last executing test programs: 11.022532046s ago: executing program 0 (id=818): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0x10}, {&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0054a863f3d5cfe6cb55b5bb9fa6935849e6098ed884e7cb51726b360fbb37b4fe035bbb095873048", 0x4d}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da", 0x33}], 0x3}], 0x1, 0x40800) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x7ffff000}, {&(0x7f0000000200)=""/83, 0x20000253}], 0x2}, 0x0) 10.94089932s ago: executing program 0 (id=819): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x4, 0xfb, 0x53, 0x3, 0x58, @local, @mcast2={0xff, 0x5}, 0x8, 0x40, 0xe3e1, 0xcfe}}) 10.864078116s ago: executing program 0 (id=820): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000007c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001280)="b7f2288a911993f08d3aaea2bc0000de", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001900)=[{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000000c0)="5bdbd57a0e656889964df9937f561de9b944d1e381fed329742e239cb13cf2af711d48d2f15b3118abd8fd087f117830209a631f9dfbec5cbbbb2216a2d87dfb0d7dd906c594125a10053c8e288ac4445ff0e999d423cc250e31e8650d248e49ba5fb3be8db01db38acf5a4455630ecb10f753530ada6598a1ff4805370a5cebf05e199368871b2751c242633419d13a6b05a390d21ab1d44be1254385b3d882c646", 0xa2}], 0x1, &(0x7f00000006c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x2}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000003f40)=[{{0x0, 0x0, 0x0}, 0xeb8}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1}, 0x2b}], 0x2, 0x2120, 0x0) 10.773805371s ago: executing program 0 (id=821): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0, 0x9, 0x88, &(0x7f0000000000)=""/136}, 0x94) syz_io_uring_setup(0x494, &(0x7f0000000180)={0x0, 0x191d, 0x8, 0x8000, 0x40000250}, 0x0, &(0x7f0000000400)) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r3 = open(&(0x7f0000000c00)='./file0\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r5 = fanotify_init(0xf00, 0x0) fanotify_mark(r5, 0x1, 0x5000003a, r4, 0x0) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file7\x00', 0x4) renameat2(r3, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r6, &(0x7f00000002c0)='./file0\x00', 0x2) 3.445038833s ago: executing program 1 (id=855): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x4, 0x0, 0x7fff0006}]}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r0 = fanotify_init(0x18, 0x1000) r1 = memfd_create(&(0x7f0000000080)='-B\xd5\x9appp\xf0\x00\x84\xa2m\x00\v\x18\x004\xa6Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xca\xd7Uw\x00\xbc\xfa2\xb3\xbb\x8d\xac\xac\xbe\xe1}\x00\x10\x00\x00\x00\x00\x00\x00\xc0\"\x9cc\x10d\xee\xa9\x8b\x06\x97k\xde\xc5\xe96\xddU)\xc98M\xcd\xfb\xcc\x82n=\x7f=\xcdJx\xaa\xcf~\xb90a\xa9\xb2\x04\x1d\xa1\xce\x8b\x11\xea\xef\xe3\x00\x00\x00\x00\x00\x00\x00\x00', 0x1) r2 = dup(r1) fanotify_mark(r0, 0x1, 0x800102b, r2, 0x0) 3.333941721s ago: executing program 1 (id=856): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a480000001c0a010100000000000000000a0000060900020073797a31000000000900010073797a31"], 0x70}, 0x1, 0x0, 0x0, 0x4451099e661a63b1}, 0x0) 3.085838487s ago: executing program 1 (id=857): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x200, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x1000, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 2.948791496s ago: executing program 1 (id=858): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000a00)={'syz1\x00', {0x6ec9, 0x7, 0x5, 0x5}, 0x3e, [0x9, 0x2, 0x8, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x80, 0x6, 0xf5, 0x9, 0x39, 0x747d5a13, 0x8, 0xfffffb9a, 0xfffffffc, 0x4, 0xfffffffb, 0x4, 0x3, 0x4, 0xf254, 0x4, 0x800, 0x300000, 0x7, 0xe, 0x4623b, 0x800004, 0x0, 0x800001ff, 0x8000, 0x3ff, 0x4, 0xd, 0x3, 0xba55, 0xffc, 0x2, 0x200, 0x2, 0x400008, 0xe, 0x4, 0x0, 0x0, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x9, 0x1, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0x7, 0x4], [0x6, 0x1e, 0x3, 0x8003, 0xfffffffe, 0x43, 0x0, 0x5, 0x75, 0x1, 0x4, 0x7ffd, 0x72c, 0x1c32, 0x3, 0x9, 0x10100, 0x400, 0x8001, 0x3, 0x1, 0x297, 0x5, 0x2, 0x981, 0x4, 0x100, 0x3ff, 0x3, 0xfffffffe, 0x0, 0x1000001, 0x10, 0xfffffff9, 0x0, 0x0, 0x1, 0xffffffff, 0x6, 0x5, 0x800, 0xffff, 0x6, 0x96, 0xfffffffd, 0x100, 0x0, 0x2, 0x401, 0xb, 0x3, 0x379, 0x9, 0xc, 0x5, 0x7, 0x6, 0x2, 0x1, 0x3, 0x8, 0x6, 0x200, 0x3], [0x400, 0x3, 0xffff, 0xcd4, 0x7, 0x20, 0x7, 0x8, 0x8, 0x10, 0x7, 0x9, 0xe8a, 0x5, 0x80000001, 0x8, 0xffffffff, 0x1000, 0x2, 0x10, 0x1, 0x7, 0xe55, 0x10, 0x80000001, 0x4, 0x101, 0x5, 0x9, 0x2, 0x20000005, 0x80, 0x9, 0xd, 0x47, 0x2, 0x3, 0x4, 0x7, 0x5, 0x40, 0x6, 0x8001, 0x6, 0x6, 0x8, 0x956, 0xffffffff, 0x6, 0x3, 0x6, 0x100fffd, 0x2005, 0x7, 0x4, 0x0, 0x9, 0x5, 0x2, 0xd9, 0x0, 0x7ff, 0x401, 0x5], [0x83ab0f28, 0x7fff, 0x3, 0x3, 0x88, 0x2, 0x6, 0x4, 0x50, 0x2, 0x763, 0xd, 0x402, 0x800, 0x2, 0x1000, 0x7f, 0x5, 0x9, 0x4, 0x8e8, 0x5, 0x1e0, 0x4, 0xe47, 0x3, 0x3, 0x4, 0x200, 0x7, 0x80, 0x2, 0x5, 0x8800, 0xa80a, 0x65f413f9, 0x4, 0x8, 0x8a8, 0x2, 0x40, 0x7, 0x2, 0x6, 0x4, 0x10, 0x0, 0x0, 0x7fff, 0x1, 0xfffffff8, 0x401, 0x1, 0x200, 0x7, 0x6, 0xfffffffd, 0x7, 0xe, 0x2, 0x80e, 0xf, 0x133, 0x8]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) readv(r0, &(0x7f0000000740)=[{&(0x7f0000000300)=""/178, 0xb2}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) 2.569564661s ago: executing program 1 (id=859): r0 = syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000400)=ANY=[@ANYBLOB="1201000000000010711e0920000000000001090224000100000000090400090103000100092105000001220500090581030002"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000003c0)={0x2c, &(0x7f0000000100)=ANY=[@ANYBLOB="000008000000080482"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_ep_write(r0, 0x81, 0x1, &(0x7f0000000140)='g') preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000002480)=""/4100, 0x1004}], 0x1, 0x8, 0xc056) 2.342978166s ago: executing program 1 (id=860): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fanotify_init(0xf00, 0x0) fanotify_mark(r1, 0x1, 0x5000003a, r0, 0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x8) read$FUSE(r1, &(0x7f0000000f40)={0x2020}, 0x2020) 584.054642ms ago: executing program 0 (id=861): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prctl$PR_SET_IO_FLUSHER(0x43, 0x1) r2 = syz_io_uring_setup(0x313f, &(0x7f0000000080)={0x0, 0xfffffffd, 0x10100, 0x3, 0x17b}, &(0x7f0000000180)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000000)=@IORING_OP_WRITEV={0x2, 0x40, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r2, 0x4d10, 0x2, 0x2, 0x0, 0x0) prctl$PR_SET_IO_FLUSHER(0x43, 0x0) 190.61µs ago: executing program 0 (id=862): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='net/softnet_stat\x00') close_range(r0, 0xffffffffffffffff, 0x0) 0s ago: executing program 32 (id=862): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000440)='net/softnet_stat\x00') close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): [ 52.838263][ T29] audit: type=1400 audit(52.760:56): avc: denied { read write } for pid=3086 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.838854][ T29] audit: type=1400 audit(52.760:57): avc: denied { open } for pid=3086 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:32533' (ED25519) to the list of known hosts. [ 69.218354][ T29] audit: type=1400 audit(69.130:58): avc: denied { name_bind } for pid=3089 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 71.037291][ T29] audit: type=1400 audit(70.950:59): avc: denied { execute } for pid=3090 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 71.041274][ T29] audit: type=1400 audit(70.960:60): avc: denied { execute_no_trans } for pid=3090 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 73.359733][ T29] audit: type=1400 audit(73.280:61): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 73.364367][ T29] audit: type=1400 audit(73.280:62): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.379624][ T3090] cgroup: Unknown subsys name 'net' [ 73.391799][ T29] audit: type=1400 audit(73.310:63): avc: denied { unmount } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.635344][ T3090] cgroup: Unknown subsys name 'cpuset' [ 73.644435][ T3090] cgroup: Unknown subsys name 'hugetlb' [ 73.645346][ T3090] cgroup: Unknown subsys name 'rlimit' [ 73.882617][ T29] audit: type=1400 audit(73.800:64): avc: denied { setattr } for pid=3090 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.884330][ T29] audit: type=1400 audit(73.800:65): avc: denied { mounton } for pid=3090 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 73.887459][ T29] audit: type=1400 audit(73.800:66): avc: denied { mount } for pid=3090 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 74.132084][ T3092] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 74.133784][ T29] audit: type=1400 audit(74.050:67): avc: denied { relabelto } for pid=3092 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 81.163780][ T3090] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 83.281713][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 83.287462][ T29] audit: type=1400 audit(83.200:71): avc: denied { execmem } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 83.336483][ T29] audit: type=1400 audit(83.250:72): avc: denied { read } for pid=3095 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.339491][ T29] audit: type=1400 audit(83.250:73): avc: denied { open } for pid=3095 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 83.355846][ T29] audit: type=1400 audit(83.270:74): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 83.383015][ T29] audit: type=1400 audit(83.300:75): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 83.383389][ T29] audit: type=1400 audit(83.300:76): avc: denied { module_request } for pid=3095 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 83.458991][ T29] audit: type=1400 audit(83.380:77): avc: denied { sys_module } for pid=3095 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 83.965897][ T29] audit: type=1400 audit(83.880:78): avc: denied { ioctl } for pid=3095 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 85.180557][ T3095] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.190096][ T3095] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 85.279691][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 85.286508][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 86.072919][ T3096] hsr_slave_0: entered promiscuous mode [ 86.078108][ T3096] hsr_slave_1: entered promiscuous mode [ 86.179798][ T3095] hsr_slave_0: entered promiscuous mode [ 86.181610][ T3095] hsr_slave_1: entered promiscuous mode [ 86.185831][ T3095] debugfs: 'hsr0' already exists in 'hsr' [ 86.188303][ T3095] Cannot create hsr debugfs directory [ 86.634536][ T29] audit: type=1400 audit(86.550:79): avc: denied { create } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 86.636513][ T29] audit: type=1400 audit(86.550:80): avc: denied { write } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 86.656633][ T3096] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 86.679600][ T3096] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 86.701325][ T3096] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 86.726257][ T3096] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 86.741414][ T3095] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 86.784098][ T3095] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 86.810479][ T3095] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 86.827626][ T3095] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 87.606011][ T3095] 8021q: adding VLAN 0 to HW filter on device bond0 [ 87.643676][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.677346][ T3095] veth0_vlan: entered promiscuous mode [ 89.709042][ T3095] veth1_vlan: entered promiscuous mode [ 89.805940][ T3095] veth0_macvtap: entered promiscuous mode [ 89.855332][ T3095] veth1_macvtap: entered promiscuous mode [ 89.973734][ T38] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.974529][ T38] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.981077][ T38] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.981195][ T38] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 90.138201][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 90.139613][ T29] audit: type=1400 audit(90.050:82): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 90.169615][ T29] audit: type=1400 audit(90.080:83): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.yLit6w/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 90.174424][ T29] audit: type=1400 audit(90.090:84): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 90.185737][ T29] audit: type=1400 audit(90.100:85): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.yLit6w/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 90.195042][ T29] audit: type=1400 audit(90.110:86): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzkaller.yLit6w/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1984 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 90.222716][ T29] audit: type=1400 audit(90.140:87): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 90.241460][ T29] audit: type=1400 audit(90.160:88): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 90.244607][ T29] audit: type=1400 audit(90.160:89): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="gadgetfs" ino=1985 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 90.257792][ T29] audit: type=1400 audit(90.170:90): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 90.261157][ T29] audit: type=1400 audit(90.180:91): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 90.354933][ T3095] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 90.926317][ T3096] veth0_vlan: entered promiscuous mode [ 90.945347][ T3096] veth1_vlan: entered promiscuous mode [ 91.022667][ T3096] veth0_macvtap: entered promiscuous mode [ 91.034003][ T3096] veth1_macvtap: entered promiscuous mode [ 91.106395][ T421] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.111023][ T421] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.112304][ T421] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.113280][ T421] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 91.204933][ T3703] comedi: valid board names for 8255 driver are: [ 91.206320][ T3703] 8255 [ 91.208693][ T3703] comedi: valid board names for vmk80xx driver are: [ 91.209488][ T3703] vmk80xx [ 91.210075][ T3703] comedi: valid board names for usbduxsigma driver are: [ 91.210869][ T3703] usbduxsigma [ 91.211470][ T3703] comedi: valid board names for usbduxfast driver are: [ 91.212692][ T3703] usbduxfast [ 91.214465][ T3703] comedi: valid board names for usbdux driver are: [ 91.216408][ T3703] usbdux [ 91.217889][ T3703] comedi: valid board names for ni6501 driver are: [ 91.218900][ T3703] ni6501 [ 91.219592][ T3703] comedi: valid board names for dt9812 driver are: [ 91.220568][ T3703] dt9812 [ 91.221346][ T3703] comedi: valid board names for ni_labpc_cs driver are: [ 91.222151][ T3703] ni_labpc_cs [ 91.222810][ T3703] comedi: valid board names for ni_daq_700 driver are: [ 91.223682][ T3703] ni_daq_700 [ 91.224340][ T3703] comedi: valid board names for labpc_pci driver are: [ 91.225543][ T3703] labpc_pci [ 91.226149][ T3703] comedi: valid board names for adl_pci9118 driver are: [ 91.230140][ T3703] pci9118dg [ 91.230518][ T3703] pci9118hg [ 91.230675][ T3703] pci9118hr [ 91.230878][ T3703] comedi: valid board names for 8255_pci driver are: [ 91.230958][ T3703] 8255_pci [ 91.230982][ T3703] comedi: valid board names for comedi_parport driver are: [ 91.231019][ T3703] comedi_parport [ 91.231077][ T3703] comedi: valid board names for comedi_test driver are: [ 91.231103][ T3703] comedi_test [ 91.231119][ T3703] comedi: valid board names for comedi_bond driver are: [ 91.231137][ T3703] comedi_bond [ 92.139628][ T3712] capability: warning: `syz.1.5' uses 32-bit capabilities (legacy support in use) [ 92.435223][ T3719] SELinux: policydb string does not match my string SE Linux [ 92.436602][ T3719] SELinux: failed to load policy [ 95.231291][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 95.235450][ T29] audit: type=1400 audit(95.150:102): avc: denied { map_create } for pid=3733 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 95.241555][ T29] audit: type=1400 audit(95.150:103): avc: denied { bpf } for pid=3733 comm="syz.1.13" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 95.250006][ T29] audit: type=1400 audit(95.150:104): avc: denied { map_read map_write } for pid=3733 comm="syz.1.