } for pid=23771 comm="syz.3.4442" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=52402 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4038.666931][ T31] audit: type=1400 audit(2000003927.810:63318): avc: denied { ioctl } for pid=23771 comm="syz.3.4442" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=52402 ioctlcmd=0xaa08 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4038.679872][ T31] audit: type=1400 audit(2000003927.820:63319): avc: denied { ioctl } for pid=23771 comm="syz.3.4442" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=52402 ioctlcmd=0x940a scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4038.691390][ T31] audit: type=1400 audit(2000003927.830:63320): avc: denied { write } for pid=23771 comm="syz.3.4442" path="socket:[52397]" dev="sockfs" ino=52397 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4038.696880][ T31] audit: type=1400 audit(2000003927.840:63321): avc: denied { write } for pid=23771 comm="syz.3.4442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4040.027445][ T31] audit: type=1400 audit(2000003929.170:63322): avc: denied { create } for pid=23780 comm="syz.3.4444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4040.104373][ T31] audit: type=1400 audit(2000003929.230:63323): avc: denied { write } for pid=23780 comm="syz.3.4444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4043.230340][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 4043.230669][ T31] audit: type=1400 audit(2000003932.370:63349): avc: denied { create } for pid=23791 comm="syz.3.4449" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 4043.243674][ T31] audit: type=1400 audit(2000003932.380:63350): avc: denied { create } for pid=23790 comm="syz.0.4448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4043.255437][ T31] audit: type=1400 audit(2000003932.390:63351): avc: denied { read write } for pid=23791 comm="syz.3.4449" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4043.255818][ T31] audit: type=1400 audit(2000003932.390:63352): avc: denied { read write open } for pid=23791 comm="syz.3.4449" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4043.268857][ T31] audit: type=1400 audit(2000003932.410:63353): avc: denied { mounton } for pid=23791 comm="syz.3.4449" path="/118/file0" dev="tmpfs" ino=645 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 4043.291292][ T31] audit: type=1400 audit(2000003932.430:63354): avc: denied { mount } for pid=23791 comm="syz.3.4449" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4043.331318][ T31] audit: type=1400 audit(2000003932.460:63355): avc: denied { setopt } for pid=23790 comm="syz.0.4448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4043.333404][ T31] audit: type=1400 audit(2000003932.460:63356): avc: denied { connect } for pid=23790 comm="syz.0.4448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4043.852111][ T31] audit: type=1400 audit(2000003933.000:63357): avc: denied { unmount } for pid=23791 comm="syz.3.4449" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4043.883847][ T31] audit: type=1400 audit(2000003933.000:63358): avc: denied { read } for pid=23790 comm="syz.0.4448" path="socket:[52436]" dev="sockfs" ino=52436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4048.362973][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 4048.363553][ T31] audit: type=1400 audit(2000003937.500:63400): avc: denied { write } for pid=23809 comm="syz.3.4452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4048.502564][ T31] audit: type=1400 audit(2000003937.640:63401): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4048.507552][ T31] audit: type=1400 audit(2000003937.650:63402): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4048.513980][ T31] audit: type=1400 audit(2000003937.650:63403): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4048.672719][T23815] SELinux: syz.0.4454 (23815) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 4049.191330][ T31] audit: type=1400 audit(2000003938.330:63404): avc: denied { read } for pid=23814 comm="syz.0.4454" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4049.203199][ T31] audit: type=1400 audit(2000003938.340:63405): avc: denied { read open } for pid=23814 comm="syz.0.4454" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4049.289285][ T31] audit: type=1400 audit(2000003938.430:63406): avc: denied { create } for pid=23814 comm="syz.0.4454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4049.623909][ T31] audit: type=1400 audit(2000003938.760:63407): avc: denied { create } for pid=23818 comm="syz.3.4455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4049.643120][ T31] audit: type=1400 audit(2000003938.780:63408): avc: denied { bind } for pid=23818 comm="syz.3.4455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4049.657510][ T31] audit: type=1400 audit(2000003938.800:63409): avc: denied { write } for pid=23818 comm="syz.3.4455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4049.907481][T23821] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23821 comm=syz.3.4456 [ 4053.558468][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 4053.558798][ T31] audit: type=1400 audit(2000003942.700:63429): avc: denied { create } for pid=23826 comm="syz.3.4459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4053.569395][ T31] audit: type=1400 audit(2000003942.710:63430): avc: denied { create } for pid=23826 