last executing test programs: 4.069890467s ago: executing program 0 (id=3752): openat$sw_sync_info(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='user.syz\x00', 0x0, 0x0, 0x0) 3.900922728s ago: executing program 0 (id=3754): bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=@buf="f35ce99e9546070ff1685fe464a4b87db974806078eb149fd6f3b78f1e757519af3f701ab2fb092efe06513f58e38bdf47a5738705d49e1acc4680955f2a00d3e04e53e9f30aee294d0220799db734f6e9"}, 0x20) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r0, 0xc0189436, &(0x7f0000000080)) 3.738319279s ago: executing program 0 (id=3749): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000000080)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x4091}, 0x20000010) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x800) 3.738202449s ago: executing program 1 (id=3751): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x5421, &(0x7f0000000380)) 3.546414784s ago: executing program 1 (id=3753): r0 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) 926.564971ms ago: executing program 0 (id=3755): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)={0x14, 0x0, 0x10, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x24000801}, 0x4000) 900.686924ms ago: executing program 1 (id=3756): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0x5452, &(0x7f00000020c0)={0x0, 0x38, 0x0, 0x0, 0xffffffffffffffff}) write$P9_RRENAMEAT(r1, 0x0, 0x0) 570.790146ms ago: executing program 0 (id=3757): ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000000c00)={0x14, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb}, 0x14}}, 0x0) 545.30675ms ago: executing program 1 (id=3758): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = dup2(r0, r0) write$FUSE_IOCTL(r1, 0x0, 0x0) 335.681137ms ago: executing program 1 (id=3759): mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x5451, 0x0) 205.518713ms ago: executing program 0 (id=3760): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000000080)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x4091}, 0x20000010) sendmsg$NFT_MSG_GETSET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x800) 0s ago: executing program 1 (id=3761): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) syz_open_procfs(0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0x5450, 0x0) kernel console output (not intermixed with test programs): 404.470:7513): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 404.560355][ T29] audit: type=1400 audit(404.470:7514): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 407.311581][ T8957] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8957 comm=syz.0.2571 [ 409.284952][ T29] kauditd_printk_skb: 136 callbacks suppressed [ 409.287634][ T29] audit: type=1400 audit(409.200:7651): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.293050][ T29] audit: type=1400 audit(409.210:7652): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.323962][ T29] audit: type=1400 audit(409.240:7653): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.451485][ T29] audit: type=1400 audit(409.370:7654): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.460625][ T29] audit: type=1400 audit(409.380:7655): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.480521][ T29] audit: type=1400 audit(409.400:7656): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.608295][ T29] audit: type=1400 audit(409.530:7657): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.612777][ T29] audit: type=1400 audit(409.530:7658): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.621742][ T29] audit: type=1400 audit(409.540:7659): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 409.792624][ T29] audit: type=1400 audit(409.710:7660): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 414.409478][ T29] kauditd_printk_skb: 116 callbacks suppressed [ 414.411217][ T29] audit: type=1400 audit(414.330:7777): avc: denied { read write } for pid=9040 comm="syz.0.2612" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 414.416384][ T29] audit: type=1400 audit(414.330:7778): avc: denied { read write open } for pid=9040 comm="syz.0.2612" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 414.562441][ T29] audit: type=1400 audit(414.480:7779): avc: denied { setattr } for pid=9040 comm="syz.0.2612" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 414.657960][ T29] audit: type=1400 audit(414.570:7780): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 414.684826][ T29] audit: type=1400 audit(414.600:7781): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 414.717411][ T29] audit: type=1400 audit(414.620:7782): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 414.723625][ T29] audit: type=1400 audit(414.640:7783): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 414.725891][ T29] audit: type=1400 audit(414.640:7784): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 414.732187][ T29] audit: type=1400 audit(414.650:7785): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 415.381529][ T29] audit: type=1400 audit(415.300:7786): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 419.667802][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 419.668383][ T29] audit: type=1400 audit(419.590:7835): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 419.671145][ T29] audit: type=1400 audit(419.590:7836): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 419.675688][ T29] audit: type=1400 audit(419.590:7837): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 419.829950][ T29] audit: type=1400 audit(419.750:7838): avc: denied { read } for pid=9068 comm="syz.1.2625" dev="nsfs" ino=4026532686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 419.849026][ T29] audit: type=1400 audit(419.770:7839): avc: denied { read open } for pid=9068 comm="syz.1.2625" path="net:[4026532686]" dev="nsfs" ino=4026532686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 419.853827][ T29] audit: type=1400 audit(419.770:7840): avc: denied { create } for pid=9068 comm="syz.1.2625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 419.917487][ T29] audit: type=1400 audit(419.840:7841): avc: denied { write } for pid=9068 comm="syz.1.2625" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 420.064678][ T29] audit: type=1400 audit(419.980:7842): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 420.066311][ T29] audit: type=1400 audit(419.980:7843): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 420.069988][ T29] audit: type=1400 audit(419.990:7844): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 424.608729][ T9101] SELinux: syz.1.2640 (9101) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 425.988892][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 425.995540][ T29] audit: type=1400 audit(425.910:7903): avc: denied { node_bind } for pid=9103 comm="syz.0.2642" saddr=fe88::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 426.205504][ T29] audit: type=1400 audit(426.120:7904): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 426.217444][ T29] audit: type=1400 audit(426.130:7905): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 426.224809][ T29] audit: type=1400 audit(426.140:7906): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 426.872054][ T29] audit: type=1400 audit(426.790:7907): avc: denied { read } for pid=9105 comm="syz.0.2643" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 426.883338][ T29] audit: type=1400 audit(426.790:7908): avc: denied { read open } for pid=9105 comm="syz.0.2643" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 426.883879][ T29] audit: type=1400 audit(426.800:7909): avc: denied { create } for pid=9105 comm="syz.0.2643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 426.903376][ T29] audit: type=1400 audit(426.820:7910): avc: denied { write } for pid=9105 comm="syz.0.2643" path="socket:[19438]" dev="sockfs" ino=19438 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 426.906690][ T29] audit: type=1400 audit(426.820:7911): avc: denied { write } for pid=9105 comm="syz.0.2643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 426.973142][ T29] audit: type=1400 audit(426.890:7912): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 431.153759][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 431.154951][ T29] audit: type=1400 audit(431.070:7964): avc: denied { read } for pid=9132 comm="syz.0.2656" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 431.162611][ T29] audit: type=1400 audit(431.080:7965): avc: denied { read open } for pid=9132 comm="syz.0.2656" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 431.184824][ T29] audit: type=1400 audit(431.100:7966): avc: denied { ioctl } for pid=9132 comm="syz.0.2656" path="/dev/loop-control" dev="devtmpfs" ino=633 ioctlcmd=0x89f9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 431.263005][ T29] audit: type=1400 audit(431.180:7967): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 431.266148][ T29] audit: type=1400 audit(431.180:7968): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 431.290782][ T29] audit: type=1400 audit(431.200:7969): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 431.800358][ T29] audit: type=1400 audit(431.710:7970): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 431.800692][ T29] audit: type=1400 audit(431.720:7971): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 431.813047][ T29] audit: type=1400 audit(431.730:7972): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 431.908054][ T29] audit: type=1400 audit(431.810:7973): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 434.950403][ T9173] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9173 comm=syz.1.2674 [ 436.250876][ T29] kauditd_printk_skb: 85 callbacks suppressed [ 436.254205][ T29] audit: type=1400 audit(436.170:8059): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 436.260034][ T29] audit: type=1400 audit(436.180:8060): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 436.264711][ T29] audit: type=1400 audit(436.180:8061): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 436.548001][ T29] audit: type=1400 audit(436.460:8062): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 436.552897][ T29] audit: type=1400 audit(436.470:8063): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 436.560724][ T29] audit: type=1400 audit(436.480:8064): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 436.839599][ T29] audit: type=1400 