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 96.122319][ T29] audit: type=1400 audit(96.040:105): avc: denied { ioctl } for pid=3741 comm="syz.0.17" path="socket:[2485]" dev="sockfs" ino=2485 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 96.602162][ T29] audit: type=1400 audit(96.520:106): avc: denied { create } for pid=3746 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 96.608781][ T29] audit: type=1400 audit(96.530:107): avc: denied { setopt } for pid=3746 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 96.619482][ T29] audit: type=1400 audit(96.540:108): avc: denied { accept } for pid=3746 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 97.978082][ T29] audit: type=1400 audit(97.900:109): avc: denied { prog_load } for pid=3735 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.979872][ T29] audit: type=1400 audit(97.900:110): avc: denied { perfmon } for pid=3735 comm="syz.1.14" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 97.994134][ T29] audit: type=1400 audit(97.910:111): avc: denied { create } for pid=3735 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 104.237278][ C1] hrtimer: interrupt took 19872928 ns [ 112.226425][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 112.228968][ T29] audit: type=1400 audit(112.140:116): avc: denied { create } for pid=3761 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 112.857875][ T29] audit: type=1326 audit(112.690:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.0.23" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 112.858383][ T29] audit: type=1326 audit(112.750:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.0.23" exe="/syz-executor" sig=0 arch=40000028 syscall=324 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 112.858937][ T29] audit: type=1326 audit(112.760:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.0.23" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 112.859135][ T29] audit: type=1326 audit(112.760:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.0.23" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 112.859335][ T29] audit: type=1326 audit(112.770:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.0.23" exe="/syz-executor" sig=0 arch=40000028 syscall=334 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 112.860015][ T29] audit: type=1326 audit(112.770:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.0.23" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 112.860338][ T29] audit: type=1326 audit(112.770:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.0.23" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 112.865932][ T29] audit: type=1326 audit(112.780:124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3761 comm="syz.0.23" exe="/syz-executor" sig=0 arch=40000028 syscall=365 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 119.403056][ T3768] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 119.802862][ T29] audit: type=1400 audit(119.720:125): avc: denied { create } for pid=3775 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 119.810657][ T29] audit: type=1400 audit(119.720:126): avc: denied { write } for pid=3775 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 120.441178][ T29] audit: type=1400 audit(120.360:127): avc: denied { read write } for pid=3775 comm="syz.1.28" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 120.446052][ T29] audit: type=1400 audit(120.360:128): avc: denied { open } for pid=3775 comm="syz.1.28" path="/13/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 120.781963][ T29] audit: type=1400 audit(120.690:129): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 121.527661][ T23] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 121.677796][ T23] usb 2-1: Using ep0 maxpacket: 32 [ 121.713955][ T23] usb 2-1: config 0 has an invalid interface number: 184 but max is 0 [ 121.714274][ T23] usb 2-1: config 0 has no interface number 0 [ 121.716428][ T23] usb 2-1: config 0 interface 184 has no altsetting 0 [ 121.761954][ T23] usb 2-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 121.762252][ T23] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 121.763269][ T23] usb 2-1: Product: syz [ 121.763303][ T23] usb 2-1: Manufacturer: syz [ 121.763317][ T23] usb 2-1: SerialNumber: syz [ 121.770205][ T23] usb 2-1: config 0 descriptor?? [ 121.801259][ T23] smsc75xx v1.0.0 [ 121.801801][ T23] smsc75xx 2-1:0.184 (unnamed net_device) (uninitialized): usbnet_get_endpoints failed: -22 [ 121.802811][ T23] smsc75xx 2-1:0.184: probe with driver smsc75xx failed with error -22 [ 125.527615][ T29] audit: type=1400 audit(125.440:130): avc: denied { name_bind } for pid=3798 comm="syz.0.34" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 125.528993][ T29] audit: type=1400 audit(125.440:131): avc: denied { node_bind } for pid=3798 comm="syz.0.34" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 134.031449][ T29] audit: type=1400 audit(133.950:132): avc: denied { bind } for pid=3806 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 134.060446][ T29] audit: type=1400 audit(133.970:133): avc: denied { setopt } for pid=3806 comm="syz.0.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 135.651958][ T3705] usb 2-1: USB disconnect, device number 2 [ 135.761569][ T29] audit: type=1400 audit(135.680:134): avc: denied { execute } for pid=3819 comm="syz.1.38" path="/15/blkio.bfq.io_service_bytes" dev="tmpfs" ino=94 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 139.067321][ T29] audit: type=1400 audit(138.980:135): avc: denied { allowed } for pid=3953 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 139.091270][ T29] audit: type=1400 audit(139.010:136): avc: denied { create } for pid=3953 comm="syz.1.41" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 139.140299][ T29] audit: type=1400 audit(139.060:137): avc: denied { map } for pid=3953 comm="syz.1.41" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3209 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 139.153282][ T29] audit: type=1400 audit(139.070:138): avc: denied { read write } for pid=3953 comm="syz.1.41" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3209 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 147.410747][ T29] audit: type=1400 audit(147.330:139): avc: denied { write } for pid=4100 comm="syz.1.49" name="ptype" dev="proc" ino=4026532753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 162.411444][ T29] audit: type=1400 audit(162.330:140): avc: denied { connect } for pid=4112 comm="syz.1.51" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 162.420808][ T29] audit: type=1400 audit(162.340:141): avc: denied { write } for pid=4112 comm="syz.1.51" laddr=172.20.20.40 lport=255 faddr=172.20.20.40 fport=20064 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 162.884075][ T29] audit: type=1400 audit(162.800:142): avc: denied { setopt } for pid=4118 comm="syz.0.53" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 167.951960][ T29] audit: type=1400 audit(167.870:143): avc: denied { create } for pid=4122 comm="syz.0.54" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 178.733460][ T4138] 8021q: adding VLAN 0 to HW filter on device bond1 [ 178.960357][ T4175] netlink: 12 bytes leftover after parsing attributes in process `syz.1.61'. [ 179.036203][ T4175] 8021q: adding VLAN 0 to HW filter on device bond2 [ 179.106007][ T4175] netlink: 28 bytes leftover after parsing attributes in process `syz.1.61'. [ 179.109221][ T4175] bond2: entered promiscuous mode [ 179.109869][ T4175] bond2: entered allmulticast mode [ 179.141643][ T4175] dummy0: entered promiscuous mode [ 179.142576][ T4175] dummy0: entered allmulticast mode [ 179.148769][ T4175] bond2: (slave dummy0): Enslaving as an active interface with an up link [ 179.183310][ T4175] bond2 (unregistering): (slave dummy0): Releasing backup interface [ 179.190885][ T4175] dummy0: left promiscuous mode [ 179.192141][ T4175] dummy0: left allmulticast mode [ 179.216040][ T4175] bond2 (unregistering): Released all slaves [ 181.108425][ T29] audit: type=1400 audit(181.020:144): avc: denied { unlink } for pid=3095 comm="syz-executor" name="bus" dev="tmpfs" ino=151 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 181.997945][ T3705] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 182.234507][ T3705] usb 1-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=26.3f [ 182.234847][ T3705] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 182.238057][ T3705] usb 1-1: Product: syz [ 182.238387][ T3705] usb 1-1: Manufacturer: syz [ 182.238557][ T3705] usb 1-1: SerialNumber: syz [ 182.251239][ T3705] usb 1-1: config 0 descriptor?? [ 192.536091][ T3705] usb 1-1: USB disconnect, device number 2 [ 194.579063][ T29] audit: type=1400 audit(194.500:145): avc: denied { write } for pid=4270 comm="syz.1.68" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 194.915923][ T29] audit: type=1400 audit(194.830:146): avc: denied { create } for pid=4272 comm="syz.1.69" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 195.762660][ T4280] nvme_fabrics: missing parameter 'transport=%s' [ 195.763014][ T4280] nvme_fabrics: missing parameter 'nqn=%s' [ 196.455360][ T29] audit: type=1400 audit(196.370:147): avc: denied { create } for pid=4289 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 196.466105][ T29] audit: type=1400 audit(196.380:148): avc: denied { setopt } for pid=4289 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 196.481352][ T29] audit: type=1400 audit(196.400:149): avc: denied { getopt } for pid=4289 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 196.576737][ T4292] Zero length message leads to an empty skb [ 198.122513][ T29] audit: type=1400 audit(198.040:150): avc: denied { write } for pid=4299 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 198.129632][ T29] audit: type=1400 audit(198.040:151): avc: denied { nlmsg_write } for pid=4299 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 198.200118][ T4302] netlink: 64 bytes leftover after parsing attributes in process `syz.1.81'. [ 206.665836][ T4320] syz.1.87 uses obsolete (PF_INET,SOCK_PACKET) [ 206.680181][ T29] audit: type=1400 audit(206.600:152): avc: denied { ioctl } for pid=4315 comm="syz.1.87" path="socket:[2717]" dev="sockfs" ino=2717 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 207.224071][ T29] audit: type=1400 audit(207.140:153): avc: denied { bind } for pid=4325 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 207.239951][ T29] audit: type=1400 audit(207.160:154): avc: denied { ioctl } for pid=4325 comm="syz.1.89" path="socket:[2731]" dev="sockfs" ino=2731 ioctlcmd=0x89f8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 210.535850][ T4355] *** NOT YET: opcode c3 *** [ 210.552827][ T29] audit: type=1326 audit(210.470:155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4352 comm="syz.1.92" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x0 [ 213.402534][ T29] audit: type=1400 audit(213.320:156): avc: denied { create } for pid=4359 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 213.482029][ T29] audit: type=1400 audit(213.400:157): avc: denied { setopt } for pid=4359 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 214.107729][ T45] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 214.372040][ T45] usb 1-1: too many configurations: 9, using maximum allowed: 8 [ 214.409961][ T45] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 214.410426][ T45] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 214.410667][ T45] usb 1-1: config 0 interface 0 has no altsetting 0 [ 214.510774][ T45] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 214.515565][ T45] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 214.515650][ T45] usb 1-1: config 0 interface 0 has no altsetting 0 [ 214.609737][ T45] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 214.610137][ T45] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 214.610213][ T45] usb 1-1: config 0 interface 0 has no altsetting 0 [ 214.629305][ T45] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 214.629643][ T45] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 214.629715][ T45] usb 1-1: config 0 interface 0 has no altsetting 0 [ 214.659045][ T45] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 214.659428][ T45] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 214.659519][ T45] usb 1-1: config 0 interface 0 has no altsetting 0 [ 214.675314][ T45] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 214.681093][ T45] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 214.681174][ T45] usb 1-1: config 0 interface 0 has no altsetting 0 [ 214.714326][ T45] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 214.714699][ T45] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 214.716253][ T45] usb 1-1: config 0 interface 0 has no altsetting 0 [ 214.800619][ T45] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 9 [ 214.801815][ T45] usb 1-1: config 0 interface 0 altsetting 2 endpoint 0x8D has an invalid bInterval 0, changing to 7 [ 214.822277][ T45] usb 1-1: config 0 interface 0 has no altsetting 0 [ 214.856607][ T45] usb 1-1: New USB device found, idVendor=0c45, idProduct=1010, bcdDevice=49.8e [ 214.857423][ T45] usb 1-1: New USB device strings: Mfr=41, Product=64, SerialNumber=168 [ 214.859375][ T45] usb 1-1: Product: syz [ 214.861512][ T45] usb 1-1: Manufacturer: syz [ 214.861622][ T45] usb 1-1: SerialNumber: syz [ 214.871928][ T45] usb 1-1: config 0 descriptor?? [ 214.963230][ T45] yurex 1-1:0.0: USB YUREX device now attached to Yurex #0 [ 215.122825][ T4356] usb 1-1: USB disconnect, device number 3 [ 215.132903][ T4356] yurex 1-1:0.0: USB YUREX #0 now disconnected [ 215.748724][ T4356] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 215.906064][ T4356] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 215.907974][ T4356] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 215.909078][ T4356] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 215.913594][ T4356] usb 1-1: config 0 descriptor?? [ 216.361174][ T4356] keytouch 0003:0926:3333.0001: fixing up Keytouch IEC report descriptor [ 216.384487][ T4356] input: HID 0926:3333 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0926:3333.0001/input/input3 [ 216.635129][ T4356] keytouch 0003:0926:3333.0001: input,hidraw0: USB HID v0.00 Keyboard [HID 0926:3333] on usb-dummy_hcd.0-1/input0 [ 217.005007][ T3042] usb 1-1: USB disconnect, device number 4 [ 219.397419][ T29] audit: type=1400 audit(219.310:158): avc: denied { getopt } for pid=4429 comm="syz.0.101" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 226.003022][ T4451] syz.1.105 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 229.193013][ T29] audit: type=1404 audit(229.110:159): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 229.337206][ T29] audit: type=1400 audit(229.250:160): avc: denied { write } for pid=4463 comm="syz.0.110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 229.381628][ T29] audit: type=1400 audit(229.300:161): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 229.468994][ T29] audit: type=1400 audit(229.390:162): avc: denied { create } for pid=4465 comm="syz.0.