comm="syz.3.4459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4053.589357][ T31] audit: type=1400 audit(2000003942.730:63431): avc: denied { write } for pid=23826 comm="syz.3.4459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4053.619552][ T31] audit: type=1400 audit(2000003942.760:63432): avc: denied { write } for pid=23826 comm="syz.3.4459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4053.626773][ T31] audit: type=1400 audit(2000003942.770:63433): avc: denied { write } for pid=23826 comm="syz.3.4459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4053.877789][ T31] audit: type=1400 audit(2000003943.020:63434): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4053.885579][ T31] audit: type=1400 audit(2000003943.020:63435): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4053.885979][ T31] audit: type=1400 audit(2000003943.020:63436): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4054.061240][ T31] audit: type=1400 audit(2000003943.200:63437): avc: denied { create } for pid=23828 comm="syz.0.4460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4054.116205][ T31] audit: type=1400 audit(2000003943.260:63438): avc: denied { bind } for pid=23828 comm="syz.0.4460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4058.567610][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 4058.568147][ T31] audit: type=1400 audit(2000003947.710:63492): avc: denied { write } for pid=23847 comm="syz.3.4465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4058.576166][ T31] audit: type=1400 audit(2000003947.710:63493): avc: denied { write } for pid=23847 comm="syz.3.4465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4058.590920][ T31] audit: type=1400 audit(2000003947.730:63494): avc: denied { write } for pid=23847 comm="syz.3.4465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4059.212256][ T31] audit: type=1400 audit(2000003948.350:63495): avc: denied { create } for pid=23841 comm="syz.0.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4059.382944][ T31] audit: type=1400 audit(2000003948.520:63496): avc: denied { write } for pid=23841 comm="syz.0.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4059.557025][ T31] audit: type=1400 audit(2000003948.700:63497): avc: denied { create } for pid=23841 comm="syz.0.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4060.744051][ T31] audit: type=1400 audit(2000003949.880:63498): avc: denied { read } for pid=23849 comm="syz.3.4466" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4060.757089][ T31] audit: type=1400 audit(2000003949.900:63499): avc: denied { read open } for pid=23849 comm="syz.3.4466" path="net:[4026532649]" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4060.819527][ T31] audit: type=1400 audit(2000003949.960:63500): avc: denied { create } for pid=23849 comm="syz.3.4466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4060.923062][ T31] audit: type=1400 audit(2000003950.060:63501): avc: denied { create } for pid=23849 comm="syz.3.4466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4064.885226][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 4064.885559][ T31] audit: type=1400 audit(2000003954.020:63509): avc: denied { write } for pid=23841 comm="syz.0.4464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4065.629479][ T31] audit: type=1400 audit(2000003954.770:63510): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4065.648301][ T31] audit: type=1400 audit(2000003954.790:63511): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4065.653460][ T31] audit: type=1400 audit(2000003954.790:63512): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4065.688898][ T31] audit: type=1400 audit(2000003954.830:63513): avc: denied { create } for pid=23853 comm="syz.3.4468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4065.710437][ T31] audit: type=1400 audit(2000003954.850:63514): avc: denied { setopt } for pid=23853 comm="syz.3.4468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4065.720545][ T31] audit: type=1400 audit(2000003954.860:63515): avc: denied { connect } for pid=23853 comm="syz.3.4468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4065.810956][ T31] audit: type=1400 audit(2000003954.950:63516): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4065.816007][ T31] audit: type=1400 audit(2000003954.950:63517): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4065.826808][ T31] audit: type=1400 audit(2000003954.960:63518): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4069.941752][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 4069.956327][ T31] audit: type=1400 audit(2000003959.080:63553): avc: denied { create } for pid=23867 comm="syz.0.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4070.002886][ T31] audit: type=1400 audit(2000003959.140:63554): avc: denied { write } for pid=23867 comm="syz.0.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4070.076821][ T31] audit: type=1400 audit(2000003959.220:63555): avc: denied { create } for pid=23867 comm="syz.0.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4070.099661][ T31] audit: type=1400 audit(2000003959.240:63556): avc: denied { write } for pid=23867 comm="syz.0.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4070.147444][ T31] audit: type=1400 audit(2000003959.280:63557): avc: denied { create } for pid=23867 comm="syz.0.