audit(436.760:8065): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 436.842075][ T29] audit: type=1400 audit(436.760:8066): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 436.853981][ T29] audit: type=1400 audit(436.770:8067): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 437.037354][ T29] audit: type=1400 audit(436.950:8068): avc: denied { create } for pid=9191 comm="syz.0.2683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 441.258812][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 441.261257][ T29] audit: type=1400 audit(441.180:8198): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 441.421159][ T29] audit: type=1400 audit(441.340:8199): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 441.424540][ T29] audit: type=1400 audit(441.340:8200): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 441.428553][ T29] audit: type=1400 audit(441.340:8201): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 441.429784][ T29] audit: type=1400 audit(441.340:8202): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 441.431384][ T29] audit: type=1400 audit(441.350:8203): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 441.456339][ T29] audit: type=1400 audit(441.370:8204): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 441.576084][ T29] audit: type=1400 audit(441.490:8205): avc: denied { read } for pid=9261 comm="syz.1.2716" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 441.580734][ T29] audit: type=1400 audit(441.500:8206): avc: denied { read open } for pid=9261 comm="syz.1.2716" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 441.597895][ T29] audit: type=1400 audit(441.520:8207): avc: denied { ioctl } for pid=9261 comm="syz.1.2716" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x920a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 442.958081][ T9283] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9283 comm=syz.1.2726 [ 446.436384][ T29] kauditd_printk_skb: 141 callbacks suppressed [ 446.437251][ T29] audit: type=1400 audit(446.350:8349): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 446.448824][ T29] audit: type=1400 audit(446.360:8350): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 446.452917][ T29] audit: type=1400 audit(446.370:8351): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 446.497425][ T29] audit: type=1400 audit(446.410:8352): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 446.497778][ T29] audit: type=1400 audit(446.410:8353): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 446.502104][ T29] audit: type=1400 audit(446.420:8354): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 446.633726][ T29] audit: type=1400 audit(446.550:8355): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 446.640582][ T29] audit: type=1400 audit(446.560:8356): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 446.645751][ T29] audit: type=1400 audit(446.560:8357): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 446.865930][ T29] audit: type=1400 audit(446.780:8358): avc: denied { read } for pid=9337 comm="syz.1.2754" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 451.448360][ T29] kauditd_printk_skb: 120 callbacks suppressed [ 451.449499][ T29] audit: type=1400 audit(451.370:8479): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 451.454669][ T29] audit: type=1400 audit(451.370:8480): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 451.461771][ T29] audit: type=1400 audit(451.380:8481): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 451.606276][ T29] audit: type=1400 audit(451.520:8482): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 451.617617][ T29] audit: type=1400 audit(451.530:8483): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 451.619525][ T29] audit: type=1400 audit(451.530:8484): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 451.796498][ T29] audit: type=1400 audit(451.710:8485): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 451.798980][ T29] audit: type=1400 audit(451.710:8486): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 451.800751][ T29] audit: type=1400 audit(451.710:8487): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 451.953107][ T29] audit: type=1400 audit(451.860:8488): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 454.464098][ T9434] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=9434 comm=syz.0.2798 [ 456.604085][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 456.604463][ T29] audit: type=1400 audit(456.520:8614): avc: denied { read write } for pid=9465 comm="syz.0.2813" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 456.615087][ T29] audit: type=1400 audit(456.530:8615): avc: denied { read write open } for pid=9465 comm="syz.0.2813" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 456.632520][ T29] audit: type=1400 audit(456.550:8616): avc: denied { read } for pid=9466 comm="syz.1.2814" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 456.638290][ T29] audit: type=1400 audit(456.560:8617): avc: denied { read open } for pid=9466 comm="syz.1.2814" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 456.646463][ T29] audit: type=1400 audit(456.560:8618): avc: denied { ioctl } for pid=9466 comm="syz.1.2814" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x640b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 456.747953][ T29] audit: type=1400 audit(456.670:8619): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 456.752937][ T29] audit: type=1400 audit(456.670:8620): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 456.758667][ T29] audit: type=1400 audit(456.670:8621): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 456.760355][ T29] audit: type=1400 audit(456.680:8622): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 456.763467][ T29] audit: type=1400 audit(456.680:8623): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 460.648670][ T9515] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1280 sclass=netlink_audit_socket pid=9515 comm=syz.0.2837 [ 461.607653][ T29] kauditd_printk_skb: 94 callbacks suppressed [ 461.608728][ T29] audit: type=1400 audit(461.520:8718): avc: denied { read open } for pid=9519 comm="syz.0.2839" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 461.621452][ T29] audit: type=1400 audit(461.540:8719): avc: denied { ioctl } for pid=9519 comm="syz.0.2839" path="/dev/loop-control" dev="devtmpfs" ino=633 ioctlcmd=0x5405 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 461.688097][ T29] audit: type=1400 audit(461.610:8720): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 461.690987][ T29] audit: type=1400 audit(461.610:8721): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 461.702350][ T29] audit: type=1400 audit(461.620:8722): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 461.965755][ T29] audit: type=1400 audit(461.880:8723): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 461.973272][ T29] audit: type=1400 audit(461.890:8724): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 461.978902][ T29] audit: type=1400 audit(461.900:8725): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 462.164357][ T29] audit: type=1400 audit(462.080:8726): avc: denied { create } for pid=9523 comm="syz.0.2841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 462.174909][ T29] audit: type=1400 audit(462.090:8727): avc: denied { create } for pid=9523 comm="syz.0.2841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 466.708521][ T29] kauditd_printk_skb: 95 callbacks suppressed [ 466.709479][ T29] audit: type=1400 audit(466.610:8823): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 466.724824][ T29] audit: type=1400 audit(466.640:8824): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 466.739482][ T29] audit: type=1400 audit(466.660:8825): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 466.773849][ T29] audit: type=1400 audit(466.690:8826): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 466.783268][ T29] audit: type=1400 audit(466.690:8827): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 466.785417][ T29] audit: type=1400 audit(466.700:8828): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 466.932007][ T29] audit: type=1400 audit(466.850:8829): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 466.933953][ T29] audit: type=1400 audit(466.850:8830): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 466.957946][ T29] audit: type=1400 audit(466.850:8831): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 467.003013][ T29] audit: type=1400 audit(466.920:8832): avc: denied { map_create } for pid=9573 comm="syz.1.2865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 471.808546][ T29] kauditd_printk_skb: 151 callbacks suppressed [ 471.810722][ T29] audit: type=1400 audit(471.730:8984): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 471.815701][ T29] audit: type=1400 audit(471.730:8985): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 471.837940][ T29] audit: type=1400 audit(471.750:8986): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 472.075745][ T29] audit: type=1400 audit(471.990:8987): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 472.078601][ T29] audit: type=1400 audit(472.000:8988): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 472.085230][ T29] audit: type=1400 audit(472.000:8989): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 472.241844][ T29] audit: type=1400 audit(472.160:8990): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 472.245073][ T29] audit: type=1400 audit(472.160:8991): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 472.250072][ T29] audit: type=1400 audit(472.170:8992): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 472.368107][ T29] audit: type=1400 audit(472.290:8993): avc: denied { create } for pid=9652 comm="syz.0.2904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 473.577746][ T8318] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 473.737411][ T8318] usb 1-1: Using ep0 maxpacket: 32 [ 473.866429][ T8318] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 473.867148][ T8318] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 473.867847][ T8318] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 473.867981][ T8318] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 473.868108][ T8318] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 473.868217][ T8318] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 473.868259][ T8318] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 473.888824][ T8318] usb 1-1: config 0 descriptor?? [ 474.275324][ T8318] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 2 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 474.719480][ T9688] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9688 comm=syz.1.2917 [ 476.984582][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 476.993435][ T29] audit: type=1400 audit(476.900:9115): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 476.993883][ T29] audit: type=1400 audit(476.910:9116): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 476.994170][ T29] audit: type=1400 audit(476.910:9117): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 477.179696][ T29] audit: type=1400 audit(477.100:9118): avc: denied { create } for pid=9709 comm="syz.1.2928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 477.194760][ T29] audit: type=1400 audit(477.110:9119): avc: denied { ioctl } for pid=9709 comm="syz.1.2928" path="socket:[21396]" dev="sockfs" ino=21396 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 477.245679][ T29] audit: type=1400 audit(477.160:9120): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 477.249919][ T29] audit: type=1400 audit(477.170:9121): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 477.255789][ T29] audit: type=1400 audit(477.170:9122): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 477.490334][ T29] audit: type=1400 audit(477.410:9123): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 477.499214][ T29] audit: type=1400 audit(477.420:9124): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 481.989191][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 481.990211][ T29] audit: type=1400 audit(481.910:9194): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 482.000966][ T29] audit: type=1400 audit(481.920:9195): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 482.004780][ T29] audit: type=1400 audit(481.920:9196): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 482.241974][ T29] audit: type=1400 audit(482.160:9197): avc: denied { create } for pid=9751 comm="syz.1.2949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 482.259850][ T29] audit: type=1400 audit(482.180:9198): avc: denied { ioctl } for pid=9751 comm="syz.1.2949" path="socket:[21467]" dev="sockfs" ino=21467 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 482.266152][ T29] audit: type=1400 audit(482.180:9199): avc: denied { write } for pid=9751 comm="syz.1.2949" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 482.334980][ T29] audit: type=1400 audit(482.250:9200): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 482.339224][ T29] audit: type=1400 audit(482.260:9201): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 482.348027][ T29] audit: type=1400 audit(482.260:9202): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 482.600169][ T29] audit: type=1400 audit(482.510:9203): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 484.288652][ T8318] usb 1-1: USB disconnect, device number 2 [ 484.324622][ T8318] usblp0: removed [ 487.013918][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 487.017274][ T29] audit: type=1400 audit(486.930:9277): avc: denied { write } for pid=9796 comm="syz.0.2968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 487.047584][ T29] audit: type=1400 audit(486.960:9278): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 487.052994][ T29] audit: type=1400 audit(486.970:9279): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 487.074458][ T29] audit: type=1400 audit(486.990:9280): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 487.150280][ T29] audit: type=1400 audit(487.070:9281): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 487.164760][ T29] audit: type=1400 audit(487.080:9282): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 487.178342][ T29] audit: type=1400 audit(487.090:9283): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 487.284162][ T29] audit: type=1400 audit(487.200:9284): avc: denied { create } for pid=9799 comm="syz.1.2969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 487.396731][ T29] audit: type=1400 audit(487.310:9285): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 487.421436][ T29] audit: type=1400 audit(487.340:9286): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.018309][ T29] kauditd_printk_skb: 149 callbacks suppressed [ 492.018661][ T29] audit: type=1400 audit(491.930:9436): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.196337][ T29] audit: type=1400 audit(492.110:9437): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.203073][ T29] audit: type=1400 audit(492.120:9438): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.209077][ T29] audit: type=1400 audit(492.130:9439): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.339870][ T29] audit: type=1400 audit(492.260:9440): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.343284][ T29] audit: type=1400 audit(492.260:9441): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.366003][ T29] audit: type=1400 audit(492.280:9442): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.496078][ T29] audit: type=1400 audit(492.410:9443): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.507678][ T29] audit: type=1400 audit(492.420:9444): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 492.508122][ T29] audit: type=1400 audit(492.420:9445): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 493.746576][ T9899] capability: warning: `syz.1.3017' uses deprecated v2 capabilities in a way that may be insecure [ 494.164193][ T9906] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9906 comm=syz.0.3020 [ 496.301937][ T9929] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=30 sclass=netlink_tcpdiag_socket pid=9929 comm=syz.1.3031 [ 497.080178][ T29] kauditd_printk_skb: 114 callbacks suppressed [ 497.081103][ T29] audit: type=1400 audit(497.000:9560): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 497.084440][ T29] audit: type=1400 audit(497.000:9561): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 497.091839][ T29] audit: type=1400 audit(497.010:9562): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 497.271187][ T29] audit: type=1400 audit(497.190:9563): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 497.273875][ T29] audit: type=1400 audit(497.190:9564): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 497.281390][ T29] audit: type=1400 audit(497.200:9565): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 497.549080][ T29] audit: type=1400 audit(497.470:9566): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 497.551447][ T29] audit: type=1400 audit(497.470:9567): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 497.559523][ T29] audit: type=1400 audit(497.480:9568): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 497.862815][ T29] audit: type=1400 audit(497.780:9569): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 502.282759][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 502.284365][ T29] audit: type=1400 audit(502.200:9639): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 502.294767][ T29] audit: type=1400 audit(502.210:9640): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 502.299101][ T29] audit: type=1400 audit(502.210:9641): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 502.424134][ T29] audit: type=1400 audit(502.340:9642): avc: denied { create } for pid=9977 comm="syz.1.3058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 502.511996][ T29] audit: type=1400 audit(502.430:9643): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 502.517631][ T29] audit: type=1400 audit(502.430:9644): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 502.523038][ T29] audit: type=1400 audit(502.440:9645): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 502.561390][ T29] audit: type=1400 audit(502.480:9646): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 502.564487][ T29] audit: type=1400 audit(502.480:9647): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 502.581248][ T29] audit: type=1400 audit(502.500:9648): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.348268][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 507.349442][ T29] audit: type=1400 audit(507.270:9708): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.354598][ T29] audit: type=1400 audit(507.270:9709): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.374526][ T29] audit: type=1400 audit(507.290:9710): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.452465][ T29] audit: type=1400 audit(507.370:9711): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.460562][ T29] audit: type=1400 audit(507.380:9712): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.465738][ T29] audit: type=1400 audit(507.380:9713): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 507.642414][ T29] audit: type=1400 audit(507.560:9714): avc: denied { read } for pid=10018 comm="syz.1.3075" dev="nsfs" ino=4026532686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 507.649606][ T29] audit: type=1400 audit(507.570:9715): avc: denied { read open } for pid=10018 comm="syz.1.3075" path="net:[4026532686]" dev="nsfs" ino=4026532686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 507.659513][ T29] audit: type=1400 audit(507.580:9716): avc: denied { create } for pid=10018 comm="syz.1.3075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 507.681188][ T29] audit: type=1400 audit(507.600:9717): avc: denied { write } for pid=10018 comm="syz.1.3075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 514.127905][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 514.129003][ T29] audit: type=1400 audit(514.040:9774): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 514.134685][ T29] audit: type=1400 audit(514.050:9775): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 514.140267][ T29] audit: type=1400 audit(514.060:9776): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 514.222702][ T29] audit: type=1400 audit(514.140:9777): avc: denied { write } for pid=10050 comm="syz.1.3091" name="event1" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 514.241894][ T29] audit: type=1400 audit(514.160:9778): avc: denied { write open } for pid=10050 comm="syz.1.3091" path="/dev/input/event1" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 514.265092][ T29] audit: type=1400 