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 229.502492][ T29] audit: type=1400 audit(229.420:163): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 229.580597][ T29] audit: type=1400 audit(229.500:164): avc: denied { create } for pid=4467 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 229.589508][ T29] audit: type=1400 audit(229.510:165): avc: denied { create } for pid=4467 comm="syz.0.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 229.618970][ T29] audit: type=1400 audit(229.540:166): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 229.720325][ T29] audit: type=1400 audit(229.640:167): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 229.809838][ T29] audit: type=1400 audit(229.730:168): avc: denied { create } for pid=4471 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 237.064249][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 237.068074][ T29] audit: type=1400 audit(236.980:171): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 237.152838][ T29] audit: type=1400 audit(237.070:172): avc: denied { create } for pid=4496 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 237.170366][ T29] audit: type=1400 audit(237.090:173): avc: denied { create } for pid=4496 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 237.222385][ T29] audit: type=1400 audit(237.140:174): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 237.293533][ T29] audit: type=1400 audit(237.210:175): avc: denied { create } for pid=4498 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 237.343834][ T29] audit: type=1400 audit(237.260:176): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 237.434727][ T29] audit: type=1400 audit(237.350:177): avc: denied { create } for pid=4500 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 238.737545][ T29] audit: type=1400 audit(238.650:178): avc: denied { read write } for pid=4500 comm="syz.1.117" name="adsp1" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 238.833624][ T29] audit: type=1400 audit(238.750:179): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 238.930758][ T29] audit: type=1400 audit(238.850:180): avc: denied { read write } for pid=4502 comm="syz.1.118" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 242.098337][ T29] kauditd_printk_skb: 75 callbacks suppressed [ 242.100661][ T29] audit: type=1400 audit(242.010:256): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 242.387716][ T29] audit: type=1400 audit(242.290:257): avc: denied { read write } for pid=4559 comm="syz.1.146" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 242.460582][ T29] audit: type=1400 audit(242.380:258): avc: denied { execmem } for pid=4559 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 242.519220][ T29] audit: type=1400 audit(242.440:259): avc: denied { create } for pid=4559 comm="syz.1.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 242.605681][ T29] audit: type=1400 audit(242.520:260): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 242.682096][ T29] audit: type=1400 audit(242.570:261): avc: denied { read write } for pid=4554 comm="syz.0.144" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 242.682433][ T29] audit: type=1400 audit(242.580:262): avc: denied { mounton } for pid=4554 comm="syz.0.144" path="/58/file0" dev="tmpfs" ino=313 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 242.841115][ T29] audit: type=1400 audit(242.760:263): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 242.998052][ T29] audit: type=1400 audit(242.920:264): avc: denied { read write } for pid=4554 comm="syz.0.144" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 243.150392][ T29] audit: type=1400 audit(243.010:265): avc: denied { create } for pid=4566 comm="syz.1.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 255.661187][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 255.662416][ T29] audit: type=1400 audit(255.580:273): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 256.770112][ T29] audit: type=1400 audit(256.690:274): avc: denied { read write } for pid=4574 comm="syz.0.150" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 256.773388][ T29] audit: type=1400 audit(256.690:275): avc: denied { read write } for pid=4574 comm="syz.0.150" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 256.781614][ T29] audit: type=1400 audit(256.700:276): avc: denied { read write } for pid=4574 comm="syz.0.150" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 256.889356][ T29] audit: type=1400 audit(256.800:277): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 256.969366][ T29] audit: type=1400 audit(256.890:278): avc: denied { read write } for pid=4578 comm="syz.1.151" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 257.003752][ T29] audit: type=1400 audit(256.920:279): avc: denied { execmem } for pid=4578 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 257.037434][ T29] audit: type=1400 audit(256.950:280): avc: denied { create } for pid=4578 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 257.119257][ T29] audit: type=1400 audit(257.040:281): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 257.309526][ T29] audit: type=1400 audit(257.160:282): avc: denied { prog_load } for pid=4580 comm="syz.1.152" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 260.888066][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 260.889115][ T29] audit: type=1400 audit(260.630:298): avc: denied { read } for pid=4586 comm="syz.1.155" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 261.090350][ T29] audit: type=1400 audit(261.010:299): avc: denied { create } for pid=4586 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 261.358773][ T29] audit: type=1400 audit(261.270:300): avc: denied { read } for pid=4586 comm="syz.1.155" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 261.896170][ T29] audit: type=1400 audit(261.810:301): avc: denied { create } for pid=4586 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 273.662249][ T29] audit: type=1400 audit(273.580:302): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 273.724454][ T29] audit: type=1400 audit(273.640:303): avc: denied { read write } for pid=4591 comm="syz.0.156" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 273.735469][ T29] audit: type=1400 audit(273.650:304): avc: denied { execmem } for pid=4591 comm="syz.0.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 273.749274][ T29] audit: type=1400 audit(273.670:305): avc: denied { create } for pid=4591 comm="syz.0.156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 273.772877][ T29] audit: type=1400 audit(273.690:306): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 273.805631][ T29] audit: type=1400 audit(273.720:307): avc: denied { create } for pid=4593 comm="syz.0.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 273.815902][ T29] audit: type=1400 audit(273.730:308): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 273.860228][ T29] audit: type=1400 audit(273.770:309): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 273.906549][ T29] audit: type=1400 audit(273.820:310): avc: denied { name_bind } for pid=4595 comm="syz.1.158" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 273.913530][ T29] audit: type=1400 audit(273.830:311): avc: denied { name_bind } for pid=4595 comm="syz.1.158" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 275.511417][ T103] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.513938][ T103] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.522508][ T103] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.527970][ T103] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 279.042779][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 279.043186][ T29] audit: type=1400 audit(278.960:368): avc: denied { write } for pid=4638 comm="syz.0.178" name="adsp1" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 279.056264][ T29] audit: type=1400 audit(278.970:369): avc: denied { read } for pid=4638 comm="syz.0.178" name="dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 279.063347][ T29] audit: type=1400 audit(278.980:370): avc: denied { read } for pid=4638 comm="syz.0.178" name="pcmC1D0p" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 281.216401][ T29] audit: type=1400 audit(281.130:371): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 281.550869][ T29] audit: type=1400 audit(281.470:372): avc: denied { create } for pid=4641 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 281.600972][ T29] audit: type=1400 audit(281.510:373): avc: denied { create } for pid=4641 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 281.623423][ T29] audit: type=1400 audit(281.530:374): avc: denied { create } for pid=4641 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 281.871744][ T29] audit: type=1400 audit(281.790:375): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 282.225110][ T29] audit: type=1400 audit(282.130:376): avc: denied { read } for pid=4643 comm="syz.0.180" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 282.420018][ T29] audit: type=1400 audit(282.340:377): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 282.831039][ T4646] netdevsim netdevsim0: Direct firmware load for ./file0 failed with error -2 [ 284.068100][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 284.087927][ T29] audit: type=1400 audit(283.990:383): avc: denied { module_request } for pid=4649 comm="syz.0.183" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 284.259851][ T29] audit: type=1400 audit(284.180:384): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 284.757355][ T29] audit: type=1400 audit(284.650:385): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 284.761326][ T29] audit: type=1400 audit(284.680:386): avc: denied { mounton } for pid=4651 comm="syz.0.184" path="/" dev="proc" ino=4026532711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=0 [ 285.004825][ T29] audit: type=1400 audit(284.920:387): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 285.326076][ T29] audit: type=1400 audit(285.240:388): avc: denied { read write } for pid=4654 comm="syz.0.186" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 285.339135][ T29] audit: type=1400 audit(285.260:389): avc: denied { read } for pid=4654 comm="syz.0.186" name="card0" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 285.360450][ T29] audit: type=1400 audit(285.280:390): avc: denied { allowed } for pid=4654 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 285.366061][ T29] audit: type=1400 audit(285.280:391): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 285.630534][ T29] audit: type=1400 audit(285.550:392): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 286.605859][ T4668] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=4668 comm=syz.0.192 [ 288.557983][ T4692] netlink: 8 bytes leftover after parsing attributes in process `syz.0.200'. [ 288.558540][ T4692] netlink: 136 bytes leftover after parsing attributes in process `syz.0.200'. [ 288.559037][ T4692] netlink: 96 bytes leftover after parsing attributes in process `syz.0.200'. [ 288.869096][ T4694] ipvlan2: entered promiscuous mode [ 289.112757][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 289.114395][ T29] audit: type=1400 audit(289.030:429): avc: denied { read } for pid=4699 comm="syz.1.205" name="pcmC1D0c" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 289.153761][ T29] audit: type=1400 audit(289.070:430): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 289.223248][ T29] audit: type=1400 audit(289.140:431): avc: denied { read write } for pid=4701 comm="syz.1.206" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 289.260588][ T29] audit: type=1400 audit(289.180:432): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 289.349617][ T29] audit: type=1400 audit(289.270:433): avc: denied { read } for pid=4703 comm="syz.1.207" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 289.385520][ T29] audit: type=1400 audit(289.300:434): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 289.487400][ T29] audit: type=1400 audit(289.400:435): avc: denied { create } for pid=4705 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 289.501982][ T4706] netlink: 4 bytes leftover after parsing attributes in process `syz.1.208'. [ 289.621094][ T29] audit: type=1400 audit(289.540:436): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 289.703272][ T29] audit: type=1400 audit(289.620:437): avc: denied { read write } for pid=4711 comm="syz.1.209" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 289.749949][ T29] audit: type=1400 audit(289.670:438): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 291.141711][ T4734] netlink: 20 bytes leftover after parsing attributes in process `syz.1.220'. [ 291.162833][ T4734] erspan0: entered promiscuous mode [ 291.181573][ T4734] erspan0: left promiscuous mode [ 294.827918][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 294.828409][ T29] audit: type=1400 audit(294.670:487): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 294.828853][ T29] audit: type=1400 audit(294.740:488): avc: denied { prog_load } for pid=4754 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 294.871033][ T29] audit: type=1400 audit(294.790:489): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 295.339974][ T29] audit: type=1400 audit(295.260:490): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 295.469905][ T29] audit: type=1400 audit(295.390:491): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 295.541555][ T29] audit: type=1400 audit(295.460:492): avc: denied { read write } for pid=4760 comm="syz.1.231" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 295.571600][ T29] audit: type=1400 audit(295.490:493): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 295.645641][ T29] audit: type=1400 audit(295.560:494): avc: denied { create } for pid=4762 comm="syz.1.232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 295.685291][ T29] audit: type=1400 audit(295.600:495): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 295.765620][ T29] audit: type=1400 audit(295.680:496): avc: denied { create } for pid=4764 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 300.267661][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 300.269856][ T29] audit: type=1400 audit(300.180:518): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 300.322817][ T29] audit: type=1400 audit(300.240:519): avc: denied { read write } for pid=4783 comm="syz.0.241" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 300.345101][ T29] audit: type=1400 audit(300.260:520): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 300.413180][ T29] audit: type=1400 audit(300.330:521): avc: denied { execmem } for pid=4785 comm="syz.0.242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 300.429752][ T29] audit: type=1400 audit(300.340:522): avc: denied { write } for pid=4785 comm="syz.0.242" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 300.472771][ T29] audit: type=1400 audit(300.390:523): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 300.558909][ T29] audit: type=1400 audit(300.480:524): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 300.620611][ T29] audit: type=1400 audit(300.540:525): avc: denied { read write } for pid=4789 comm="syz.0.244" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 300.636056][ T29] audit: type=1400 audit(300.540:526): avc: denied { execmem } for pid=4789 comm="syz.0.