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4070.178910][ T31] audit: type=1400 audit(2000003959.320:63558): avc: denied { ioctl } for pid=23867 comm="syz.0.4471" path="socket:[52557]" dev="sockfs" ino=52557 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4070.200868][ T31] audit: type=1400 audit(2000003959.340:63559): avc: denied { bind } for pid=23867 comm="syz.0.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4070.239909][ T31] audit: type=1400 audit(2000003959.380:63560): avc: denied { write } for pid=23867 comm="syz.0.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4070.369924][ T31] audit: type=1400 audit(2000003959.510:63561): avc: denied { write } for pid=23872 comm="syz.3.4474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4070.702627][ T31] audit: type=1400 audit(2000003959.840:63562): avc: denied { write } for pid=23867 comm="syz.0.4471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4074.953364][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 4074.953836][ T31] audit: type=1400 audit(2000003964.090:63595): avc: denied { read write } for pid=23889 comm="syz.0.4479" name="uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4074.969127][ T31] audit: type=1400 audit(2000003964.110:63596): avc: denied { read write open } for pid=23889 comm="syz.0.4479" path="/dev/uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4074.985411][ T31] audit: type=1400 audit(2000003964.120:63597): avc: denied { ioctl } for pid=23889 comm="syz.0.4479" path="/dev/uinput" dev="devtmpfs" ino=697 ioctlcmd=0x660b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4074.997700][ T31] audit: type=1400 audit(2000003964.140:63598): avc: denied { create } for pid=23889 comm="syz.0.4479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4075.008427][ T31] audit: type=1400 audit(2000003964.150:63599): avc: denied { getopt } for pid=23889 comm="syz.0.4479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4075.023715][ T31] audit: type=1400 audit(2000003964.160:63600): avc: denied { setattr } for pid=23889 comm="syz.0.4479" name="PING" dev="sockfs" ino=51659 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4075.038714][ T31] audit: type=1400 audit(2000003964.180:63601): avc: denied { read } for pid=23889 comm="syz.0.4479" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4075.047121][ T31] audit: type=1400 audit(2000003964.190:63602): avc: denied { read open } for pid=23889 comm="syz.0.4479" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4075.054229][ T31] audit: type=1400 audit(2000003964.190:63603): avc: denied { ioctl } for pid=23889 comm="syz.0.4479" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54dd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4075.063483][ T31] audit: type=1400 audit(2000003964.200:63604): avc: denied { getopt } for pid=23889 comm="syz.0.4479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4080.405826][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 4080.406122][ T31] audit: type=1400 audit(2000003969.550:63661): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4080.434420][ T31] audit: type=1400 audit(2000003969.560:63662): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4080.477461][ T31] audit: type=1400 audit(2000003969.560:63663): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4080.611135][ T31] audit: type=1400 audit(2000003969.750:63664): avc: denied { read } for pid=23912 comm="syz.0.4486" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4080.630547][ T31] audit: type=1400 audit(2000003969.770:63665): avc: denied { read open } for pid=23912 comm="syz.0.4486" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4080.695387][ T31] audit: type=1400 audit(2000003969.830:63666): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4080.695703][ T31] audit: type=1400 audit(2000003969.830:63667): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4080.705105][ T31] audit: type=1400 audit(2000003969.830:63668): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4080.949918][ T31] audit: type=1400 audit(2000003970.090:63669): avc: denied { create } for pid=23914 comm="syz.3.4487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4080.965874][T23916] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23916 comm=syz.3.4487 [ 4080.970938][ T31] audit: type=1400 audit(2000003970.090:63670): avc: denied { write } for pid=23914 comm="syz.3.4487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4085.600562][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 4085.600832][ T31] audit: type=1400 audit(2000003974.730:63700): avc: denied { ioctl } for pid=23924 comm="syz.3.4491" path="socket:[52620]" dev="sockfs" ino=52620 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4086.108137][ T31] audit: type=1400 audit(2000003975.250:63701): avc: denied { create } for pid=23924 comm="syz.3.4491" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4086.122567][ T31] audit: type=1400 audit(2000003975.260:63702): avc: denied { ioctl } for pid=23924 comm="syz.3.4491" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=52632 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4086.148064][ T31] audit: type=1400 audit(2000003975.290:63703): avc: denied { ioctl } for pid=23924 comm="syz.3.4491" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=52632 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4086.959059][ T31] audit: type=1400 audit(2000003976.080:63704): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4086.960946][ T31] audit: type=1400 