last executing test programs: 1.649235772s ago: executing program 1 (id=6673): r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x4, {{0x2, 0x4e20, @local}}}, 0x88) 1.578729011s ago: executing program 1 (id=6675): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) write$binfmt_aout(r0, &(0x7f0000000a80), 0x20) 1.519001019s ago: executing program 1 (id=6676): r0 = socket(0x1d, 0x2, 0x6) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x20000044}, 0x40040d4) 1.42898209s ago: executing program 1 (id=6679): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'team_slave_0\x00', &(0x7f0000000040)=@ethtool_sset_info}) 1.330696902s ago: executing program 1 (id=6680): r0 = syz_open_dev$dmmidi(&(0x7f00000007c0), 0x2, 0x301140) close_range(r0, r0, 0x2) 1.242167754s ago: executing program 1 (id=6682): pipe2(&(0x7f0000000bc0)={0xffffffffffffffff}, 0x10000) read$sequencer(r0, &(0x7f0000000f80)=""/128, 0x80) 1.241895594s ago: executing program 0 (id=6683): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000001040)={0x3}, 0x4) 1.11730528s ago: executing program 0 (id=6684): syz_open_dev$tty1(0xc, 0x4, 0x2) syz_usb_connect$uac1(0x5, 0x71, &(0x7f00000006c0)={{0x12, 0x1, 0x300, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0xe0, 0x9, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x2, 0x3}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x8, 0x5, 0x80, 0x3, {0x7, 0x25, 0x1, 0x80, 0x74, 0xfff9}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x40, 0x4, 0x5, 0x6, {0x7, 0x25, 0x1, 0x0, 0x7f}}}}}}}]}}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0}) 328.437389ms ago: executing program 0 (id=6685): r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f0000000e40)={0x14, 0x0, 0x100, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x4000) 191.470416ms ago: executing program 0 (id=6686): r0 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$AUTOFS_IOC_FAIL(r0, 0x5451, 0x4) 95.097519ms ago: executing program 0 (id=6687): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_ENABLE_SE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x1, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x802}, 0x880) 0s ago: executing program 0 (id=6688): r0 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x5450, 0x0) kernel console output (not intermixed with test programs): blk_file permissive=1 [ 573.816624][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 573.817763][ T29] audit: type=1400 audit(573.730:6616): avc: denied { write } for pid=13737 comm="syz.1.4886" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 573.824868][ T29] audit: type=1400 audit(573.740:6617): avc: denied { write open } for pid=13737 comm="syz.1.4886" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 573.900718][ T29] audit: type=1400 audit(573.810:6618): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 573.910211][ T29] audit: type=1400 audit(573.820:6619): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 573.928237][ T29] audit: type=1400 audit(573.840:6620): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.162443][ T29] audit: type=1400 audit(574.070:6621): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.169144][ T29] audit: type=1400 audit(574.080:6622): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.184371][ T29] audit: type=1400 audit(574.100:6623): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 574.335185][ T29] audit: type=1400 audit(574.250:6624): avc: denied { create } for pid=13745 comm="syz.1.4890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 574.355898][ T29] audit: type=1400 audit(574.270:6625): avc: denied { getopt } for pid=13745 comm="syz.1.4890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 579.040907][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 579.042618][ T29] audit: type=1400 audit(578.950:6692): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.063944][ T29] audit: type=1400 audit(578.980:6693): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.068039][ T29] audit: type=1400 audit(578.980:6694): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.279553][ T29] audit: type=1400 audit(579.190:6695): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.288285][ T29] audit: type=1400 audit(579.200:6696): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.306591][ T29] audit: type=1400 audit(579.220:6697): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.579695][ T29] audit: type=1400 audit(579.490:6698): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.597258][ T29] audit: type=1400 audit(579.510:6699): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.603685][ T29] audit: type=1400 audit(579.520:6700): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 579.889091][ T29] audit: type=1400 audit(579.800:6701): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.250458][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 584.262591][ T29] audit: type=1400 audit(584.160:6764): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.266664][ T29] audit: type=1400 audit(584.180:6765): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.276643][ T29] audit: type=1400 audit(584.190:6766): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.552957][ T29] audit: type=1400 audit(584.460:6767): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.565300][ T29] audit: type=1400 audit(584.480:6768): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.585651][ T29] audit: type=1400 audit(584.500:6769): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.683933][T13917] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=13917 comm=syz.0.4974 [ 584.895380][ T29] audit: type=1400 audit(584.810:6770): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.915487][ T29] audit: type=1400 audit(584.830:6771): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.921636][ T29] audit: type=1400 