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 300.666833][ T29] audit: type=1400 audit(300.580:527): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 305.319527][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 305.321741][ T29] audit: type=1400 audit(305.240:570): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 305.393130][ T29] audit: type=1400 audit(305.310:571): avc: denied { name_bind } for pid=4832 comm="syz.0.264" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 306.583264][ T29] audit: type=1400 audit(306.500:572): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 306.686818][ T29] audit: type=1400 audit(306.600:573): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 306.758615][ T29] audit: type=1400 audit(306.680:574): avc: denied { read } for pid=4837 comm="syz.1.266" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 306.790096][ T29] audit: type=1400 audit(306.710:575): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 306.833957][ T29] audit: type=1400 audit(306.750:576): avc: denied { read write } for pid=4839 comm="syz.1.267" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 306.864496][ T29] audit: type=1400 audit(306.780:577): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 307.932200][ T29] audit: type=1400 audit(307.850:578): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 308.078116][ T29] audit: type=1400 audit(307.990:579): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 310.891428][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 310.898906][ T29] audit: type=1400 audit(310.810:599): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 310.970251][ T29] audit: type=1400 audit(310.890:600): avc: denied { read write } for pid=4867 comm="syz.0.280" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 310.989632][ T29] audit: type=1400 audit(310.910:601): avc: denied { execmem } for pid=4867 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 311.515633][ T29] audit: type=1400 audit(311.430:602): avc: denied { create } for pid=4867 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 311.757568][ T29] audit: type=1400 audit(311.670:603): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 311.856275][ T29] audit: type=1400 audit(311.770:604): avc: denied { create } for pid=4870 comm="syz.1.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 311.865184][ T29] audit: type=1400 audit(311.780:605): avc: denied { allowed } for pid=4870 comm="syz.1.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 311.905949][ T29] audit: type=1400 audit(311.820:606): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 311.970650][ T29] audit: type=1400 audit(311.890:607): avc: denied { create } for pid=4872 comm="syz.1.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 312.003530][ T29] audit: type=1400 audit(311.920:608): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 313.369625][ T4879] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 313.370103][ T4879] IPv6: NLM_F_CREATE should be set when creating new route [ 313.371054][ T4879] IPv6: NLM_F_CREATE should be set when creating new route [ 313.371368][ T4879] IPv6: NLM_F_CREATE should be set when creating new route [ 318.640056][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 318.648024][ T29] audit: type=1400 audit(318.560:619): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 318.745177][ T29] audit: type=1400 audit(318.660:620): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 318.818530][ T29] audit: type=1400 audit(318.740:621): avc: denied { read } for pid=4882 comm="syz.0.286" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 318.859075][ T29] audit: type=1400 audit(318.780:622): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 319.031458][ T29] audit: type=1400 audit(318.950:623): avc: denied { read } for pid=4884 comm="syz.0.287" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 319.069980][ T29] audit: type=1400 audit(318.990:624): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 319.164591][ T29] audit: type=1400 audit(319.080:625): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 319.200232][ T29] audit: type=1400 audit(319.120:626): avc: denied { read write } for pid=4888 comm="syz.0.289" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 319.222432][ T29] audit: type=1400 audit(319.140:627): avc: denied { execmem } for pid=4888 comm="syz.0.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 319.233986][ T29] audit: type=1400 audit(319.150:628): avc: denied { create } for pid=4888 comm="syz.0.289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 324.109252][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 324.110623][ T29] audit: type=1400 audit(324.030:658): avc: denied { read write } for pid=4908 comm="syz.1.298" name="snapshot" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 324.138364][ T4911] netlink: 68 bytes leftover after parsing attributes in process `syz.1.298'. [ 324.194961][ T29] audit: type=1400 audit(324.110:659): avc: denied { create } for pid=4908 comm="syz.1.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 330.983386][ T29] audit: type=1400 audit(330.900:660): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 331.042583][ T29] audit: type=1400 audit(330.960:661): avc: denied { read write } for pid=4912 comm="syz.0.299" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 331.057870][ T29] audit: type=1400 audit(330.970:662): avc: denied { execmem } for pid=4912 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 331.082300][ T29] audit: type=1400 audit(331.000:663): avc: denied { create } for pid=4912 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 331.124164][ T29] audit: type=1400 audit(331.040:664): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 331.211707][ T29] audit: type=1400 audit(331.130:665): avc: denied { create } for pid=4914 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 331.219891][ T29] audit: type=1400 audit(331.140:666): avc: denied { create } for pid=4914 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 332.248027][ T29] audit: type=1400 audit(332.160:667): avc: denied { create } for pid=4914 comm="syz.0.300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 334.286761][ T29] audit: type=1400 audit(334.190:668): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 334.393497][ T29] audit: type=1400 audit(334.310:669): avc: denied { create } for pid=4918 comm="syz.1.301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 334.592085][ T4921] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 336.223759][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 336.228060][ T29] audit: type=1400 audit(336.140:675): avc: denied { read } for pid=4923 comm="syz.1.303" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 337.009690][ T29] audit: type=1400 audit(336.920:676): avc: denied { write } for pid=4923 comm="syz.1.303" name="ip6_flowlabel" dev="proc" ino=4026532806 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 337.274428][ T29] audit: type=1400 audit(337.190:677): avc: denied { create } for pid=4923 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 337.280395][ T29] audit: type=1400 audit(337.200:678): avc: denied { create } for pid=4923 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 337.935125][ T29] audit: type=1400 audit(337.850:679): avc: denied { read } for pid=4923 comm="syz.1.303" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 338.090595][ T29] audit: type=1400 audit(338.010:680): avc: denied { create } for pid=4923 comm="syz.1.303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 341.447868][ T29] audit: type=1400 audit(341.360:681): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 341.478617][ T29] audit: type=1400 audit(341.400:682): avc: denied { read write } for pid=4927 comm="syz.0.304" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 341.504345][ T29] audit: type=1400 audit(341.420:683): avc: denied { execmem } for pid=4927 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 341.519160][ T29] audit: type=1400 audit(341.440:684): avc: denied { create } for pid=4927 comm="syz.0.304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 341.551061][ T29] audit: type=1400 audit(341.470:685): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 341.661027][ T29] audit: type=1400 audit(341.580:686): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 341.768444][ T29] audit: type=1400 audit(341.690:687): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 343.168997][ T29] audit: type=1400 audit(343.080:688): avc: denied { create } for pid=4933 comm="syz.0.307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=0 [ 343.196103][ T29] audit: type=1400 audit(343.110:689): avc: denied { read } for pid=4933 comm="syz.0.307" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 346.292037][ T29] audit: type=1400 audit(346.210:690): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 346.624433][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 346.625872][ T29] audit: type=1400 audit(346.540:694): avc: denied { read write } for pid=4939 comm="syz.1.309" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 346.723800][ T29] audit: type=1400 audit(346.640:695): avc: denied { execmem } for pid=4939 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 346.821363][ T29] audit: type=1400 audit(346.740:696): avc: denied { create } for pid=4939 comm="syz.1.309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 347.017832][ T29] audit: type=1400 audit(346.900:697): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 347.121289][ T29] audit: type=1400 audit(347.040:698): avc: denied { create } for pid=4941 comm="syz.1.310" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 347.211651][ T29] audit: type=1400 audit(347.130:699): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 347.744547][ T29] audit: type=1400 audit(347.660:700): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 347.851483][ T29] audit: type=1400 audit(347.760:701): avc: denied { prog_load } for pid=4945 comm="syz.1.312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 347.884885][ T29] audit: type=1400 audit(347.800:702): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 348.110158][ T29] audit: type=1400 audit(348.020:703): avc: denied { read write } for pid=4947 comm="syz.1.313" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 352.249277][ T4953] netlink: 12 bytes leftover after parsing attributes in process `syz.1.315'. [ 352.465693][ T4953] 8021q: adding VLAN 0 to HW filter on device bond2 [ 352.529926][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 352.533752][ T29] audit: type=1400 audit(352.450:709): avc: denied { create } for pid=4952 comm="syz.1.315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 352.542833][ T4953] netlink: 28 bytes leftover after parsing attributes in process `syz.1.315'. [ 352.592113][ T4953] bond2: (slave dummy0): Enslaving as an active interface with an up link [ 352.641174][ T29] audit: type=1400 audit(352.560:710): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 352.760074][ T29] audit: type=1400 audit(352.680:711): avc: denied { create } for pid=4987 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 353.000250][ T29] audit: type=1400 audit(352.920:712): avc: denied { allowed } for pid=4987 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 353.109458][ T29] audit: type=1400 audit(353.020:713): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 353.132003][ T29] audit: type=1400 audit(353.050:714): avc: denied { prog_load } for pid=4987 comm="syz.1.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 353.173765][ T29] audit: type=1400 audit(353.090:715): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 353.192322][ T29] audit: type=1400 audit(353.110:716): avc: denied { create } for pid=4989 comm="syz.0.317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 353.226259][ T29] audit: type=1400 audit(353.140:717): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 353.261775][ T29] audit: type=1400 audit(353.180:718): avc: denied { read write } for pid=4991 comm="syz.1.318" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 356.902818][ T5013] netlink: 16186 bytes leftover after parsing attributes in process `syz.0.326'. [ 357.740868][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 357.741379][ T29] audit: type=1400 audit(357.660:743): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 357.813564][ T29] audit: type=1400 audit(357.730:744): avc: denied { create } for pid=5018 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 357.820045][ T29] audit: type=1400 audit(357.740:745): avc: denied { allowed } for pid=5018 comm="syz.0.