audit(514.180:9779): avc: denied { ioctl } for pid=10050 comm="syz.1.3091" path="/dev/input/event1" dev="devtmpfs" ino=724 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 514.370471][ T29] audit: type=1400 audit(514.290:9780): avc: denied { read write } for pid=10052 comm="syz.0.3090" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 514.376097][ T29] audit: type=1400 audit(514.290:9781): avc: denied { read write open } for pid=10052 comm="syz.0.3090" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 514.388558][ T29] audit: type=1400 audit(514.310:9782): avc: denied { ioctl } for pid=10052 comm="syz.0.3090" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0x552c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 514.390823][ T29] audit: type=1400 audit(514.310:9783): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 519.137234][ T29] kauditd_printk_skb: 76 callbacks suppressed [ 519.137708][ T29] audit: type=1400 audit(519.050:9860): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 519.141181][ T29] audit: type=1400 audit(519.060:9861): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 519.145057][ T29] audit: type=1400 audit(519.060:9862): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 519.171385][ T29] audit: type=1400 audit(519.090:9863): avc: denied { create } for pid=10110 comm="syz.0.3106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 519.184530][ T29] audit: type=1400 audit(519.100:9864): avc: denied { ioctl } for pid=10110 comm="syz.0.3106" path="socket:[23895]" dev="sockfs" ino=23895 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 519.263643][ T29] audit: type=1400 audit(519.180:9865): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 519.277628][ T29] audit: type=1400 audit(519.190:9866): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 519.278075][ T29] audit: type=1400 audit(519.190:9867): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 519.431247][ T29] audit: type=1400 audit(519.350:9868): avc: denied { create } for pid=10113 comm="syz.0.3108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 519.464375][ T29] audit: type=1400 audit(519.380:9869): avc: denied { ioctl } for pid=10113 comm="syz.0.3108" path="socket:[23089]" dev="sockfs" ino=23089 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 524.773972][ T29] kauditd_printk_skb: 112 callbacks suppressed [ 524.774425][ T29] audit: type=1400 audit(524.690:9982): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 524.898261][ T29] audit: type=1400 audit(524.800:9983): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 524.917312][ T29] audit: type=1400 audit(524.830:9984): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 525.081120][ T29] audit: type=1400 audit(525.000:9985): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 525.177464][ T29] audit: type=1400 audit(525.090:9986): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 525.239535][ T29] audit: type=1400 audit(525.160:9987): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 525.762544][ T29] audit: type=1400 audit(525.680:9988): avc: denied { create } for pid=10170 comm="syz.1.3137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 526.031474][ T29] audit: type=1400 audit(525.950:9989): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 526.062805][ T29] audit: type=1400 audit(525.980:9990): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 526.088865][ T29] audit: type=1400 audit(525.980:9991): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 529.954818][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 529.955391][ T29] audit: type=1400 audit(529.870:10042): avc: denied { read write } for pid=10193 comm="syz.0.3149" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 529.960141][ T29] audit: type=1400 audit(529.880:10043): avc: denied { ioctl open } for pid=10193 comm="syz.0.3149" path="/dev/sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 529.992069][ T29] audit: type=1400 audit(529.910:10044): avc: denied { ioctl } for pid=10193 comm="syz.0.3149" path="/dev/sequencer2" dev="devtmpfs" ino=722 ioctlcmd=0x3b65 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 530.075303][ T29] audit: type=1400 audit(529.990:10045): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 530.093804][ T29] audit: type=1400 audit(530.000:10046): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 530.101087][ T29] audit: type=1400 audit(530.020:10047): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 530.195337][ T29] audit: type=1400 audit(530.110:10048): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 530.209203][ T29] audit: type=1400 audit(530.130:10049): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 530.213192][ T29] audit: type=1400 audit(530.130:10050): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 530.523727][ T29] audit: type=1400 audit(530.440:10051): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 535.085341][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 535.088481][ T29] audit: type=1400 audit(535.000:10094): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 535.107607][ T29] audit: type=1400 audit(535.020:10095): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 535.111788][ T29] audit: type=1400 audit(535.030:10096): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 535.267858][ T29] audit: type=1400 audit(535.180:10097): avc: denied { read } for pid=10223 comm="syz.0.3166" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 535.292079][ T29] audit: type=1400 audit(535.210:10098): avc: denied { read open } for pid=10223 comm="syz.0.3166" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 535.321574][ T29] audit: type=1400 audit(535.240:10099): avc: denied { ioctl } for pid=10223 comm="syz.0.3166" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 535.332511][ T29] audit: type=1400 audit(535.250:10100): avc: denied { ioctl } for pid=10223 comm="syz.0.3166" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x5002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 535.496068][ T29] audit: type=1400 audit(535.410:10101): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 535.496517][ T29] audit: type=1400 audit(535.410:10102): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 535.497661][ T29] audit: type=1400 audit(535.410:10103): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.090579][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 540.090986][ T29] audit: type=1400 audit(540.010:10172): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.202163][T10265] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10265 comm=syz.0.3184 [ 540.243319][ T29] audit: type=1400 audit(540.160:10173): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.245326][ T29] audit: type=1400 audit(540.160:10174): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.255197][ T29] audit: type=1400 audit(540.170:10175): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.522764][ T29] audit: type=1400 audit(540.440:10176): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.528540][ T29] audit: type=1400 audit(540.450:10177): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.535099][ T29] audit: type=1400 audit(540.450:10178): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.806457][ T29] audit: type=1400 audit(540.720:10179): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.813394][ T29] audit: type=1400 audit(540.730:10180): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 540.822295][ T29] audit: type=1400 audit(540.740:10181): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 545.226192][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 545.227611][ T29] audit: type=1400 audit(545.140:10215): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 545.240982][ T29] audit: type=1400 audit(545.160:10216): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 545.244392][ T29] audit: type=1400 audit(545.160:10217): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 545.268133][ T29] audit: type=1400 audit(545.190:10218): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 545.273368][ T29] audit: type=1400 audit(545.190:10219): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 545.278464][ T29] audit: type=1400 audit(545.200:10220): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 545.383562][ T29] audit: type=1400 audit(545.300:10221): avc: denied { create } for pid=10293 comm="syz.0.3197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 545.389898][ T29] audit: type=1400 audit(545.310:10222): avc: denied { setopt } for pid=10293 comm="syz.0.3197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 545.393159][ T29] audit: type=1400 audit(545.310:10223): avc: denied { setopt } for pid=10293 comm="syz.0.3197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 545.533395][ T29] audit: type=1400 audit(545.440:10224): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 549.096296][T10314] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=10314 comm=syz.0.3210 [ 550.229598][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 550.229942][ T29] audit: type=1400 audit(550.150:10285): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 550.234340][ T29] audit: type=1400 audit(550.150:10286): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 550.441446][ T29] audit: type=1400 audit(550.350:10287): avc: denied { read append } for pid=10329 comm="syz.0.3211" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 550.447676][ T29] audit: type=1400 audit(550.360:10288): avc: denied { read open } for pid=10329 comm="syz.0.3211" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 550.487526][ T29] audit: type=1400 audit(550.400:10289): avc: denied { read write } for pid=10329 comm="syz.0.3211" name="udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 550.490713][ T29] audit: type=1400 audit(550.410:10290): avc: denied { read write open } for pid=10329 comm="syz.0.3211" path="/dev/udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 550.510960][ T29] audit: type=1400 audit(550.430:10291): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 550.518141][ T29] audit: type=1400 audit(550.440:10292): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 550.524082][ T29] audit: type=1400 audit(550.440:10293): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 550.642131][ T29] audit: type=1400 audit(550.560:10294): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 