audit(584.830:6772): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 584.965096][ T29] audit: type=1400 audit(584.880:6773): avc: denied { read } for pid=13920 comm="syz.0.4975" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 589.477387][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 589.482142][ T29] audit: type=1400 audit(589.390:6835): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.484772][ T29] audit: type=1400 audit(589.400:6836): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.490250][ T29] audit: type=1400 audit(589.400:6837): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.744452][ T29] audit: type=1400 audit(589.660:6838): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.749928][ T29] audit: type=1400 audit(589.660:6839): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 589.756940][ T29] audit: type=1400 audit(589.670:6840): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 590.000318][ T29] audit: type=1400 audit(589.910:6841): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 590.007834][ T29] audit: type=1400 audit(589.920:6842): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 590.014286][ T29] audit: type=1400 audit(589.930:6843): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 590.268293][ T29] audit: type=1400 audit(590.180:6844): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 592.135439][T14013] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14013 comm=syz.1.5020 [ 594.845711][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 594.846904][ T29] audit: type=1400 audit(594.760:6893): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 594.849318][ T29] audit: type=1400 audit(594.760:6894): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 594.855037][ T29] audit: type=1400 audit(594.770:6895): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 595.459599][ T29] audit: type=1400 audit(595.370:6896): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 595.474049][ T29] audit: type=1400 audit(595.390:6897): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 595.480970][ T29] audit: type=1400 audit(595.390:6898): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 595.803752][ T29] audit: type=1400 audit(595.720:6899): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 595.806680][ T29] audit: type=1400 audit(595.720:6900): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 595.824559][ T29] audit: type=1400 audit(595.740:6901): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 596.138966][ T29] audit: type=1400 audit(596.050:6902): avc: denied { read } for pid=14054 comm="syz.0.5042" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 599.982477][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 600.002307][ T29] audit: type=1400 audit(599.890:6918): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 600.004203][ T29] audit: type=1400 audit(599.890:6919): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 600.005971][ T29] audit: type=1400 audit(599.920:6920): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.013106][ T29] audit: type=1400 audit(600.930:6921): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.025629][ T29] audit: type=1400 audit(600.940:6922): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.035938][ T29] audit: type=1400 audit(600.950:6923): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.657802][ T29] audit: type=1400 audit(601.570:6924): avc: denied { create } for pid=14082 comm="syz.1.5056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 601.682061][ T29] audit: type=1400 audit(601.590:6925): avc: denied { ioctl } for pid=14082 comm="syz.1.5056" path="socket:[36959]" dev="sockfs" ino=36959 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 601.865216][ T29] audit: type=1400 audit(601.780:6926): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 601.869505][ T29] audit: type=1400 audit(601.780:6927): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.089855][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 605.090252][ T29] audit: type=1400 audit(604.990:6982): avc: denied { read } for pid=14145 comm="syz.1.5088" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 605.107380][ T29] audit: type=1400 audit(605.020:6983): avc: denied { read open } for pid=14145 comm="syz.1.5088" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 605.129699][ T29] audit: type=1400 audit(605.040:6984): avc: denied { ioctl } for pid=14145 comm="syz.1.5088" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6207 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 605.138524][ T29] audit: type=1400 audit(605.050:6985): avc: denied { set_context_mgr } for pid=14145 comm="syz.1.5088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 605.276677][ T29] audit: type=1400 audit(605.190:6986): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.280554][ T29] audit: type=1400 audit(605.190:6987): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.292380][ T29] audit: type=1400 audit(605.200:6988): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.569389][ T29] audit: type=1400 audit(605.480:6989): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.574511][ T29] audit: type=1400 audit(605.490:6990): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 605.579163][ T29] audit: type=1400 audit(605.490:6991): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 608.662404][T14201] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1793 sclass=netlink_audit_socket pid=14201 comm=syz.1.5115 [ 610.190485][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 610.191954][ T29] audit: type=1400 audit(610.100:7049): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 610.198502][ T29] audit: type=1400 audit(610.110:7050): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 610.225685][ T29] audit: type=1400 