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 366.674602][ T29] audit: type=1400 audit(366.590:746): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 366.807778][ T29] audit: type=1400 audit(366.720:747): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 366.922187][ T29] audit: type=1400 audit(366.840:748): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 366.970236][ T29] audit: type=1400 audit(366.890:749): avc: denied { create } for pid=5027 comm="syz.1.332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 367.022795][ T29] audit: type=1400 audit(366.940:750): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 367.147665][ T29] audit: type=1400 audit(367.060:751): avc: denied { name_bind } for pid=5029 comm="syz.1.333" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 369.698697][ T29] audit: type=1400 audit(369.570:752): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 369.743863][ T29] audit: type=1400 audit(369.660:753): avc: denied { read } for pid=5032 comm="syz.1.334" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 369.763591][ T29] audit: type=1400 audit(369.680:754): avc: denied { module_request } for pid=5032 comm="syz.1.334" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 369.769854][ T29] audit: type=1400 audit(369.690:755): avc: denied { sys_module } for pid=5032 comm="syz.1.334" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 372.037554][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 372.048068][ T29] audit: type=1400 audit(371.950:760): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 372.187975][ T29] audit: type=1400 audit(372.090:761): avc: denied { create } for pid=5039 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 372.216465][ T29] audit: type=1400 audit(372.130:762): avc: denied { create } for pid=5039 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 372.225514][ T29] audit: type=1400 audit(372.140:763): avc: denied { read write } for pid=5039 comm="syz.0.337" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 372.252497][ T29] audit: type=1400 audit(372.170:764): avc: denied { prog_load } for pid=5039 comm="syz.0.337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 372.279657][ T29] audit: type=1400 audit(372.200:765): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 372.398166][ T29] audit: type=1400 audit(372.320:766): avc: denied { create } for pid=5041 comm="syz.0.338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 372.450812][ T29] audit: type=1400 audit(372.370:767): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 372.513178][ T29] audit: type=1400 audit(372.430:768): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 372.630705][ T29] audit: type=1400 audit(372.550:769): avc: denied { allowed } for pid=5044 comm="syz.1.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 373.285873][ T5055] vxcan1: entered promiscuous mode [ 377.142923][ T29] kauditd_printk_skb: 100 callbacks suppressed [ 377.145096][ T29] audit: type=1400 audit(377.010:870): avc: denied { create } for pid=5104 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 377.237488][ T29] audit: type=1400 audit(377.150:871): avc: denied { create } for pid=5104 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 377.554293][ T29] audit: type=1400 audit(377.470:872): avc: denied { create } for pid=5108 comm="syz.0.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 377.746244][ T29] audit: type=1400 audit(377.610:873): avc: denied { create } for pid=5108 comm="syz.0.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 377.912623][ T29] audit: type=1400 audit(377.800:874): avc: denied { create } for pid=5108 comm="syz.0.370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 378.182012][ T29] audit: type=1400 audit(378.100:875): avc: denied { create } for pid=5104 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 378.316274][ T29] audit: type=1400 audit(378.230:876): avc: denied { read } for pid=5104 comm="syz.1.368" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 378.988563][ T29] audit: type=1400 audit(378.910:877): avc: denied { create } for pid=5104 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 378.998271][ T29] audit: type=1400 audit(378.920:878): avc: denied { create } for pid=5104 comm="syz.1.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 387.984495][ T29] audit: type=1400 audit(387.900:879): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 388.035485][ T29] audit: type=1400 audit(387.950:880): avc: denied { allowed } for pid=5117 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 388.059550][ T29] audit: type=1400 audit(387.980:881): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 388.101165][ T29] audit: type=1400 audit(388.020:882): avc: denied { read write } for pid=5119 comm="syz.0.372" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 388.148321][ T29] audit: type=1400 audit(388.060:883): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 388.182811][ T29] audit: type=1400 audit(388.100:884): avc: denied { name_bind } for pid=5121 comm="syz.0.373" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 388.189996][ T29] audit: type=1400 audit(388.110:885): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 388.258604][ T29] audit: type=1400 audit(388.180:886): avc: denied { read write } for pid=5123 comm="syz.1.374" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 388.299378][ T29] audit: type=1400 audit(388.220:887): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 388.468294][ T29] audit: type=1400 audit(388.380:888): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 393.127631][ T5157] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 395.151407][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 395.159681][ T29] audit: type=1400 audit(395.070:921): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 395.205949][ T29] audit: type=1400 audit(395.120:922): avc: denied { read write } for pid=5158 comm="syz.0.389" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 395.229581][ T29] audit: type=1400 audit(395.150:923): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 395.488324][ T29] audit: type=1400 audit(395.400:924): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 395.554348][ T29] audit: type=1400 audit(395.470:925): avc: denied { read write } for pid=5162 comm="syz.0.391" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 395.568942][ T29] audit: type=1400 audit(395.490:926): avc: denied { read append } for pid=5162 comm="syz.0.391" name="i2c-1" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 395.595194][ T29] audit: type=1400 audit(395.510:927): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 395.656156][ T29] audit: type=1400 audit(395.570:928): avc: denied { read write } for pid=5164 comm="syz.0.392" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 395.696666][ T29] audit: type=1400 audit(395.610:929): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 395.765487][ T29] audit: type=1400 audit(395.680:930): avc: denied { read } for pid=5166 comm="syz.0.393" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.301208][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 400.302195][ T29] audit: type=1400 audit(400.220:944): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 400.355335][ T29] audit: type=1400 audit(400.270:945): avc: denied { read write } for pid=5180 comm="syz.1.399" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.365298][ T29] audit: type=1400 audit(400.280:946): avc: denied { read write } for pid=5180 comm="syz.1.399" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.368162][ T29] audit: type=1400 audit(400.290:947): avc: denied { read write } for pid=5180 comm="syz.1.399" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.369640][ T29] audit: type=1400 audit(400.290:948): avc: denied { read write } for pid=5180 comm="syz.1.399" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.577434][ T29] audit: type=1400 audit(400.490:949): avc: denied { read write } for pid=5180 comm="syz.1.399" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.616298][ T29] audit: type=1400 audit(400.530:950): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 400.691109][ T29] audit: type=1400 audit(400.610:951): avc: denied { read write } for pid=5182 comm="syz.1.400" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 400.727275][ T29] audit: type=1400 audit(400.640:952): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 400.796320][ T29] audit: type=1400 audit(400.710:953): avc: denied { create } for pid=5184 comm="syz.1.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 401.424881][ T5203] netlink: 8 bytes leftover after parsing attributes in process `syz.1.410'. [ 405.317262][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 405.321780][ T29] audit: type=1400 audit(405.230:1001): avc: denied { write } for pid=5225 comm="syz.0.421" name="igmp" dev="proc" ino=4026532673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 405.359738][ T29] audit: type=1400 audit(405.280:1002): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 405.432717][ T29] audit: type=1400 audit(405.350:1003): avc: denied { read write } for pid=5228 comm="syz.0.422" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.473227][ T29] audit: type=1400 audit(405.390:1004): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 405.542053][ T29] audit: type=1400 audit(405.460:1005): avc: denied { read write } for pid=5230 comm="syz.0.423" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.554957][ T29] audit: type=1400 audit(405.470:1006): avc: denied { read append } for pid=5230 comm="syz.0.423" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.574307][ T29] audit: type=1400 audit(405.490:1007): avc: denied { read write } for pid=5230 comm="syz.0.423" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 405.594223][ T29] audit: type=1400 audit(405.510:1008): avc: denied { create } for pid=5230 comm="syz.0.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 405.633303][ T29] audit: type=1400 audit(405.550:1009): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 405.725793][ T29] audit: type=1400 audit(405.640:1010): avc: denied { allowed } for pid=5232 comm="syz.0.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 406.162586][ T5241] netlink: 12 bytes leftover after parsing attributes in process `syz.0.428'. [ 410.741494][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 410.744689][ T29] audit: type=1400 audit(410.660:1057): avc: denied { write } for pid=5273 comm="syz.0.443" name="protocols" dev="proc" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 411.282677][ T29] audit: type=1400 audit(411.200:1058): avc: denied { create } for pid=5273 comm="syz.0.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 411.299704][ T29] audit: type=1400 audit(411.220:1059): avc: denied { create } for pid=5273 comm="syz.0.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 411.327610][ T29] audit: type=1400 audit(411.240:1060): avc: denied { create } for pid=5273 comm="syz.0.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 411.336527][ T29] audit: type=1400 audit(411.250:1061): avc: denied { create } for pid=5273 comm="syz.0.443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 411.377380][ T29] audit: type=1400 audit(411.290:1062): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 411.567913][ T29] audit: type=1400 audit(411.470:1063): avc: denied { read write } for pid=5273 comm="syz.0.443" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 411.640730][ T29] audit: type=1400 audit(411.540:1064): avc: denied { read write } for pid=5278 comm="syz.1.444" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 411.708735][ T29] audit: type=1400 audit(411.600:1065): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 412.390057][ T29] audit: type=1400 audit(412.310:1066): avc: denied { allowed } for pid=5280 comm="syz.1.445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 413.672151][ T2017] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.672546][ T2017] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.674807][ T2017] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.675136][ T2017] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 415.747756][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 415.750442][ T29] audit: type=1400 audit(415.660:1080): avc: denied { create } for pid=5296 comm="syz.1.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 417.405264][ T29] audit: type=1400 audit(417.320:1081): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 417.494452][ T29] audit: type=1400 audit(417.410:1082): avc: denied { create } for pid=5299 comm="syz.1.453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 417.573899][ T29] audit: type=1400 audit(417.460:1083): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 417.663952][ T29] audit: type=1400 audit(417.580:1084): avc: denied { create } for pid=5301 comm="syz.1.454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 417.726651][ T29] audit: type=1400 audit(417.640:1085): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 417.882244][ T29] audit: type=1400 audit(417.800:1086): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 418.205471][ T29] audit: type=1400 audit(418.120:1087): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 418.267982][ T29] audit: type=1400 audit(418.180:1088): avc: denied { read } for pid=5307 comm="syz.1.457" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 418.276768][ T29] audit: type=1400 audit(418.190:1089): avc: denied { read } for pid=5307 comm="syz.1.457" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 423.423148][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 423.424655][ T29] audit: type=1400 audit(423.340:1102): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 426.039218][ T29] audit: type=1400 audit(425.960:1103): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 426.155715][ T29] audit: type=1400 audit(426.070:1104): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 426.229387][ T29] audit: type=1400 audit(426.150:1105): avc: denied { create } for pid=5322 comm="syz.0.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 426.263610][ T29] audit: type=1400 audit(426.180:1106): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 426.342676][ T29] audit: type=1400 audit(426.260:1107): avc: denied { create } for pid=5324 comm="syz.0.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 426.380025][ T29] audit: type=1400 audit(426.300:1108): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 427.890507][ T29] audit: type=1400 audit(427.810:1109): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 427.944396][ T29] audit: type=1400 audit(427.860:1110): avc: denied { create } for pid=5328 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 427.978892][ T29] audit: type=1400 audit(427.900:1111): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 428.963520][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 428.967798][ T29] audit: type=1400 audit(428.880:1125): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 429.058437][ T29] audit: type=1400 audit(428.980:1126): avc: denied { name_bind } for pid=5341 comm="syz.0.472" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 429.098916][ T29] audit: type=1400 audit(429.010:1127): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 429.181387][ T29] audit: type=1400 audit(429.100:1128): avc: denied { write } for pid=5343 comm="syz.0.473" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 429.229956][ T29] audit: type=1400 audit(429.150:1129): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 429.290804][ T29] audit: type=1400 audit(429.210:1130): avc: denied { create } for pid=5345 comm="syz.0.