audit(2000003976.080:63705): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4086.985304][ T31] audit: type=1400 audit(2000003976.110:63706): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4087.126845][ T31] audit: type=1400 audit(2000003976.270:63707): avc: denied { create } for pid=23935 comm="syz.0.4494" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4087.369928][ T31] audit: type=1400 audit(2000003976.500:63708): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4087.389213][ T31] audit: type=1400 audit(2000003976.500:63709): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4090.606891][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 4090.607196][ T31] audit: type=1400 audit(2000003979.750:63725): avc: denied { getopt } for pid=23945 comm="syz.0.4498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4090.616540][ T31] audit: type=1400 audit(2000003979.760:63726): avc: denied { ioctl } for pid=23945 comm="syz.0.4498" path="socket:[52650]" dev="sockfs" ino=52650 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4090.624545][ T31] audit: type=1400 audit(2000003979.760:63727): avc: denied { write } for pid=23945 comm="syz.0.4498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4090.657104][ T31] audit: type=1400 audit(2000003979.800:63728): avc: denied { write } for pid=23945 comm="syz.0.4498" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4090.674140][ T31] audit: type=1400 audit(2000003979.810:63729): avc: denied { ioctl } for pid=23945 comm="syz.0.4498" path="socket:[52650]" dev="sockfs" ino=52650 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4090.690081][ T31] audit: type=1400 audit(2000003979.830:63730): avc: denied { create } for pid=23947 comm="syz.3.4499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4090.711726][ T31] audit: type=1400 audit(2000003979.850:63731): avc: denied { module_request } for pid=23945 comm="syz.0.4498" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4090.973600][ T31] audit: type=1400 audit(2000003980.110:63732): avc: denied { create } for pid=23950 comm="syz.3.4500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4090.996832][ T31] audit: type=1400 audit(2000003980.140:63733): avc: denied { setopt } for pid=23950 comm="syz.3.4500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4091.004368][ T31] audit: type=1400 audit(2000003980.140:63734): avc: denied { connect } for pid=23950 comm="syz.3.4500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4095.655605][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 4095.655934][ T31] audit: type=1400 audit(2000003984.790:63778): avc: denied { create } for pid=23971 comm="syz.0.4506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4095.682141][ T31] audit: type=1400 audit(2000003984.830:63779): avc: denied { ioctl } for pid=23971 comm="syz.0.4506" path="socket:[52691]" dev="sockfs" ino=52691 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4095.699404][ T31] audit: type=1400 audit(2000003984.840:63780): avc: denied { bind } for pid=23971 comm="syz.0.4506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4095.728563][ T31] audit: type=1400 audit(2000003984.870:63781): avc: denied { write } for pid=23971 comm="syz.0.4506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4095.798144][ T31] audit: type=1400 audit(2000003984.940:63782): avc: denied { write } for pid=23971 comm="syz.0.4506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4095.801638][ T31] audit: type=1400 audit(2000003984.940:63783): avc: denied { write } for pid=23971 comm="syz.0.4506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4095.890542][ T31] audit: type=1400 audit(2000003985.030:63784): avc: denied { create } for pid=23973 comm="syz.3.4507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4095.953982][ T31] audit: type=1400 audit(2000003985.100:63785): avc: denied { setopt } for pid=23973 comm="syz.3.4507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4095.967433][ T31] audit: type=1400 audit(2000003985.110:63786): avc: denied { connect } for pid=23973 comm="syz.3.4507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4096.471056][ T31] audit: type=1400 audit(2000003985.610:63787): avc: denied { read } for pid=23973 comm="syz.3.4507" path="socket:[52692]" dev="sockfs" ino=52692 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4100.433358][T24000] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=24000 comm=syz.3.4518 [ 4100.701854][ T31] kauditd_printk_skb: 56 callbacks suppressed [ 4100.702227][ T31] audit: type=1400 audit(2000003989.840:63844): avc: denied { read } for pid=23997 comm="syz.0.4517" path="socket:[52745]" dev="sockfs" ino=52745 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4100.724076][ T31] audit: type=1400 audit(2000003989.860:63845): avc: denied { read } for pid=23997 comm="syz.0.4517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4100.787635][ T31] audit: type=1400 audit(2000003989.930:63846): avc: denied { create } for pid=24004 comm="syz.3.4520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4100.797360][ T31] audit: type=1400 audit(2000003989.940:63847): avc: denied { write } for pid=24004 comm="syz.3.4520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4100.818089][ T31] audit: type=1400 audit(2000003989.960:63848): avc: denied { write } for pid=24004 comm="syz.3.4520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4101.220027][ T31] audit: type=1400 