555.311466][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 555.312638][ T29] audit: type=1400 audit(555.230:10422): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 555.317268][ T29] audit: type=1400 audit(555.230:10423): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 555.320587][ T29] audit: type=1400 audit(555.240:10424): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 555.439637][ T29] audit: type=1400 audit(555.350:10425): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 555.447526][ T29] audit: type=1400 audit(555.360:10426): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 555.449015][ T29] audit: type=1400 audit(555.360:10427): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 555.554763][ T29] audit: type=1400 audit(555.470:10428): avc: denied { read } for pid=10403 comm="syz.1.3249" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 555.564171][ T29] audit: type=1400 audit(555.480:10429): avc: denied { read open } for pid=10403 comm="syz.1.3249" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 555.580490][ T29] audit: type=1400 audit(555.500:10430): avc: denied { ioctl } for pid=10403 comm="syz.1.3249" path="/dev/loop-control" dev="devtmpfs" ino=633 ioctlcmd=0x640c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 555.625881][ T29] audit: type=1400 audit(555.540:10431): avc: denied { create } for pid=10405 comm="syz.0.3250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 559.413292][T10459] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10459 comm=syz.0.3276 [ 560.927350][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 560.928231][ T29] audit: type=1400 audit(560.840:10559): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 560.940891][ T29] audit: type=1400 audit(560.860:10560): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 560.953492][ T29] audit: type=1400 audit(560.860:10561): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 560.982156][ T29] audit: type=1400 audit(560.900:10562): avc: denied { create } for pid=10466 comm="syz.0.3285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 560.998197][ T29] audit: type=1400 audit(560.910:10563): avc: denied { ioctl } for pid=10466 comm="syz.0.3285" path="socket:[24703]" dev="sockfs" ino=24703 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 561.000135][ T29] audit: type=1400 audit(560.920:10564): avc: denied { write } for pid=10466 comm="syz.0.3285" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 561.060748][ T29] audit: type=1400 audit(560.980:10565): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 561.063277][ T29] audit: type=1400 audit(560.980:10566): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 561.070706][ T29] audit: type=1400 audit(560.990:10567): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 561.238756][ T29] audit: type=1400 audit(561.160:10568): avc: denied { create } for pid=10468 comm="syz.1.3281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 565.993522][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 565.998073][ T29] audit: type=1400 audit(565.910:10695): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 565.998415][ T29] audit: type=1400 audit(565.920:10696): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 566.019943][ T29] audit: type=1400 audit(565.920:10697): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 566.175277][ T29] audit: type=1400 audit(566.090:10698): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 566.183968][ T29] audit: type=1400 audit(566.100:10699): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 566.199553][ T29] audit: type=1400 audit(566.120:10700): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 566.309305][ T29] audit: type=1400 audit(566.230:10701): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 566.315744][ T29] audit: type=1400 audit(566.230:10702): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 566.320132][ T29] audit: type=1400 audit(566.240:10703): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 566.453992][ T29] audit: type=1400 audit(566.370:10704): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 566.801728][T10543] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10543 comm=syz.0.3318 [ 571.146150][ T29] kauditd_printk_skb: 140 callbacks suppressed [ 571.150580][ T29] audit: type=1400 audit(571.060:10845): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.173501][ T29] audit: type=1400 audit(571.080:10846): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.173986][ T29] audit: type=1400 audit(571.080:10847): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.200911][ T29] audit: type=1400 audit(571.100:10848): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.204658][ T29] audit: type=1400 audit(571.120:10849): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.211300][ T29] audit: type=1400 audit(571.130:10850): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.351178][ T29] audit: type=1400 audit(571.270:10851): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.353004][ T29] audit: type=1400 audit(571.270:10852): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.361610][ T29] audit: type=1400 audit(571.280:10853): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 571.443582][ T29] audit: type=1400 audit(571.360:10854): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 576.161339][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 576.165414][ T29] audit: type=1400 audit(576.080:10988): avc: denied { read } for pid=10679 comm="syz.0.3382" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.172129][ T29] audit: type=1400 audit(576.080:10989): avc: denied { read open } for pid=10679 comm="syz.0.3382" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.187423][ T29] audit: type=1400 audit(576.100:10990): avc: denied { ioctl } for pid=10679 comm="syz.0.3382" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.202920][ T29] audit: type=1400 audit(576.120:10991): avc: denied { ioctl } for pid=10679 comm="syz.0.3382" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54cd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.270529][ T29] audit: type=1400 audit(576.190:10992): avc: denied { read write } for pid=10680 comm="syz.1.3384" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.274222][ T29] audit: type=1400 audit(576.190:10993): avc: denied { read write open } for pid=10680 comm="syz.1.3384" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.285473][ T29] audit: type=1400 audit(576.200:10994): avc: denied { ioctl } for pid=10680 comm="syz.1.3384" path="/dev/vhost-net" dev="devtmpfs" ino=709 ioctlcmd=0x7014 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 576.365024][ T29] audit: type=1400 audit(576.280:10995): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 576.369064][ T29] audit: type=1400 audit(576.290:10996): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 576.375515][ T29] audit: type=1400 audit(576.290:10997): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 581.354658][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 581.361316][ T29] audit: type=1400 audit(581.270:11065): avc: denied { execmem } for pid=10723 comm="syz.0.3402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 581.384114][ T29] audit: type=1400 audit(581.300:11066): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 581.386491][ T29] audit: type=1400 audit(581.300:11067): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 581.397815][ T29] audit: type=1400 audit(581.310:11068): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 581.497369][ T29] audit: type=1400 audit(581.410:11069): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 581.501268][ T29] audit: type=1400 audit(581.420:11070): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 581.515793][ T29] audit: type=1400 audit(581.430:11071): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 581.637316][ T29] audit: type=1400 audit(581.550:11072): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 581.637827][ T29] audit: type=1400 audit(581.550:11073): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 581.644168][ T29] audit: type=1400 audit(581.560:11074): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 585.088988][T10748] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10748 comm=syz.1.3411 [ 586.476466][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 586.487650][ T29] audit: type=1400 audit(586.390:11147): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 586.489846][ T29] audit: type=1400 audit(586.400:11148): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 586.490153][ T29] audit: type=1400 audit(586.400:11149): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 586.634538][ T29] audit: type=1400 audit(586.550:11150): avc: denied { read } for pid=10766 comm="syz.1.3423" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 586.639061][ T29] audit: type=1400 audit(586.560:11151): avc: denied { read open } for pid=10766 comm="syz.1.3423" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 586.653519][ T29] audit: type=1400 audit(586.570:11152): avc: denied { read write } for pid=10766 comm="syz.1.3423" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 586.659703][ T29] audit: type=1400 audit(586.580:11153): avc: denied { read write open } for pid=10766 comm="syz.1.3423" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 586.669973][ T29] audit: type=1400 audit(586.590:11154): avc: denied { ioctl } for pid=10766 comm="syz.1.3423" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x5303 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:usbmon_device_t:s0" [ 586.716337][ T29] audit: type=1400 audit(586.630:11155): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 586.721062][ T29] audit: type=1400 audit(586.640:11156): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 591.150849][T10816] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=10816 comm=syz.0.3447 [ 591.497610][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 591.501415][ T29] audit: type=1400 audit(591.410:11254): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 591.503351][ T29] audit: type=1400 audit(591.420:11255): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 591.505732][ T29] audit: type=1400 audit(591.420:11256): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 592.934683][ T29] audit: type=1400 