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 429.325557][ T29] audit: type=1400 audit(429.240:1131): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 429.397798][ T29] audit: type=1400 audit(429.310:1132): avc: denied { prog_load } for pid=5347 comm="syz.0.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 429.423365][ T29] audit: type=1400 audit(429.340:1133): avc: denied { execmem } for pid=5347 comm="syz.0.475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 429.539741][ T29] audit: type=1400 audit(429.460:1134): avc: denied { mount } for pid=5338 comm="syz.1.471" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=0 [ 441.264208][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 441.264649][ T29] audit: type=1400 audit(441.180:1164): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 441.318215][ T29] audit: type=1400 audit(441.240:1165): avc: denied { read write } for pid=5372 comm="syz.1.485" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 441.338090][ T29] audit: type=1400 audit(441.250:1166): avc: denied { execmem } for pid=5372 comm="syz.1.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 441.364292][ T29] audit: type=1400 audit(441.280:1167): avc: denied { create } for pid=5372 comm="syz.1.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 441.400694][ T29] audit: type=1400 audit(441.320:1168): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 441.483563][ T29] audit: type=1400 audit(441.400:1169): avc: denied { create } for pid=5374 comm="syz.1.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 441.493757][ T29] audit: type=1400 audit(441.410:1170): avc: denied { create } for pid=5374 comm="syz.1.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 441.499088][ T29] audit: type=1400 audit(441.410:1171): avc: denied { allowed } for pid=5374 comm="syz.1.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 441.518482][ T29] audit: type=1400 audit(441.440:1172): avc: denied { execute } for pid=5374 comm="syz.1.486" path="/268/pids.events" dev="tmpfs" ino=1371 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 441.561832][ T29] audit: type=1400 audit(441.480:1173): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 450.238178][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 450.239176][ T29] audit: type=1400 audit(450.150:1190): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 450.319679][ T29] audit: type=1400 audit(450.240:1191): avc: denied { create } for pid=5396 comm="syz.0.495" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 450.363388][ T29] audit: type=1400 audit(450.280:1192): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 450.437605][ T5399] netlink: 12 bytes leftover after parsing attributes in process `syz.0.496'. [ 450.525965][ T5399] 8021q: adding VLAN 0 to HW filter on device bond1 [ 450.592786][ T5399] vlan2: entered allmulticast mode [ 450.593150][ T5399] bond1: entered allmulticast mode [ 450.725534][ T29] audit: type=1400 audit(450.640:1193): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 450.864024][ T29] audit: type=1400 audit(450.780:1194): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 451.008472][ T29] audit: type=1400 audit(450.930:1195): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 451.089411][ T29] audit: type=1400 audit(451.010:1196): avc: denied { watch watch_reads } for pid=5474 comm="syz.0.499" path="/223" dev="tmpfs" ino=1146 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 451.098430][ T29] audit: type=1400 audit(451.020:1197): avc: denied { watch } for pid=5474 comm="syz.0.499" path="/223" dev="tmpfs" ino=1146 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 451.136315][ T29] audit: type=1400 audit(451.050:1198): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 451.257955][ T29] audit: type=1400 audit(451.170:1199): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 456.174287][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 456.191258][ T29] audit: type=1400 audit(456.090:1224): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 456.351364][ T29] audit: type=1400 audit(456.270:1225): avc: denied { read write } for pid=5496 comm="syz.1.509" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 456.427415][ T29] audit: type=1400 audit(456.340:1226): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 456.575853][ T29] audit: type=1400 audit(456.490:1227): avc: denied { create } for pid=5498 comm="syz.1.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 456.593338][ T29] audit: type=1400 audit(456.510:1228): avc: denied { create } for pid=5498 comm="syz.1.510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 456.799932][ T29] audit: type=1400 audit(456.710:1229): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 464.491187][ T29] audit: type=1400 audit(464.410:1230): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 464.543533][ T29] audit: type=1400 audit(464.460:1231): avc: denied { create } for pid=5504 comm="syz.1.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 464.570099][ T29] audit: type=1400 audit(464.490:1232): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 464.634266][ T29] audit: type=1400 audit(464.550:1233): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 464.733454][ T29] audit: type=1400 audit(464.650:1234): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 464.888246][ T29] audit: type=1400 audit(464.800:1235): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 465.009105][ T29] audit: type=1400 audit(464.930:1236): avc: denied { read } for pid=5512 comm="syz.1.516" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 465.019523][ T29] audit: type=1400 audit(464.940:1237): avc: denied { module_request } for pid=5512 comm="syz.1.516" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 465.019940][ T29] audit: type=1400 audit(464.940:1238): avc: denied { sys_module } for pid=5512 comm="syz.1.516" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 465.021887][ T29] audit: type=1400 audit(464.940:1239): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 469.576167][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 469.578036][ T29] audit: type=1400 audit(469.490:1278): avc: denied { execmem } for pid=5557 comm="syz.1.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 469.926005][ T29] audit: type=1400 audit(469.840:1279): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 470.259068][ T29] audit: type=1400 audit(470.180:1280): avc: denied { prog_load } for pid=5557 comm="syz.1.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 470.378090][ T29] audit: type=1400 audit(470.250:1281): avc: denied { create } for pid=5559 comm="syz.0.538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 470.521844][ T29] audit: type=1400 audit(470.440:1282): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 471.270977][ T29] audit: type=1400 audit(471.190:1283): avc: denied { read write } for pid=5562 comm="syz.0.539" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 471.293861][ T29] audit: type=1400 audit(471.210:1284): avc: denied { mounton } for pid=5562 comm="syz.0.539" path="/250/file0" dev="tmpfs" ino=1288 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 473.266580][ T29] audit: type=1400 audit(473.180:1285): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 473.500734][ T29] audit: type=1400 audit(473.420:1286): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 473.670638][ T29] audit: type=1400 audit(473.590:1287): avc: denied { name_bind } for pid=5568 comm="syz.0.541" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 473.943963][ T5577] netlink: 4 bytes leftover after parsing attributes in process `syz.0.545'. [ 473.984173][ T5577] macvtap1: entered promiscuous mode [ 473.984673][ T5577] gretap0: entered promiscuous mode [ 473.985468][ T5577] macvtap1: entered allmulticast mode [ 473.985526][ T5577] gretap0: entered allmulticast mode [ 474.778869][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 474.779985][ T29] audit: type=1400 audit(474.690:1305): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 474.878961][ T29] audit: type=1400 audit(474.800:1306): avc: denied { create } for pid=5588 comm="syz.0.550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=0 [ 474.932246][ T29] audit: type=1400 audit(474.850:1307): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 475.020219][ T29] audit: type=1400 audit(474.940:1308): avc: denied { create } for pid=5590 comm="syz.0.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 475.055749][ T29] audit: type=1400 audit(474.970:1309): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 475.124816][ T29] audit: type=1400 audit(475.040:1310): avc: denied { create } for pid=5592 comm="syz.0.552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 475.161268][ T29] audit: type=1400 audit(475.080:1311): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 475.223434][ T29] audit: type=1400 audit(475.140:1312): avc: denied { execmem } for pid=5594 comm="syz.0.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 475.758648][ T29] audit: type=1400 audit(475.680:1313): avc: denied { create } for pid=5594 comm="syz.0.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 480.362297][ T29] audit: type=1400 audit(480.280:1314): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 480.421612][ T29] audit: type=1400 audit(480.340:1315): avc: denied { read } for pid=5597 comm="syz.1.554" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 482.026554][ T29] audit: type=1400 audit(481.940:1316): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 482.137601][ T29] audit: type=1400 audit(482.050:1317): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 482.216248][ T29] audit: type=1400 audit(482.130:1318): avc: denied { read write } for pid=5604 comm="syz.1.556" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 482.251739][ T29] audit: type=1400 audit(482.170:1319): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 482.339487][ T29] audit: type=1400 audit(482.260:1320): avc: denied { create } for pid=5606 comm="syz.1.557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 482.389549][ T29] audit: type=1400 audit(482.310:1321): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 482.492988][ T29] audit: type=1400 audit(482.410:1322): avc: denied { write } for pid=5608 comm="syz.1.558" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 482.512512][ T29] audit: type=1400 audit(482.430:1323): avc: denied { module_request } for pid=5608 comm="syz.1.558" kmod="netdev-syzkaller1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 486.769069][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 486.773280][ T29] audit: type=1400 audit(486.690:1357): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 486.804344][ T29] audit: type=1400 audit(486.720:1358): avc: denied { read write } for pid=5639 comm="syz.0.573" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 486.852441][ T29] audit: type=1400 audit(486.770:1359): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 486.940042][ T29] audit: type=1400 audit(486.860:1360): avc: denied { execmem } for pid=5641 comm="syz.0.574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 487.475457][ T29] audit: type=1400 audit(487.390:1361): avc: denied { mounton } for pid=5641 comm="syz.0.574" path="/269/file0" dev="tmpfs" ino=1385 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 487.480871][ T29] audit: type=1400 audit(487.400:1362): avc: denied { remount } for pid=5641 comm="syz.0.574" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 491.377824][ T29] audit: type=1400 audit(491.300:1363): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 491.472017][ T29] audit: type=1400 audit(491.390:1364): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 491.517075][ T29] audit: type=1400 audit(491.420:1365): avc: denied { prog_load } for pid=5646 comm="syz.1.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 491.576698][ T29] audit: type=1400 audit(491.490:1366): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 491.780799][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 491.787690][ T29] audit: type=1400 audit(491.700:1369): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 491.870327][ T29] audit: type=1400 audit(491.790:1370): avc: denied { create } for pid=5652 comm="syz.1.579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 491.909699][ T29] audit: type=1400 audit(491.830:1371): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 491.976689][ T29] audit: type=1400 audit(491.890:1372): avc: denied { read } for pid=5654 comm="syz.1.580" dev="nsfs" ino=4026532745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 492.023764][ T29] audit: type=1400 audit(491.940:1373): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 492.118890][ T5657] trusted_key: encrypted_key: keyword 'update' not allowed when called from .instantiate method [ 492.156732][ T29] audit: type=1400 audit(492.070:1374): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 492.243008][ T29] audit: type=1400 audit(492.160:1375): avc: denied { read write } for pid=5658 comm="syz.1.582" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 492.259584][ T29] audit: type=1400 audit(492.180:1376): avc: denied { mounton } for pid=5658 comm="syz.1.582" path="/311/file0" dev="tmpfs" ino=1594 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 492.273195][ T29] audit: type=1400 audit(492.190:1377): avc: denied { execute } for pid=5658 comm="syz.1.582" name="file0" dev="tmpfs" ino=1594 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 492.304059][ T29] audit: type=1400 audit(492.220:1378): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 496.792712][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 496.797773][ T29] audit: type=1400 audit(496.710:1410): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 496.913216][ T29] audit: type=1400 audit(496.830:1411): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 496.988793][ T29] audit: type=1400 audit(496.900:1412): avc: denied { read } for pid=5687 comm="syz.0.596" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 497.024288][ T29] audit: type=1400 audit(496.940:1413): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 497.120697][ T29] audit: type=1400 audit(497.040:1414): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 497.214626][ T29] audit: type=1400 audit(497.130:1415): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 497.320761][ T29] audit: type=1400 audit(497.240:1416): avc: denied { create } for pid=5693 comm="syz.0.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 497.360725][ T29] audit: type=1400 audit(497.280:1417): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 497.444529][ T5696] netlink: 8 bytes leftover after parsing attributes in process `syz.0.600'. [ 497.472089][ T29] audit: type=1400 audit(497.390:1418): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 497.550046][ T29] audit: type=1400 audit(497.460:1419): avc: denied { execmem } for pid=5697 comm="syz.0.