audit(2000003990.360:63849): avc: denied { ioctl } for pid=23997 comm="syz.0.4517" path="socket:[52745]" dev="sockfs" ino=52745 ioctlcmd=0x9422 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4101.761588][ T31] audit: type=1400 audit(2000003990.910:63850): avc: denied { ioctl } for pid=23997 comm="syz.0.4517" path="socket:[52745]" dev="sockfs" ino=52745 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4102.277637][ T31] audit: type=1400 audit(2000003991.420:63851): avc: denied { create } for pid=23997 comm="syz.0.4517" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4102.289908][ T31] audit: type=1400 audit(2000003991.420:63852): avc: denied { ioctl } for pid=23997 comm="syz.0.4517" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=52750 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4102.294389][ T31] audit: type=1400 audit(2000003991.420:63853): avc: denied { ioctl } for pid=23997 comm="syz.0.4517" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=52750 ioctlcmd=0xaa08 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4105.947882][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 4105.953361][ T31] audit: type=1400 audit(2000003995.090:63895): avc: denied { create } for pid=24025 comm="syz.3.4527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4106.128670][ T31] audit: type=1400 audit(2000003995.270:63896): avc: denied { setopt } for pid=24025 comm="syz.3.4527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4106.135313][ T31] audit: type=1400 audit(2000003995.270:63897): avc: denied { connect } for pid=24025 comm="syz.3.4527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4106.450330][ T31] audit: type=1400 audit(2000003995.590:63898): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4106.465619][ T31] audit: type=1400 audit(2000003995.610:63899): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4106.475549][ T31] audit: type=1400 audit(2000003995.610:63900): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4106.656801][ T31] audit: type=1400 audit(2000003995.790:63901): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4106.666021][ T31] audit: type=1400 audit(2000003995.800:63902): avc: denied { read } for pid=24025 comm="syz.3.4527" path="socket:[51830]" dev="sockfs" ino=51830 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4106.672719][ T31] audit: type=1400 audit(2000003995.810:63903): avc: denied { read } for pid=24025 comm="syz.3.4527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4106.677929][ T31] audit: type=1400 audit(2000003995.820:63904): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4111.257356][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 4111.258326][ T31] audit: type=1400 audit(2000004000.390:63951): avc: denied { read } for pid=24046 comm="syz.0.4535" dev="nsfs" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4111.259911][ T31] audit: type=1400 audit(2000004000.400:63952): avc: denied { read open } for pid=24046 comm="syz.0.4535" path="net:[4026532677]" dev="nsfs" ino=4026532677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4111.268700][ T31] audit: type=1400 audit(2000004000.410:63953): avc: denied { write } for pid=24049 comm="syz.3.4536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4111.303527][ T31] audit: type=1400 audit(2000004000.440:63954): avc: denied { create } for pid=24046 comm="syz.0.4535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4111.787292][ T31] audit: type=1400 audit(2000004000.920:63955): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4111.787658][ T31] audit: type=1400 audit(2000004000.920:63956): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4111.787905][ T31] audit: type=1400 audit(2000004000.920:63957): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4111.939729][ T31] audit: type=1400 audit(2000004001.060:63958): avc: denied { create } for pid=24052 comm="syz.0.4537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4111.976045][ T31] audit: type=1400 audit(2000004001.110:63959): avc: denied { create } for pid=24053 comm="syz.3.4538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4111.986535][ T31] audit: type=1400 audit(2000004001.130:63960): avc: denied { write } for pid=24053 comm="syz.3.4538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4116.399774][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 4116.400035][ T31] audit: type=1400 audit(2000004005.540:63992): avc: denied { read } for pid=24065 comm="syz.3.4542" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4116.402196][ T31] audit: type=1400 audit(2000004005.540:63993): avc: denied { read open } for pid=24065 comm="syz.3.4542" path="net:[4026532649]" dev="nsfs" ino=4026532649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4116.436118][ T31] audit: type=1400 audit(2000004005.580:63994): avc: denied { create } for pid=24065 comm="syz.3.4542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 4116.516277][ T31] audit: type=1400 audit(2000004005.660:63995): avc: denied { create } for pid=24069 comm="syz.0.4543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4116.527359][ T31] audit: type=1400 audit(2000004005.670:63996): avc: denied { create } for pid=24069 comm="syz.0.4543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4116.554467][ T31] audit: type=1400 audit(2000004005.690:63997): avc: denied { ioctl } for pid=24069 comm="syz.0.4543" path="socket:[51881]" dev="sockfs" ino=51881 