audit(592.850:11257): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 592.957467][ T29] audit: type=1400 audit(592.870:11258): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 592.957831][ T29] audit: type=1400 audit(592.870:11259): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 593.087926][ T29] audit: type=1400 audit(593.000:11260): avc: denied { read } for pid=10824 comm="syz.1.3450" dev="nsfs" ino=4026532686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 593.090712][ T29] audit: type=1400 audit(593.010:11261): avc: denied { read open } for pid=10824 comm="syz.1.3450" path="net:[4026532686]" dev="nsfs" ino=4026532686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 593.094990][ T29] audit: type=1400 audit(593.010:11262): avc: denied { create } for pid=10824 comm="syz.1.3450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 593.107600][ T29] audit: type=1400 audit(593.020:11263): avc: denied { write } for pid=10824 comm="syz.1.3450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 596.518567][ T29] kauditd_printk_skb: 119 callbacks suppressed [ 596.519692][ T29] audit: type=1400 audit(596.430:11383): avc: denied { mounton } for pid=10879 comm="syz.1.3478" path="/1775/file0" dev="tmpfs" ino=9083 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 596.531400][ T29] audit: type=1400 audit(596.450:11384): avc: denied { mounton } for pid=10879 comm="syz.1.3478" path="/1775/file0" dev="tmpfs" ino=9083 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 596.567861][ T29] audit: type=1400 audit(596.480:11385): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 596.619187][ T29] audit: type=1400 audit(596.540:11386): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 596.622017][ T29] audit: type=1400 audit(596.540:11387): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 596.625303][ T29] audit: type=1400 audit(596.540:11388): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 596.651233][ T29] audit: type=1400 audit(596.570:11389): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 596.656270][ T29] audit: type=1400 audit(596.570:11390): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 596.677691][ T29] audit: type=1400 audit(596.590:11391): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 596.764486][ T29] audit: type=1400 audit(596.680:11392): avc: denied { allowed } for pid=10883 comm="syz.0.3479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 598.264683][T10901] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1280 sclass=netlink_audit_socket pid=10901 comm=syz.1.3487 [ 601.538247][ T29] kauditd_printk_skb: 102 callbacks suppressed [ 601.539387][ T29] audit: type=1400 audit(601.450:11495): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.700526][ T29] audit: type=1400 audit(601.620:11496): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.703502][ T29] audit: type=1400 audit(601.620:11497): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.715263][ T29] audit: type=1400 audit(601.630:11498): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.820020][ T29] audit: type=1400 audit(601.740:11499): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.825000][ T29] audit: type=1400 audit(601.740:11500): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.844700][ T29] audit: type=1400 audit(601.750:11501): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.883266][ T29] audit: type=1400 audit(601.800:11502): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.895478][ T29] audit: type=1400 audit(601.810:11503): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.908276][ T29] audit: type=1400 audit(601.830:11504): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 606.119946][T10987] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1280 sclass=netlink_audit_socket pid=10987 comm=syz.1.3528 [ 606.732966][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 606.734148][ T29] audit: type=1400 audit(606.650:11602): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 606.740608][ T29] audit: type=1400 audit(606.660:11603): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 606.743837][ T29] audit: type=1400 audit(606.660:11604): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 606.949848][ T29] audit: type=1400 audit(606.870:11605): avc: denied { read } for pid=10992 comm="syz.0.3531" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 606.955479][ T29] audit: type=1400 audit(606.870:11606): avc: denied { read open } for pid=10992 comm="syz.0.3531" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 606.964785][ T29] audit: type=1400 audit(606.880:11607): avc: denied { ioctl } for pid=10992 comm="syz.0.3531" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x5331 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 607.021122][ T29] audit: type=1400 audit(606.940:11608): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 607.023279][ T29] audit: type=1400 audit(606.940:11609): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 607.029880][ T29] audit: type=1400 audit(606.950:11610): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 607.188851][ T29] audit: type=1400 audit(607.100:11611): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 611.881892][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 611.883081][ T29] audit: type=1400 audit(611.800:11745): avc: denied { read } for pid=11057 comm="syz.1.3563" dev="nsfs" ino=4026532686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 611.888572][ T29] audit: type=1400 audit(611.800:11746): avc: denied { read open } for pid=11057 comm="syz.1.3563" path="net:[4026532686]" dev="nsfs" ino=4026532686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 611.896367][ T29] audit: type=1400 audit(611.810:11747): avc: denied { create } for pid=11057 comm="syz.1.3563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 611.929078][ T29] audit: type=1400 audit(611.850:11748): avc: denied { ioctl } for pid=11057 comm="syz.1.3563" path="socket:[26528]" dev="sockfs" ino=26528 ioctlcmd=0x1264 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 611.995672][ T29] audit: type=1400 audit(611.910:11749): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 612.003374][ T29] audit: type=1400 audit(611.920:11750): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 612.010180][ T29] audit: type=1400 audit(611.930:11751): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 612.272679][ T29] audit: type=1400 audit(612.190:11752): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 612.287489][ T29] audit: type=1400 audit(612.200:11753): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 612.287974][ T29] audit: type=1400 audit(612.200:11754): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 616.958429][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 616.960254][ T29] audit: type=1400 audit(616.870:11812): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 616.969485][ T29] audit: type=1400 audit(616.890:11813): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 616.975391][ T29] audit: type=1400 audit(616.890:11814): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.075646][ T29] audit: type=1400 audit(616.990:11815): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.078813][ T29] audit: type=1400 audit(617.000:11816): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.087980][ T29] audit: type=1400 audit(617.010:11817): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.295731][ T29] audit: type=1400 audit(617.210:11818): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.300085][ T29] audit: type=1400 audit(617.220:11819): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.302144][ T29] audit: type=1400 audit(617.220:11820): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.337629][ T29] audit: type=1400 audit(617.250:11821): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.381375][ T29] kauditd_printk_skb: 125 callbacks suppressed [ 623.384947][ T29] audit: type=1400 audit(623.300:11947): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.386568][ T29] audit: type=1400 audit(623.300:11948): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.402047][ T29] audit: type=1400 audit(623.320:11949): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.537679][ T29] audit: type=1400 audit(623.450:11950): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.559573][ T29] audit: type=1400 audit(623.480:11951): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.565361][ T29] audit: type=1400 audit(623.480:11952): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.576203][ T29] audit: type=1400 audit(623.490:11953): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.581905][ T29] audit: type=1400 audit(623.500:11954): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.587513][ T29] audit: type=1400 audit(623.500:11955): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 623.733362][ T29] audit: type=1400 audit(623.650:11956): avc: denied { read } for pid=11161 comm="syz.1.3614" dev="nsfs" ino=4026532686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 628.396041][ T29] kauditd_printk_skb: 116 callbacks suppressed [ 628.399259][ T29] audit: type=1400 audit(628.310:12073): avc: denied { search } for pid=11188 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 628.403938][ T29] audit: type=1400 audit(628.320:12074): avc: denied { search } for pid=11188 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 628.404752][ T29] audit: type=1400 audit(628.320:12075): avc: denied { search } for pid=11188 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 628.405253][ T29] audit: type=1400 audit(628.320:12076): avc: denied { search } for pid=11188 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 628.448651][ T29] audit: type=1400 audit(628.370:12077): avc: denied { search } for pid=11188 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 628.449440][ T29] audit: type=1400 audit(628.370:12078): avc: denied { search } for pid=11188 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 628.460063][ T29] audit: type=1400 audit(628.370:12079): avc: denied { search } for pid=11188 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 628.460501][ T29] audit: type=1400 audit(628.370:12080): avc: denied { read open } for pid=11188 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 628.478329][ T29] audit: type=1400 audit(628.400:12081): avc: denied { getattr } for pid=11188 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 628.498710][ T29] audit: type=1400 audit(628.400:12082): avc: denied { read } for pid=11190 comm="syz.0.3627" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 632.761029][T11243] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11243 comm=syz.0.3650 [ 633.400813][ T29] kauditd_printk_skb: 213 callbacks suppressed [ 633.401154][ T29] audit: type=1400 audit(633.320:12296): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.521685][ T29] audit: type=1400 audit(633.440:12297): avc: denied { create } for pid=11252 comm="syz.1.3656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 633.540061][ T29] audit: type=1400 audit(633.460:12298): avc: denied { write } for pid=11252 comm="syz.1.3656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 633.608427][ T29] audit: type=1400 audit(633.530:12299): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.611846][ T29] audit: type=1400 audit(633.530:12300): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.616224][ T29] audit: type=1400 audit(633.530:12301): avc: denied { create } for pid=11254 comm="syz.0.3657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 633.624216][ T29] audit: type=1400 audit(633.540:12302): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.682139][ T29] audit: type=1400 audit(633.600:12303): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.684289][ T29] audit: type=1400 audit(633.600:12304): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 633.689316][ T29] audit: type=1400 audit(633.610:12305): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.447138][ T29] kauditd_printk_skb: 139 callbacks suppressed [ 638.448553][ T29] audit: type=1400 audit(638.360:12445): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.453138][ T29] audit: type=1400 audit(638.370:12446): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.459297][ T29] audit: type=1400 audit(638.380:12447): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.613527][ T29] audit: type=1400 audit(638.530:12448): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.616379][ T29] audit: type=1400 audit(638.530:12449): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.625650][ T29] audit: type=1400 audit(638.540:12450): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.668248][T11329] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11329 comm=syz.1.3698 [ 638.752367][ T29] audit: type=1400 audit(638.670:12451): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.757444][ T29] audit: type=1400 audit(638.670:12452): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.763436][ T29] audit: type=1400 audit(638.680:12453): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 638.917350][ T29] audit: type=1400 audit(638.830:12454): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.497860][ T29] kauditd_printk_skb: 140 callbacks suppressed [ 643.501519][ T29] audit: type=1400 audit(643.400:12595): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.501870][ T29] audit: type=1400 audit(643.410:12596): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.502105][ T29] audit: type=1400 audit(643.410:12597): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.679577][ T29] audit: type=1400 audit(643.600:12598): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.683627][ T29] audit: type=1400 audit(643.600:12599): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.698272][ T29] audit: type=1400 audit(643.620:12600): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.703714][ T29] audit: type=1400 audit(643.620:12601): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.708544][ T29] audit: type=1400 audit(643.620:12602): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.713629][ T29] audit: type=1400 audit(643.630:12603): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 643.868747][ T29] audit: type=1400 audit(643.790:12604): avc: denied { create } for pid=11412 comm="syz.0.3736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 648.512918][ T29] kauditd_printk_skb: 75 callbacks suppressed [ 648.528760][ T29] audit: type=1400 audit(648.430:12680): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.529149][ T29] audit: type=1400 audit(648.440:12681): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.529362][ T29] audit: type=1400 audit(648.440:12682): avc: denied { ioctl } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.609092][ T29] audit: type=1400 audit(648.530:12683): avc: denied { read write } for pid=3097 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.613436][ T29] audit: type=1400 audit(648.530:12684): avc: denied { read write open } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.619041][ T29] audit: type=1400 audit(648.540:12685): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.751842][ T29] audit: type=1400 audit(648.670:12686): avc: denied { create } for pid=11452 comm="syz.0.3755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 648.768725][ T29] audit: type=1400 audit(648.690:12687): avc: denied { write } for pid=11452 comm="syz.0.3755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 648.844719][ T29] audit: type=1400 audit(648.760:12688): avc: denied { read write } for pid=3096 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.853016][ T29] audit: type=1400 audit(648.770:12689): avc: denied { read write open } for pid=3096 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1056.277236][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 430s! [swapper/0:0] [ 1056.277545][ C0] Modules linked in: [ 1056.278605][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 1056.278926][ C0] Tainted: [L]=SOFTLOCKUP [ 1056.278978][ C0] Hardware name: ARM-Versatile Express [ 1056.279206][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 1056.279923][ C0] LR is at timer_expire_remote+0x60/0x6c [ 1056.279983][ C0] pc : [<81abba7c>] lr : [<80328930>] psr: 60000113 [ 1056.280030][ C0] sp : 82801bc0 ip : 82801bd0 fp : 82801bcc [ 1056.280082][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 1056.280126][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : dddd9f00 [ 1056.280172][ C0] r3 : 00003c8a r2 : 00000000 r1 : 00000000 r0 : dddd9f00 [ 1056.280294][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 1056.280371][ C0] Control: 30c5387d Table: 84bb0800 DAC: fffffffd [ 1056.280480][ C0] Call trace: [ 1056.280731][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80328930>] (timer_expire_remote+0x60/0x6c) [ 1056.281084][ C0] [<803288d0>] (timer_expire_remote) from [<80346f6c>] (tmigr_handle_remote_up+0x3e0/0x4b0) [ 1056.281201][ C0] r4:830bf380 [ 1056.281229][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 1056.281335][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 1056.281370][ C0] r4:830bf380 [ 1056.281387][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 1056.281492][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 1056.281529][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 1056.281605][ C0] r4:82804084 [ 1056.281623][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 1056.281687][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 1056.281773][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 1056.281797][ C0] r4:8281b500 [ 1056.281813][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 1056.281879][ C0] r5:8247f12c r4:826c3a9c [ 1056.281897][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 1056.281965][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1056.282113][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 1056.282301][ C0] 1dc0: 00000001 00000000 [ 1056.282359][ C0] 1de0: 00003d2d 00003d2b 83fdd768 00000004 00000001 83fdd768 843c2288 83fdd640 [ 1056.282404][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 1056.282478][ C0] r9:8281b500 r8:843c2288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 1056.282500][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 1056.282580][ C0] r5:00000004 r4:83fdd640 [ 1056.282598][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 1056.282716][ C0] r7:00000001 r6:00000000 r5:00000002 r4:842aa4a8 [ 1056.282733][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1056.282795][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 1056.282867][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833eba98 r5:00000001 [ 1056.282887][ C0] r4:842aa4a8 [ 1056.282902][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 1056.282958][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 1056.283023][ C0] r5:000000ff r4:84f90224 [ 1056.283045][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 1056.283105][ C0] r5:000000ff r4:84f90224 [ 1056.283124][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 1056.283181][ C0] r5:000000ff r4:84f90224 [ 1056.283197][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 1056.283266][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 1056.283283][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1056.283356][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 1056.283378][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 1056.283443][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 1056.283517][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 1056.283539][ C0] r4:000000ed [ 1056.283555][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 1056.283627][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 1056.283736][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 1056.284416][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1056.284913][ C1] NMI backtrace for cpu 1 [ 1056.285041][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 1056.285077][ C1] Tainted: [L]=SOFTLOCKUP [ 1056.285086][ C1] Hardware name: ARM-Versatile Express [ 1056.285097][ C1] PC is at _raw_spin_lock+0x40/0x58 [ 1056.285135][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 1056.285151][ C1] pc : [<81abbc34>] lr : [<81abbc0c>] psr: 80000113 [ 1056.285163][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 1056.285173][ C1] r10: 81c05450 r9 : 83fdd640 r8 : 843c2288 [ 1056.285184][ C1] r7 : 83fdd768 r6 : 00000000 r5 : 00000001 r4 : 83fdd768 [ 1056.285196][ C1] r3 : 00003d2b r2 : 00003d2c r1 : 00000000 r0 : 00000001 [ 1056.285209][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1056.285227][ C1] Control: 30c5387d Table: 860737c0 DAC: 00000000 [ 1056.285237][ C1] Call trace: frame