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 497.562646][ T5698] capability: warning: `syz.0.601' uses deprecated v2 capabilities in a way that may be insecure [ 501.604559][ T5706] ptrace attach of "/syz-executor exec"[3096] was attempted by " [ 501.909254][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 501.914868][ T29] audit: type=1400 audit(501.830:1428): avc: denied { create } for pid=5709 comm="syz.1.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 502.162460][ T29] audit: type=1400 audit(502.080:1429): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 502.397466][ T29] audit: type=1400 audit(502.310:1430): avc: denied { read write } for pid=5711 comm="syz.1.607" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 502.588252][ T29] audit: type=1400 audit(502.460:1431): avc: denied { execmem } for pid=5711 comm="syz.1.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 503.139706][ T29] audit: type=1400 audit(503.060:1432): avc: denied { create } for pid=5711 comm="syz.1.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 510.027541][ T29] audit: type=1400 audit(509.940:1433): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 510.093409][ T29] audit: type=1400 audit(510.010:1434): avc: denied { read } for pid=5714 comm="syz.0.608" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 510.112180][ T29] audit: type=1400 audit(510.030:1435): avc: denied { prog_load } for pid=5714 comm="syz.0.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 510.124498][ T29] audit: type=1400 audit(510.040:1436): avc: denied { execmem } for pid=5714 comm="syz.0.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 510.543009][ T29] audit: type=1400 audit(510.460:1437): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 510.626080][ T29] audit: type=1400 audit(510.540:1438): avc: denied { read write } for pid=5716 comm="syz.0.609" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 510.658569][ T29] audit: type=1400 audit(510.570:1439): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 510.786559][ T29] audit: type=1400 audit(510.700:1440): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 510.910050][ T29] audit: type=1400 audit(510.830:1441): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 510.971650][ T29] audit: type=1400 audit(510.890:1442): avc: denied { create } for pid=5724 comm="syz.0.612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 519.751917][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 519.754228][ T29] audit: type=1400 audit(519.670:1472): avc: denied { write } for pid=5755 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 519.781112][ T29] audit: type=1400 audit(519.700:1473): avc: denied { search } for pid=5755 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 519.824088][ T29] audit: type=1400 audit(519.740:1474): avc: denied { search } for pid=5756 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 519.834225][ T29] audit: type=1400 audit(519.750:1475): avc: denied { search } for pid=5756 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 519.841128][ T29] audit: type=1400 audit(519.760:1476): avc: denied { search } for pid=5756 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 519.845341][ T29] audit: type=1400 audit(519.760:1477): avc: denied { search } for pid=5756 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 519.852330][ T29] audit: type=1400 audit(519.770:1478): avc: denied { search } for pid=5756 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 519.856619][ T29] audit: type=1400 audit(519.770:1479): avc: denied { search } for pid=5756 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 519.874045][ T29] audit: type=1400 audit(519.790:1480): avc: denied { search } for pid=5756 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 519.888319][ T29] audit: type=1400 audit(519.790:1481): avc: denied { search } for pid=5756 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 524.765007][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 524.778044][ T29] audit: type=1400 audit(524.680:1522): avc: denied { read write } for pid=5774 comm="syz.1.631" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 524.798046][ T29] audit: type=1400 audit(524.720:1523): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 524.871209][ T29] audit: type=1400 audit(524.790:1524): avc: denied { create } for pid=5776 comm="syz.1.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 524.920883][ T29] audit: type=1400 audit(524.840:1525): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 525.016776][ T29] audit: type=1400 audit(524.930:1526): avc: denied { read write } for pid=5778 comm="syz.1.633" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 525.036119][ T29] audit: type=1400 audit(524.950:1527): avc: denied { execmem } for pid=5778 comm="syz.1.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 525.054868][ T29] audit: type=1400 audit(524.970:1528): avc: denied { create } for pid=5778 comm="syz.1.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 525.096799][ T29] audit: type=1400 audit(525.010:1529): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 525.235870][ T29] audit: type=1400 audit(525.150:1530): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 525.304415][ T29] audit: type=1400 audit(525.220:1531): avc: denied { allowed } for pid=5782 comm="syz.1.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 529.895530][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 529.898105][ T29] audit: type=1400 audit(529.810:1570): avc: denied { read write } for pid=5805 comm="syz.1.646" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 529.947680][ T29] audit: type=1400 audit(529.860:1571): avc: denied { create } for pid=5805 comm="syz.1.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 529.950981][ T29] audit: type=1400 audit(529.870:1572): avc: denied { create } for pid=5805 comm="syz.1.646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 530.053210][ T29] audit: type=1400 audit(529.970:1573): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 530.309490][ T29] audit: type=1400 audit(530.230:1574): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 530.459017][ T29] audit: type=1400 audit(530.380:1575): avc: denied { execmem } for pid=5809 comm="syz.1.648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 532.517857][ T29] audit: type=1400 audit(532.410:1576): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 532.621869][ T29] audit: type=1400 audit(532.540:1577): avc: denied { create } for pid=5812 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 532.634402][ T29] audit: type=1400 audit(532.550:1578): avc: denied { create } for pid=5812 comm="syz.1.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 532.704162][ T29] audit: type=1400 audit(532.620:1579): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 535.568924][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 535.570133][ T29] audit: type=1400 audit(535.490:1584): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 535.680908][ T29] audit: type=1400 audit(535.600:1585): avc: denied { read write } for pid=5819 comm="syz.1.652" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 535.686502][ T29] audit: type=1400 audit(535.600:1586): avc: denied { allowed } for pid=5819 comm="syz.1.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 535.695205][ T29] audit: type=1400 audit(535.610:1587): avc: denied { allowed } for pid=5819 comm="syz.1.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 535.702494][ T29] audit: type=1400 audit(535.620:1588): avc: denied { create } for pid=5819 comm="syz.1.652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 535.977917][ T29] audit: type=1400 audit(535.890:1589): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 536.471891][ T29] audit: type=1400 audit(536.390:1590): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 536.666588][ T29] audit: type=1400 audit(536.580:1591): avc: denied { read } for pid=5824 comm="syz.0.654" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 536.692362][ T29] audit: type=1400 audit(536.600:1592): avc: denied { create } for pid=5824 comm="syz.0.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 536.736401][ T29] audit: type=1400 audit(536.650:1593): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 545.048101][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 545.049184][ T29] audit: type=1400 audit(544.960:1606): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 545.085607][ T29] audit: type=1400 audit(545.000:1607): avc: denied { create } for pid=5836 comm="syz.1.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 545.157741][ T29] audit: type=1400 audit(545.070:1608): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 545.231228][ T29] audit: type=1400 audit(545.150:1609): avc: denied { write } for pid=5838 comm="syz.1.660" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 545.267930][ T29] audit: type=1400 audit(545.190:1610): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 545.374969][ T29] audit: type=1400 audit(545.290:1611): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 545.450539][ T29] audit: type=1400 audit(545.370:1612): avc: denied { create } for pid=5842 comm="syz.1.662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 545.494305][ T29] audit: type=1400 audit(545.410:1613): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 545.589050][ T29] audit: type=1400 audit(545.510:1614): avc: denied { allowed } for pid=5844 comm="syz.1.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 545.594862][ T29] audit: type=1400 audit(545.510:1615): avc: denied { map_create } for pid=5844 comm="syz.1.663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 551.368300][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 551.369796][ T29] audit: type=1400 audit(551.280:1628): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 551.459602][ T29] audit: type=1400 audit(551.370:1629): avc: denied { execmem } for pid=5862 comm="syz.1.670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 552.528214][ T29] audit: type=1400 audit(552.450:1630): avc: denied { mounton } for pid=5862 comm="syz.1.670" path="/363" dev="tmpfs" ino=1852 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 555.807561][ T29] audit: type=1400 audit(555.720:1631): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 555.869951][ T29] audit: type=1400 audit(555.790:1632): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 555.914107][ T29] audit: type=1400 audit(555.830:1633): avc: denied { execmem } for pid=5868 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 556.431214][ T29] audit: type=1400 audit(556.350:1634): avc: denied { prog_load } for pid=5868 comm="syz.0.672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 558.899262][ T29] audit: type=1400 audit(558.820:1635): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 558.996211][ T29] audit: type=1400 audit(558.910:1636): avc: denied { mounton } for pid=5871 comm="syz.1.673" path="/364/file0" dev="tmpfs" ino=1862 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 559.010789][ T29] audit: type=1400 audit(558.920:1637): avc: denied { mounton } for pid=5871 comm="syz.1.673" path="/364/file0" dev="tmpfs" ino=1862 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 559.016166][ T29] audit: type=1400 audit(558.930:1638): avc: denied { mounton } for pid=5871 comm="syz.1.673" path="/364/file0" dev="tmpfs" ino=1862 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 559.033557][ T29] audit: type=1400 audit(558.950:1639): avc: denied { mounton } for pid=5871 comm="syz.1.673" path="/364/file0" dev="tmpfs" ino=1862 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 559.041863][ T29] audit: type=1400 audit(558.960:1640): avc: denied { mounton } for pid=5871 comm="syz.1.673" path="/364/file0" dev="tmpfs" ino=1862 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 559.108919][ T29] audit: type=1400 audit(559.020:1641): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 559.184419][ T29] audit: type=1400 audit(559.100:1642): avc: denied { map_create } for pid=5873 comm="syz.1.674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 559.241454][ T29] audit: type=1400 audit(559.160:1643): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 562.935170][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 562.939544][ T29] audit: type=1400 audit(562.850:1664): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 563.033360][ T29] audit: type=1400 audit(562.950:1665): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 563.091573][ T29] audit: type=1400 audit(563.010:1666): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 563.103844][ T29] audit: type=1400 audit(563.020:1667): avc: denied { map_create } for pid=5900 comm="syz.0.687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 563.106739][ T29] audit: type=1400 audit(563.020:1668): avc: denied { prog_load } for pid=5900 comm="syz.0.687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 563.142523][ T29] audit: type=1400 audit(563.060:1669): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 563.202904][ T29] audit: type=1400 audit(563.110:1670): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 563.243735][ T29] audit: type=1400 audit(563.160:1671): avc: denied { prog_load } for pid=5904 comm="syz.0.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 563.253492][ T29] audit: type=1400 audit(563.170:1672): avc: denied { create } for pid=5904 comm="syz.0.689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 563.256547][ T29] audit: type=1400 audit(563.170:1673): avc: denied { map_create } for pid=5905 comm="syz.1.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 568.146597][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 568.149048][ T29] audit: type=1400 audit(568.060:1710): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 568.212153][ T29] audit: type=1400 audit(568.130:1711): avc: denied { create } for pid=5941 comm="syz.1.706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 568.229064][ T29] audit: type=1400 audit(568.150:1712): avc: denied { read } for pid=5941 comm="syz.1.706" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 568.241551][ T29] audit: type=1400 audit(568.160:1713): avc: denied { read write } for pid=5941 comm="syz.1.706" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 568.247802][ T29] audit: type=1400 audit(568.160:1714): avc: denied { read write } for pid=5941 comm="syz.1.706" name="midiC2D0" dev="devtmpfs" ino=738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 568.253928][ T29] audit: type=1400 audit(568.170:1715): avc: denied { create } for pid=5941 comm="syz.1.706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 568.291112][ T29] audit: type=1400 audit(568.210:1716): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 568.355475][ T29] audit: type=1400 audit(568.270:1717): avc: denied { read write } for pid=5943 comm="syz.1.707" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 568.368493][ T29] audit: type=1400 audit(568.290:1718): avc: denied { execmem } for pid=5943 comm="syz.1.