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4116.571125][T24070] bridge_slave_0: entered promiscuous mode [ 4116.572696][ T31] audit: type=1400 audit(2000004005.710:63998): avc: denied { setopt } for pid=24069 comm="syz.0.4543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4116.709360][T24069] bridge_slave_0: left promiscuous mode [ 4116.855378][ T31] audit: type=1400 audit(2000004005.990:63999): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4116.872009][ T31] audit: type=1400 audit(2000004006.010:64000): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4116.896158][ T31] audit: type=1400 audit(2000004006.030:64001): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4121.440487][ T31] kauditd_printk_skb: 96 callbacks suppressed [ 4121.440744][ T31] audit: type=1400 audit(2000004010.580:64098): avc: denied { sys_module } for pid=24115 comm="syz.0.4559" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4121.450522][ T31] audit: type=1400 audit(2000004010.590:64099): avc: denied { module_request } for pid=24115 comm="syz.0.4559" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4121.581777][ T31] audit: type=1400 audit(2000004010.720:64100): avc: denied { create } for pid=24121 comm="syz.3.4560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4121.602349][ T31] audit: type=1400 audit(2000004010.730:64101): avc: denied { create } for pid=24121 comm="syz.3.4560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4121.602769][ T31] audit: type=1400 audit(2000004010.730:64102): avc: denied { write } for pid=24121 comm="syz.3.4560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4121.611563][ T31] audit: type=1400 audit(2000004010.750:64103): avc: denied { write } for pid=24115 comm="syz.0.4559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4121.645827][ T31] audit: type=1400 audit(2000004010.780:64104): avc: denied { module_request } for pid=24121 comm="syz.3.4560" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4122.087456][ T31] audit: type=1400 audit(2000004011.230:64105): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4122.092839][ T31] audit: type=1400 audit(2000004011.230:64106): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4122.147813][ T31] audit: type=1400 audit(2000004011.260:64107): avc: denied { module_request } for pid=24121 comm="syz.3.4560" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4123.357814][T24136] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4123.362079][T24136] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4123.388199][T24136] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4123.393374][T24136] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4124.205260][ C0] vkms_vblank_simulate: vblank timer overrun [ 4125.605572][T24162] binder: 24161:24162 ioctl c0306201 20000040 returned -14 [ 4125.816290][T24165] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4574'. [ 4125.817517][T24165] netlink: 'syz.0.4574': attribute type 30 has an invalid length. [ 4125.921203][T21709] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 4125.921710][T21709] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 4125.922036][T21709] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 4125.922154][T21709] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 4126.449631][ T31] kauditd_printk_skb: 112 callbacks suppressed [ 4126.449844][ T31] audit: type=1400 audit(2000004015.590:64220): avc: denied { ioctl } for pid=24168 comm="syz.3.4575" path="socket:[51978]" dev="sockfs" ino=51978 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4126.459676][T24169] syzkaller0: entered promiscuous mode [ 4126.465363][T24169] syzkaller0: entered allmulticast mode [ 4126.472618][ T31] audit: type=1400 audit(2000004015.610:64221): avc: denied { read } for pid=24168 comm="syz.3.4575" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4126.482236][ T31] audit: type=1400 audit(2000004015.620:64222): avc: denied { read open } for pid=24168 comm="syz.3.4575" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4126.594126][ T31] audit: type=1400 audit(2000004015.730:64223): avc: denied { read } for pid=24175 comm="syz.0.4577" name="comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4126.601788][ T31] audit: type=1400 audit(2000004015.730:64224): avc: denied { read open } for pid=24175 comm="syz.0.4577" path="/dev/comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4126.610332][ T31] audit: type=1400 audit(2000004015.750:64225): avc: denied { ioctl } for pid=24175 comm="syz.0.4577" path="/dev/comedi3" dev="devtmpfs" ino=713 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4126.642518][T24178] comedi: valid board names for 8255 driver are: [ 4126.643811][T24178] 8255 [ 4126.648341][ T31] audit: type=1400 audit(2000004015.770:64226): avc: denied { ioctl } for pid=24175 comm="syz.0.4577" path="/dev/comedi3" dev="devtmpfs" ino=713 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4126.681186][T24178] comedi: valid board names for vmk80xx driver are: [ 4126.695319][T24178] vmk80xx [ 4126.697152][T24178] comedi: valid board names for usbduxsigma driver are: [ 4126.704105][T24178] usbduxsigma [ 4126.704388][T24178] comedi: valid board names for usbduxfast driver are: [ 4126.704550][T24178] usbduxfast [ 4126.705367][T24178] comedi: valid board names for usbdux driver are: [ 4126.705502][T24178] usbdux [ 4126.705624][T24178] comedi: valid board names for ni6501 driver are: [ 