pointer underflow [ 1056.285283][ C1] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 1056.285327][ C1] r5:00000001 r4:83fdd640 [ 1056.285336][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 1056.285376][ C1] r7:00000000 r6:00000000 r5:00000000 r4:842aa480 [ 1056.285385][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1056.285416][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 1056.285457][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:000088fb r6:00000009 r5:00000000 [ 1056.285468][ C1] r4:842aa480 [ 1056.285476][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 1056.285503][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 1056.285565][ C1] r5:84f90044 r4:84f90044 [ 1056.285600][ C1] [<809cc860>] (gpio_led_set) from [<809ca154>] (led_set_brightness_nosleep+0x38/0x44) [ 1056.285646][ C1] r5:84f90044 r4:838bab0c [ 1056.285654][ C1] [<809ca11c>] (led_set_brightness_nosleep) from [<809cd1b8>] (led_heartbeat_function+0x84/0x144) [ 1056.285684][ C1] [<809cd134>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 1056.285721][ C1] r7:000088fb r6:809cd134 r5:838bab0c r4:83216000 [ 1056.285729][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 1056.285783][ C1] r9:df805ebc r8:000088fb r7:00000000 r6:809cd134 r5:dddd9f00 r4:838bab0c [ 1056.285809][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 1056.285879][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 1056.285899][ C1] r4:dddd9f00 [ 1056.285908][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 1056.285946][ C1] r4:82804084 [ 1056.285963][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 1056.286044][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 1056.286125][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e08 r6:82443ff8 r5:8247f12c [ 1056.286151][ C1] r4:83216000 [ 1056.286168][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 1056.286234][ C1] r5:8247f12c r4:826c3a9c [ 1056.286251][ C1] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 1056.286325][ C1] [<81aad628>] (generic_handle_arch_irq) from [<81a7d654>] (call_with_stack+0x1c/0x20) [ 1056.286413][ C1] r9:83216000 r8:843c2288 r7:df865e3c r6:ffffffff r5:60000013 r4:809c7fac [ 1056.286441][ C1] [<81a7d638>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 1056.286518][ C1] Exception stack(0xdf865e08 to 0xdf865e50) [ 1056.286581][ C1] 5e00: e012e008 00000009 00003d2b 00000000 e012e008 00000009 [ 1056.286657][ C1] 5e20: 00000001 83fdd768 843c2288 83fdd640 00000000 df865e6c df865e58 df865e58 [ 1056.286699][ C1] 5e40: 809c7fa8 809c7fac 60000013 ffffffff [ 1056.286723][ C1] [<809c7f8c>] (gpio_mmio_write32) from [<809c77cc>] (gpio_mmio_set+0x64/0x80) [ 1056.286809][ C1] r5:00000008 r4:83fdd640 [ 1056.286830][ C1] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 1056.286907][ C1] r7:00000001 r6:00000000 r5:00000003 r4:842aa4bc [ 1056.286927][ C1] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1056.286995][ C1] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 1056.287101][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:833eba58 r5:00000001 [ 1056.287114][ C1] r4:842aa4bc [ 1056.287122][ C1] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 1056.287150][ C1] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 1056.287180][ C1] r5:000000ff r4:84f90314 [ 1056.287188][ C1] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 1056.287218][ C1] r5:000000ff r4:84f90314 [ 1056.287226][ C1] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 1056.287256][ C1] r5:000000ff r4:84f90314 [ 1056.287264][ C1] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 1056.287298][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 1056.287306][ C1] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1056.287344][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 1056.287353][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 1056.287417][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 1056.287479][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 1056.287491][ C1] r4:00000092 [ 1056.287499][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 1056.287534][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 1056.287626][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 1056.288514][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 1056.324155][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 1056.324575][ C0] Tainted: [L]=SOFTLOCKUP [ 1056.324761][ C0] Hardware name: ARM-Versatile Express [ 1056.325025][ C0] Call trace: [ 1056.325336][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 1056.325718][ C0] r7:82296540 r6:8281b500 r5:00000000 r4:822956f0 [ 1056.325980][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 1056.326383][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 1056.326813][ C0] r5:00000000 r4:82a7bd14 [ 1056.327027][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 1056.327393][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 1056.327762][ C0] r7:82ac27f8 [ 1056.327938][ C0] [<80202850>] (panic) from [<80383f14>] (watchdog_timer_fn+0x2dc/0x350) [ 1056.328312][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 1056.328562][ C0] [<80383c38>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 1056.328963][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383c38 r6:dddc7000 r5:dddc7040 [ 1056.329273][ C0] r4:dddc75d8 [ 1056.329463][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 1056.329935][ C0] r10:ea705cf0 r9:dddc7180 r8:dddc7130 r7:000000f5 r6:00000003 r5:20000193 [ 1056.330239][ C0] r4:dddc7000 [ 1056.331025][ C0] [<8032b020>] (hrtimer_interrupt) from [<81340630>] (arch_timer_handler_virt+0x30/0x38) [ 1056.331882][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 1056.332487][ C0] r4:8309de40 [ 1056.332665][ C0] [<81340600>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 1056.333104][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 1056.333526][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 1056.333840][ C0] r4:8280cc44 [ 1056.333997][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 1056.334408][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 1056.334847][ C0] [<80201260>] (gic_handle_irq) from [<81aad688>] (generic_handle_arch_irq+0x60/0x80) [ 1056.335248][ C0] r7:82801b70 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 1056.335484][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1056.335882][ C0] Exception stack(0x82801b70 to 0x82801bb8) [ 1056.336159][ C0] 1b60: dddd9f00 00000000 00000000 00003c8a [ 1056.336501][ C0] 1b80: dddd9f00 830bf3b0 82801cb8 ddddb488 00000001 8280c9a4 00000001 82801bcc [ 1056.336830][ C0] 1ba0: 82801bd0 82801bc0 80328930 81abba7c 60000113 ffffffff [ 1056.337138][ C0] r9:8281b500 r8:00000001 r7:82801ba4 r6:ffffffff r5:60000113 r4:81abba7c [ 1056.337440][ C0] [<81abba54>] (_raw_spin_unlock_irq) from [<80328930>] (timer_expire_remote+0x60/0x6c) [ 1056.337840][ C0] [<803288d0>] (timer_expire_remote) from [<80346f6c>] (tmigr_handle_remote_up+0x3e0/0x4b0) [ 1056.338256][ C0] r4:830bf380 [ 1056.338414][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 1056.338850][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 1056.339176][ C0] r4:830bf380 [ 1056.339331][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 1056.339745][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000002 r5:00000002 r4:dddc7488 [ 1056.340057][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 1056.340466][ C0] r4:82804084 [ 1056.340626][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 1056.341058][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 1056.341450][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 1056.341766][ C0] r4:8281b500 [ 1056.341935][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 1056.342306][ C0] r5:8247f12c r4:826c3a9c [ 1056.342496][ C0] [<8025bd38>] (irq_exit) from [<81aad6a4>] (generic_handle_arch_irq+0x7c/0x80) [ 1056.342894][ C0] [<81aad628>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1056.343254][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 1056.343484][ C0] 1dc0: 00000001 00000000 [ 1056.343776][ C0] 1de0: 00003d2d 00003d2b 83fdd768 00000004 00000001 83fdd768 843c2288 83fdd640 [ 1056.344097][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbc0c 81abbc34 80000013 ffffffff [ 1056.344430][ C0] r9:8281b500 r8:843c2288 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc34 [ 1056.344686][ C0] [<81abbbf4>] (_raw_spin_lock) from [<809c77ac>] (gpio_mmio_set+0x44/0x80) [ 1056.345157][ C0] r5:00000004 r4:83fdd640 [ 1056.345355][ C0] [<809c7768>] (gpio_mmio_set) from [<809b7f68>] (gpiochip_set+0x1c/0x44) [ 1056.345735][ C0] r7:00000001 r6:00000000 r5:00000002 r4:842aa4a8 [ 1056.345979][ C0] [<809b7f4c>] (gpiochip_set) from [<809ba830>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1056.346489][ C0] [<809ba7b8>] (gpiod_set_raw_value_commit) from [<809bc0d0>] (gpiod_set_value_nocheck+0x44/0x58) [ 1056.346890][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:833eba98 r5:00000001 [ 1056.347232][ C0] r4:842aa4a8 [ 1056.347374][ C0] [<809bc08c>] (gpiod_set_value_nocheck) from [<809bc120>] (gpiod_set_value+0x3c/0x88) [ 1056.347708][ C0] [<809bc0e4>] (gpiod_set_value) from [<809cc8bc>] (gpio_led_set+0x5c/0x60) [ 1056.348073][ C0] r5:000000ff r4:84f90224 [ 1056.348382][ C0] [<809cc860>] (gpio_led_set) from [<809ca1e4>] (led_set_brightness+0x84/0x90) [ 1056.348742][ C0] r5:000000ff r4:84f90224 [ 1056.348912][ C0] [<809ca160>] (led_set_brightness) from [<809cbd64>] (led_trigger_event+0x40/0x58) [ 1056.349243][ C0] r5:000000ff r4:84f90224 [ 1056.349407][ C0] [<809cbd24>] (led_trigger_event) from [<809cd3c0>] (ledtrig_cpu+0xac/0xf4) [ 1056.349720][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 1056.349955][ C0] [<809cd314>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1056.350312][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 1056.350570][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 1056.350921][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 1056.351254][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 1056.351568][ C0] r4:000000ed [ 1056.351713][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf0bc>] (kernel_init+0x0/0x138) [ 1056.352045][ C0] [<81aaefdc>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 1056.352398][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 1056.355043][ C0] Rebooting in 86400 seconds..