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 568.382397][ T29] audit: type=1400 audit(568.300:1719): avc: denied { create } for pid=5943 comm="syz.1.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 573.581969][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 573.582534][ T29] audit: type=1400 audit(573.500:1758): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 573.851918][ T29] audit: type=1400 audit(573.760:1759): avc: denied { write } for pid=5972 comm="syz.0.721" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 573.870049][ T29] audit: type=1400 audit(573.790:1760): avc: denied { execmem } for pid=5972 comm="syz.0.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 573.881825][ T29] audit: type=1400 audit(573.800:1761): avc: denied { execmem } for pid=5972 comm="syz.0.721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 573.949714][ T29] audit: type=1400 audit(573.870:1762): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 574.135171][ T29] audit: type=1400 audit(574.050:1763): avc: denied { read write } for pid=5974 comm="syz.0.722" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 574.187699][ T29] audit: type=1400 audit(574.100:1764): avc: denied { execmem } for pid=5974 comm="syz.0.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 574.224737][ T29] audit: type=1400 audit(574.140:1765): avc: denied { create } for pid=5974 comm="syz.0.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 574.285393][ T29] audit: type=1400 audit(574.200:1766): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 574.574317][ T29] audit: type=1400 audit(574.490:1767): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 580.906526][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 580.908131][ T29] audit: type=1400 audit(580.820:1773): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 580.959271][ T29] audit: type=1400 audit(580.880:1774): avc: denied { read write } for pid=5985 comm="syz.1.727" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 580.987340][ T29] audit: type=1400 audit(580.900:1775): avc: denied { execmem } for pid=5985 comm="syz.1.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 581.006081][ T29] audit: type=1400 audit(580.920:1776): avc: denied { create } for pid=5985 comm="syz.1.727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 581.068332][ T29] audit: type=1400 audit(580.980:1777): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 581.198491][ T29] audit: type=1400 audit(581.120:1778): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 581.342488][ T29] audit: type=1400 audit(581.260:1779): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 581.424668][ T29] audit: type=1400 audit(581.340:1780): avc: denied { create } for pid=5991 comm="syz.1.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 581.451362][ T29] audit: type=1400 audit(581.370:1781): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 581.522905][ T29] audit: type=1400 audit(581.440:1782): avc: denied { allowed } for pid=5993 comm="syz.1.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 582.449476][ T6011] ALSA: mixer_oss: invalid OSS volume '' [ 586.827415][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 586.829261][ T29] audit: type=1400 audit(586.740:1824): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 587.131691][ T29] audit: type=1400 audit(587.050:1825): avc: denied { read write } for pid=6029 comm="syz.0.747" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 587.132139][ T29] audit: type=1400 audit(587.050:1826): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 587.191759][ T29] audit: type=1400 audit(587.110:1827): avc: denied { execmem } for pid=6029 comm="syz.0.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 587.222078][ T29] audit: type=1400 audit(587.140:1828): avc: denied { create } for pid=6029 comm="syz.0.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 587.302107][ T29] audit: type=1400 audit(587.220:1829): avc: denied { create } for pid=6031 comm="syz.1.748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 587.379744][ T29] audit: type=1400 audit(587.300:1830): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 587.483196][ T29] audit: type=1400 audit(587.400:1831): avc: denied { create } for pid=6033 comm="syz.0.749" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 587.568870][ T29] audit: type=1400 audit(587.490:1832): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 587.732103][ T29] audit: type=1400 audit(587.650:1833): avc: denied { module_request } for pid=6035 comm="syz.0.750" kmod="net-pf-16-proto-4-type-2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 595.962749][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 595.964683][ T29] audit: type=1400 audit(595.880:1851): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 596.024683][ T29] audit: type=1400 audit(595.940:1852): avc: denied { read write } for pid=6053 comm="syz.1.757" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 596.033397][ T29] audit: type=1400 audit(595.950:1853): avc: denied { create } for pid=6053 comm="syz.1.757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 596.063730][ T29] audit: type=1400 audit(595.980:1854): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 596.127562][ T29] audit: type=1400 audit(596.030:1855): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 596.163750][ T29] audit: type=1400 audit(596.080:1856): avc: denied { read write } for pid=6057 comm="syz.1.759" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 596.176310][ T29] audit: type=1400 audit(596.090:1857): avc: denied { execmem } for pid=6057 comm="syz.1.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 596.692931][ T29] audit: type=1400 audit(596.610:1858): avc: denied { create } for pid=6057 comm="syz.1.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 597.650673][ T29] audit: type=1400 audit(597.570:1859): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 597.729055][ T29] audit: type=1400 audit(597.650:1860): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 601.502408][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 601.504875][ T29] audit: type=1400 audit(601.420:1879): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 601.578859][ T29] audit: type=1400 audit(601.500:1880): avc: denied { create } for pid=6082 comm="syz.1.770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 601.615559][ T29] audit: type=1400 audit(601.530:1881): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 601.689072][ T29] audit: type=1400 audit(601.610:1882): avc: denied { read } for pid=6084 comm="syz.1.771" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 601.723441][ T29] audit: type=1400 audit(601.640:1883): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 601.804654][ T29] audit: type=1400 audit(601.720:1884): avc: denied { read write } for pid=6086 comm="syz.1.772" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 601.833445][ T29] audit: type=1400 audit(601.750:1885): avc: denied { execmem } for pid=6086 comm="syz.1.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 602.349810][ T29] audit: type=1400 audit(602.270:1886): avc: denied { create } for pid=6086 comm="syz.1.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 604.319350][ T29] audit: type=1400 audit(604.230:1887): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 604.407846][ T29] audit: type=1400 audit(604.320:1888): avc: denied { create } for pid=6089 comm="syz.1.773" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 606.565821][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 606.567977][ T29] audit: type=1400 audit(606.480:1907): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 606.787636][ T29] audit: type=1400 audit(606.680:1908): avc: denied { read write } for pid=6108 comm="syz.1.782" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 606.795282][ T29] audit: type=1400 audit(606.710:1909): avc: denied { execmem } for pid=6108 comm="syz.1.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 606.808248][ T29] audit: type=1400 audit(606.730:1910): avc: denied { create } for pid=6108 comm="syz.1.782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 606.929694][ T29] audit: type=1400 audit(606.850:1911): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 607.326041][ T29] audit: type=1400 audit(607.240:1912): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 607.686713][ T29] audit: type=1400 audit(607.600:1913): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 607.912494][ T29] audit: type=1400 audit(607.830:1914): avc: denied { create } for pid=6114 comm="syz.1.785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 607.991646][ T29] audit: type=1400 audit(607.910:1915): avc: denied { create } for pid=6114 comm="syz.1.785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 608.002882][ T29] audit: type=1400 audit(607.910:1916): avc: denied { create } for pid=6114 comm="syz.1.785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 617.925436][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 617.927582][ T29] audit: type=1400 audit(617.840:1933): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 618.005918][ T29] audit: type=1400 audit(617.920:1934): avc: denied { map_create } for pid=6132 comm="syz.1.792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 618.041551][ T29] audit: type=1400 audit(617.960:1935): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 618.114060][ T29] audit: type=1400 audit(618.030:1936): avc: denied { read write } for pid=6134 comm="syz.1.793" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 618.145406][ T29] audit: type=1400 audit(618.060:1937): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 618.187931][ T29] audit: type=1400 audit(618.100:1938): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 618.223413][ T29] audit: type=1400 audit(618.140:1939): avc: denied { map_create } for pid=6136 comm="syz.1.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 618.261481][ T29] audit: type=1400 audit(618.180:1940): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 618.294475][ T29] audit: type=1400 audit(618.210:1941): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 618.348729][ T29] audit: type=1400 audit(618.270:1942): avc: denied { read write } for pid=6140 comm="syz.1.796" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 618.392758][ T6143] ip6tnl1: entered promiscuous mode [ 618.482473][ T6149] netlink: 28 bytes leftover after parsing attributes in process `syz.1.798'. [ 618.505311][ T6148] netlink: 8 bytes leftover after parsing attributes in process `syz.0.799'. [ 623.971407][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 623.975524][ T29] audit: type=1400 audit(623.890:1972): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 624.087915][ T29] audit: type=1400 audit(624.000:1973): avc: denied { create } for pid=6178 comm="syz.1.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 624.112118][ T29] audit: type=1400 audit(624.030:1974): avc: denied { create } for pid=6178 comm="syz.1.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 624.168046][ T29] audit: type=1400 audit(624.080:1975): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 624.322378][ T29] audit: type=1400 audit(624.240:1976): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 624.407352][ T29] audit: type=1400 audit(624.320:1977): avc: denied { execmem } for pid=6182 comm="syz.1.814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 624.998842][ T29] audit: type=1400 audit(624.920:1978): avc: denied { create } for pid=6182 comm="syz.1.814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 635.121441][ T29] audit: type=1400 audit(635.040:1979): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 635.212600][ T29] audit: type=1400 audit(635.130:1980): avc: denied { create } for pid=6185 comm="syz.0.815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 635.239308][ T29] audit: type=1400 audit(635.160:1981): avc: denied { read write } for pid=6185 comm="syz.0.815" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 635.273187][ T29] audit: type=1400 audit(635.190:1982): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 635.388036][ T29] audit: type=1400 audit(635.310:1983): avc: denied { create } for pid=6187 comm="syz.0.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 635.431622][ T29] audit: type=1400 audit(635.350:1984): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 635.527982][ T29] audit: type=1400 audit(635.440:1985): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 635.577660][ T29] audit: type=1400 audit(635.490:1986): avc: denied { create } for pid=6191 comm="syz.0.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 635.611609][ T29] audit: type=1400 audit(635.530:1987): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 635.693131][ T29] audit: type=1400 audit(635.610:1988): avc: denied { read write } for pid=3095 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 640.326065][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 640.337902][ T29] audit: type=1400 audit(640.240:2004): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 640.457201][ T29] audit: type=1400 audit(640.370:2005): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 640.532699][ T29] audit: type=1400 audit(640.450:2006): avc: denied { create } for pid=6216 comm="syz.1.828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 640.569358][ T29] audit: type=1400 audit(640.490:2007): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 640.857339][ T29] audit: type=1400 audit(640.770:2008): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 640.960097][ T29] audit: type=1400 audit(640.880:2009): avc: denied { read } for pid=6220 comm="syz.1.830" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 640.984130][ T29] audit: type=1400 audit(640.900:2010): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 641.016458][ T29] audit: type=1400 audit(640.930:2011): avc: denied { create } for pid=6222 comm="syz.1.831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 641.047641][ T29] audit: type=1400 audit(640.960:2012): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 641.080200][ T29] audit: type=1400 audit(641.000:2013): avc: denied { read write } for pid=6224 comm="syz.1.832" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 646.040172][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 646.040863][ T29] audit: type=1400 audit(645.960:2073): avc: denied { unlink } for pid=3095 comm="syz-executor" name="file0" dev="tmpfs" ino=1789 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=0 [ 646.668933][ T29] audit: type=1400 audit(646.570:2074): avc: denied { execute } for pid=6285 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=0 [ 646.671576][ T29] audit: type=1400 audit(646.580:2075): avc: denied { write } for pid=3090 comm="syz-executor" path="pipe:[1613]" dev="pipefs" ino=1613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 646.671911][ T29] audit: type=1400 audit(646.580:2076): avc: denied { write } for pid=3090 comm="syz-executor" path="pipe:[1613]" dev="pipefs" ino=1613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0