4126.705748][T24178] ni6501 [ 4126.705869][T24178] comedi: valid board names for dt9812 driver are: [ 4126.706013][T24178] dt9812 [ 4126.706145][T24178] comedi: valid board names for ni_labpc_cs driver are: [ 4126.706273][T24178] ni_labpc_cs [ 4126.706411][T24178] comedi: valid board names for ni_daq_700 driver are: [ 4126.706536][T24178] ni_daq_700 [ 4126.706657][T24178] comedi: valid board names for labpc_pci driver are: [ 4126.706780][T24178] labpc_pci [ 4126.706897][T24178] comedi: valid board names for adl_pci9118 driver are: [ 4126.746397][T24178] pci9118dg [ 4126.746645][T24178] pci9118hg [ 4126.746764][T24178] pci9118hr [ 4126.746891][T24178] comedi: valid board names for 8255_pci driver are: [ 4126.747004][T24178] 8255_pci [ 4126.747116][T24178] comedi: valid board names for comedi_parport driver are: [ 4126.747253][T24178] comedi_parport [ 4126.747367][T24178] comedi: valid board names for comedi_test driver are: [ 4126.747480][T24178] comedi_test [ 4126.747590][T24178] comedi: valid board names for comedi_bond driver are: [ 4126.747706][T24178] comedi_bond [ 4127.132525][ T31] audit: type=1400 audit(2000004016.270:64227): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4127.137854][ T31] audit: type=1400 audit(2000004016.280:64228): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4127.142159][ T31] audit: type=1400 audit(2000004016.280:64229): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4127.797110][T24186] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 4127.799484][T24186] block device autoloading is deprecated and will be removed. [ 4128.099713][T24192] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4128.106689][T24192] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4128.568477][T24200] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4128.585737][T24200] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4129.666610][ C1] vcan0: j1939_tp_rxtimer: 0x85a1bb00: rx timeout, send abort [ 4129.668429][ C1] vcan0: j1939_xtp_rx_abort_one: 0x85a1bb00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 4130.145500][T24213] input: syz1 as /devices/virtual/input/input27 [ 4131.262902][T24228] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=257 sclass=netlink_route_socket pid=24228 comm=syz.0.4590 [ 4131.291907][T24228] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 4131.491926][ T31] kauditd_printk_skb: 111 callbacks suppressed [ 4131.492248][ T31] audit: type=1400 audit(2000004020.630:64341): avc: denied { create } for pid=24229 comm="syz.0.4591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4131.517573][ T31] audit: type=1400 audit(2000004020.660:64342): avc: denied { write } for pid=24229 comm="syz.0.4591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4131.617397][ T31] audit: type=1400 audit(2000004020.760:64343): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4131.619651][ T31] audit: type=1400 audit(2000004020.760:64344): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4131.622033][ T31] audit: type=1400 audit(2000004020.760:64345): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4131.761601][ T31] audit: type=1400 audit(2000004020.900:64346): avc: denied { create } for pid=24231 comm="syz.0.4592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4131.781700][ T31] audit: type=1400 audit(2000004020.920:64347): avc: denied { ioctl } for pid=24231 comm="syz.0.4592" path="socket:[53111]" dev="sockfs" ino=53111 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4131.891254][ T31] audit: type=1400 audit(2000004021.030:64348): avc: denied { read write } for pid=19757 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4131.900167][ T31] audit: type=1400 audit(2000004021.040:64349): avc: denied { read write open } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4131.914027][ T31] audit: type=1400 audit(2000004021.040:64350): avc: denied { ioctl } for pid=19757 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4135.339742][T24268] 8<--- cut here --- [ 4135.340035][T24268] Unable to handle kernel paging request at virtual address fee04f27 when write [ 4135.340153][T24268] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 4135.341043][T24268] Internal error: Oops: a06 [#1] SMP ARM [ 4135.347306][T24268] Modules linked in: [ 4135.348874][T24268] CPU: 1 UID: 0 PID: 24268 Comm: syz.0.4607 Not tainted syzkaller #0 PREEMPT [ 4135.351140][T24268] Hardware name: ARM-Versatile Express [ 4135.351747][T24268] PC is at parport_attach+0x174/0x1d0 [ 4135.352053][T24268] LR is at parport_attach+0x164/0x1d0 [ 4135.352375][T24268] pc : [<813ac9a8>] lr : [<813ac998>] psr: 60000013 [ 4135.352634][T24268] sp : ea925d30 ip : ea925d30 fp : ea925d54 [ 4135.352986][T24268] r10: 82b16f40 r9 : 00000003 r8 : 84070480 [ 4135.353263][T24268] r7 : ea925d90 r6 : 84070480 r5 : 00000000 r4 : 00000000 [ 4135.353615][T24268] r3 : fee04f27 r2 : 81e15644 r1 : 00000001 r0 : 813ac618 [ 4135.354040][T24268] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 4135.354441][T24268] Control: 30c5387d Table: 84bb9b00 DAC: 00000000 [ 4135.354946][T24268] Register r0 information: non-slab/vmalloc memory [ 4135.356045][T24268] Register r1 information: non-paged memory [ 4135.356348][T24268] Register r2 information: non-slab/vmalloc memory [ 4135.356657][T24268] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 4135.357236][T24268] Register r4 information: NULL pointer [ 4135.357498][T24268] Register r5 information: NULL pointer [ 4135.357743][T24268] Register r6 information: slab kmalloc-192 start 84070480 pointer offset 0 size 192 [ 4135.358785][T24268] Register r7 information: 2-page vmalloc region starting at 0xea924000 allocated at kernel_clone+0xac/0x3ec [ 4135.359420][T24268] Register r8 information: slab kmalloc-192 start 84070480 pointer offset 0 size 192 [ 4135.359973][T24268] Register r9 information: non-paged memory [ 4135.360252][T24268] Register r10 information: non-slab/vmalloc memory [ 4135.360514][T24268] Register r11 information: 2-page vmalloc region starting at 0xea924000 allocated at kernel_clone+0xac/0x3ec [ 4135.360928][T24268] Register r12 information: 2-page vmalloc region starting at 0xea924000 allocated at kernel_clone+0xac/0x3ec [ 4135.361356][T24268] Process syz.0.4607 (pid: 24268, stack limit = 0xea924000) [ 4135.361651][T24268] Stack: (0xea925d30 to 0xea926000) [ 4135.361882][T24268] 5d20: 823fefe0 84070480 829cf9ac 829cf9ac [ 4135.362204][T24268] 5d40: 81e15b04 840704c4 ea925d8c ea925d58 813a8a40 813ac840 200003c0 00000000 [ 4135.362493][T24268] 5d60: ea925d7c 200003c0 84070480 b5403587 200003c0 85bed400 40946400 00000003 [ 4135.362806][T24268] 5d80: ea925e4c ea925d90 813a458c 813a8944 656d6f63 705f6964 6f707261 00007472 [ 4135.363105][T24268] 5da0: 00000000 00004f27 0000000b 00000000 000004cd 00000005 00000006 00040004 [ 4135.363521][T24268] 5dc0: 00000007 7fffffff 00000104 00000007 00000fff 00000005 00020003 00000009 [ 4135.363866][T24268] 5de0: 00000101 00000003 80000000 00000005 40000003 00000087 0000caab 0000000e [ 4135.364173][T24268] 5e00: ffffffff 0000000b 00000e69 0000003c 0000000c 00008000 000003a0 00000003 [ 4135.364473][T24268] 5e20: 00000000 04758ba4 00000000 84ad36c0 84070480 200003c0 200003c0 85bed400 [ 4135.364999][T24268] 5e40: ea925f14 ea925e50 813a5558 813a4498 00000000 ea925e54 ea925e54 04758ba4 [ 4135.365303][T24268] 5e60: 00000000 00000000 8247154c 0000005f 83a79058 840704b0 8408be64 85bed400 [ 4135.365604][T24268] 5e80: ea925ee4 ea925e90 80797ecc 8078e230 00000064 00000001 00000000 ea925eac [ 4135.365921][T24268] 5ea0: 85a2f010 834d6e58 00006400 0000000b ea925ea0 00000000 ea925d30 04758ba4 [ 4135.366441][T24268] 5ec0: 84ad36c0 40946400 200003c0 200003c0 84ad36c0 00000003 ea925ef4 ea925ee8 [ 4135.368468][T24268] 5ee0: 80797fec 04758ba4 ea925f14 40946400 00000000 84ad36c1 200003c0 84ad36c0 [ 4135.369026][T24268] 5f00: 00000003 85bed400 ea925fa4 ea925f18 8056d0cc 813a4f88 ecac8b10 85bed400 [ 4135.369348][T24268] 5f20: ea925f3c ea925f30 81a3b238 81a3b108 ea925f54 ea925f40 8025e490 8028ef6c [ 4135.369671][T24268] 5f40: ea925fb0 40000000 ea925f84 ea925f58 802229ec 8025e44c 00000000 8281cddc [ 4135.372086][T24268] 5f60: ea925fb0 0014c800 ecac8b10 80222940 00000000 04758ba4 ea925fac 00000000 [ 4135.374594][T24268] 5f80: 00000000 00306308 00000036 8020029c 85bed400 00000036 00000000 ea925fa8 [ 4135.376936][T24268] 5fa0: 80200060 8056cfa8 00000000 00000000 00000003 40946400 200003c0 00000000 [ 4135.379488][T24268] 5fc0: 00000000 00000000 00306308 00000036 002f0000 00000000 00006364 76fc90bc [ 4135.382032][T24268] 5fe0: 76fc8ec0 76fc8eb0 0001948c 001322a0 60000010 00000003 00000000 00000000 [ 4135.384654][T24268] Call trace: [ 4135.385834][T24268] [<813ac834>] (parport_attach) from [<813a8a40>] (comedi_device_attach+0x108/0x250) [ 4135.388343][T24268] r6:840704c4 r5:81e15b04 r4:829cf9ac [ 4135.389784][T24268] [<813a8938>] (comedi_device_attach) from [<813a458c>] (do_devconfig_ioctl+0x100/0x220) [ 4135.392572][T24268] r10:00000003 r9:40946400 r8:85bed400 r7:200003c0 r6:b5403587 r5:84070480 [ 4135.395004][T24268] r4:200003c0 [ 4135.396037][T24268] [<813a448c>] (do_devconfig_ioctl) from [<813a5558>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 4135.398525][T24268] r8:85bed400 r7:200003c0 r6:200003c0 r5:84070480 r4:84ad36c0 [ 4135.400676][T24268] [<813a4f7c>] (comedi_unlocked_ioctl) from [<8056d0cc>] (sys_ioctl+0x130/0xba0) [ 4135.402963][T24268] r10:85bed400 r9:00000003 r8:84ad36c0 r7:200003c0 r6:84ad36c1 r5:00000000 [ 4135.404474][T24268] r4:40946400 [ 4135.405239][T24268] [<8056cf9c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4135.406685][T24268] Exception stack(0xea925fa8 to 0xea925ff0) [ 4135.407737][T24268] 5fa0: 00000000 00000000 00000003 40946400 200003c0 00000000 [ 4135.409262][T24268] 5fc0: 00000000 00000000 00306308 00000036 002f0000 00000000 00006364 76fc90bc [ 4135.410811][T24268] 5fe0: 76fc8ec0 76fc8eb0 0001948c 001322a0 [ 4135.411896][T24268] r10:00000036 r9:85bed400 r8:8020029c r7:00000036 r6:00306308 r5:00000000 [ 4135.413407][T24268] r4:00000000 [ 4135.414562][T24268] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 4135.416181][T24268] ---[ end trace 0000000000000000 ]--- [ 4135.417721][T24268] Kernel panic - not syncing: Fatal exception [ 4135.429110][T24268] Rebooting in 86400 seconds.. VM DIAGNOSIS: 22:30:47 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000005 R03=81a3ba70 R04=00000006 R05=828f7888 R06=00000000 R07=828f7880 R08=85be8c00 R09=00000028 R10=828f7888 R11=df801e5c R12=df801e60 R13=df801e50 R14=8033d94c R15=81a3ba80 PSR=60070193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=828fd2e8 R01=00000001 R02=00000030 R03=828fd058 R04=829023f8 R05=828fd2e8 R06=fffffffe R07=00000000 R08=8039a8a8 R09=8281cdd8 R10=ea925bd8 R11=ea925b94 R12=ea925b98 R13=ea925b88 R14=802855fc R15=8039a8f0 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000