audit(610.140:7051): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 610.637391][ T29] audit: type=1400 audit(610.550:7052): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 610.640245][ T29] audit: type=1400 audit(610.550:7053): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 610.657189][ T29] audit: type=1400 audit(610.570:7054): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 610.980615][ T29] audit: type=1400 audit(610.880:7055): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 610.987169][ T29] audit: type=1400 audit(610.900:7056): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 611.001635][ T29] audit: type=1400 audit(610.910:7057): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 611.197561][ T29] audit: type=1400 audit(611.110:7058): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 615.459302][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 615.465723][ T29] audit: type=1400 audit(615.370:7104): avc: denied { read } for pid=14284 comm="syz.1.5157" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 615.470392][ T29] audit: type=1400 audit(615.380:7105): avc: denied { read open } for pid=14284 comm="syz.1.5157" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 615.493536][ T29] audit: type=1400 audit(615.410:7106): avc: denied { ioctl } for pid=14284 comm="syz.1.5157" path="/dev/dlm-control" dev="devtmpfs" ino=85 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 615.690265][ T29] audit: type=1400 audit(615.600:7107): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 615.836299][ T29] audit: type=1400 audit(615.750:7108): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 615.869889][ T29] audit: type=1400 audit(615.780:7109): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 616.763701][ T29] audit: type=1400 audit(616.680:7110): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 616.773027][ T29] audit: type=1400 audit(616.680:7111): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 616.889463][ T29] audit: type=1400 audit(616.800:7112): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 617.856435][ T29] audit: type=1400 audit(617.770:7113): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 621.160729][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 621.161155][ T29] audit: type=1400 audit(621.070:7130): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 621.170734][ T29] audit: type=1400 audit(621.080:7131): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 621.269100][ T29] audit: type=1400 audit(621.150:7132): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 621.782170][ T29] audit: type=1400 audit(621.690:7133): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 621.786517][ T29] audit: type=1400 audit(621.700:7134): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 621.816894][ T29] audit: type=1400 audit(621.730:7135): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 622.128924][ T29] audit: type=1400 audit(622.040:7136): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 622.132854][ T29] audit: type=1400 audit(622.050:7137): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 622.136147][ T29] audit: type=1400 audit(622.050:7138): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 622.378604][ T29] audit: type=1400 audit(622.290:7139): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 624.699296][T14364] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1281 sclass=netlink_tcpdiag_socket pid=14364 comm=syz.1.5196 [ 626.164461][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 626.168255][ T29] audit: type=1400 audit(626.080:7197): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 626.455079][ T29] audit: type=1400 audit(626.370:7198): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 626.459326][ T29] audit: type=1400 audit(626.370:7199): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 626.467130][ T29] audit: type=1400 audit(626.380:7200): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 626.615416][ T29] audit: type=1400 audit(626.530:7201): avc: denied { module_request } for pid=14393 comm="syz.1.5211" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 626.933193][ T29] audit: type=1400 audit(626.850:7202): avc: denied { create } for pid=14400 comm="syz.0.5214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 626.939608][ T29] audit: type=1400 audit(626.850:7203): avc: denied { write } for pid=14400 comm="syz.0.5214" path="socket:[36708]" dev="sockfs" ino=36708 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 626.949643][ T29] audit: type=1400 audit(626.860:7204): avc: denied { write } for pid=14400 comm="syz.0.5214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 626.957619][ T29] audit: type=1400 audit(626.870:7205): avc: denied { sys_module } for pid=14393 comm="syz.1.5211" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 626.964703][ T29] audit: type=1400 audit(626.880:7206): avc: denied { module_request } for pid=14393 comm="syz.1.5211" kmod="" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 631.190413][T14467] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14467 comm=syz.1.5246 [ 631.259104][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 631.264374][ T29] audit: type=1400 audit(631.170:7268): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 631.276187][ T29] audit: type=1400 audit(631.190:7269): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 631.294424][ T29] audit: type=1400 audit(631.200:7270): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 631.598982][ T29] audit: type=1400 audit(631.510:7271): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 631.602980][ T29] audit: type=1400 audit(631.510:7272): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 631.606086][ T29] audit: type=1400 audit(631.520:7273): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 631.753597][ T29] audit: type=1400 audit(631.670:7274): avc: denied { create } for pid=14475 comm="syz.1.5251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 631.760302][ T29] audit: type=1400 audit(631.670:7275): avc: denied { write } for pid=14475 comm="syz.1.5251" path="socket:[36835]" dev="sockfs" ino=36835 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 631.764778][ T29] audit: type=1400 audit(631.680:7276): avc: denied { write } for pid=14475 comm="syz.1.5251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 631.800359][ T29] audit: type=1400 audit(631.710:7277): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 634.349538][T14524] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=14524 comm=syz.0.5274 [ 636.450365][ T29] kauditd_printk_skb: 79 callbacks suppressed [ 636.452996][ T29] audit: type=1400 audit(636.360:7357): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 636.458013][ T29] audit: type=1400 audit(636.370:7358): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 636.463910][ T29] audit: type=1400 audit(636.380:7359): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 636.623550][ T29] audit: type=1400 audit(636.540:7360): avc: denied { create } for pid=14559 comm="syz.0.5293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 636.637178][ T29] audit: type=1400 audit(636.550:7361): avc: denied { getopt } for pid=14559 comm="syz.0.5293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 636.717215][ T29] audit: type=1400 audit(636.630:7362): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 636.723251][ T29] audit: type=1400 audit(636.640:7363): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 636.730154][ T29] audit: type=1400 audit(636.640:7364): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 636.946564][ T29] audit: type=1400 audit(636.860:7365): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 636.956264][ T29] audit: type=1400 audit(636.860:7366): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 641.664166][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 641.665375][ T29] audit: type=1400 audit(641.580:7437): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 641.670468][ T29] audit: type=1400 audit(641.580:7438): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 641.678283][ T29] audit: type=1400 audit(641.590:7439): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 641.852464][ T29] audit: type=1400 audit(641.770:7440): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 641.858072][ T29] audit: type=1400 audit(641.770:7441): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 641.864371][ T29] audit: type=1400 audit(641.780:7442): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 642.044360][ T29] audit: type=1400 audit(641.960:7443): avc: denied { create } for pid=14651 comm="syz.1.5339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 642.055414][ T29] audit: type=1400 audit(641.970:7444): avc: denied { ioctl } for pid=14651 comm="syz.1.5339" path="socket:[38221]" dev="sockfs" ino=38221 ioctlcmd=0xf515 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 642.110616][ T29] audit: type=1400 audit(642.020:7445): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 642.122643][ T29] audit: type=1400 audit(642.030:7446): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 646.853977][ T29] kauditd_printk_skb: 79 callbacks suppressed [ 646.862090][ T29] audit: type=1400 audit(646.770:7526): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 646.864286][ T29] audit: type=1400 audit(646.770:7527): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 646.887439][ T29] audit: type=1400 audit(646.800:7528): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 647.130949][ T29] audit: type=1400 audit(647.040:7529): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 647.135857][ T29] audit: type=1400 audit(647.050:7530): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 647.146321][ T29] audit: type=1400 audit(647.060:7531): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 647.393000][ T29] audit: type=1400 audit(647.300:7532): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 647.398587][ T29] audit: type=1400 audit(647.310:7533): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 647.405110][ T29] audit: type=1400 audit(647.320:7534): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 647.688523][ T29] audit: type=1400 audit(647.600:7535): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 647.886220][T14750] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=7 sclass=netlink_route_socket pid=14750 comm=syz.1.5388 [ 649.353792][T14774] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14774 comm=syz.0.5399 [ 651.782594][ T41] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 651.866844][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 651.871005][ T29] audit: type=1400 audit(651.780:7618): avc: denied { ioctl } for pid=14812 comm="syz.1.5419" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 651.942896][ T41] usb 2-1: Using ep0 maxpacket: 16 [ 651.959341][ T29] audit: type=1400 audit(651.870:7619): avc: denied { ioctl } for pid=14812 comm="syz.1.5419" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 651.985266][ T29] audit: type=1400 audit(651.900:7620): avc: denied { ioctl } for pid=14812 comm="syz.1.5419" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 652.000882][ T29] audit: type=1400 audit(651.910:7621): avc: denied { ioctl } for pid=14812 comm="syz.1.5419" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 652.025192][ T29] audit: type=1400 audit(651.940:7622): avc: denied { ioctl } for pid=14812 comm="syz.1.5419" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 652.049327][ T29] audit: type=1400 audit(651.960:7623): avc: denied { ioctl } for pid=14812 comm="syz.1.5419" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 652.059470][ T29] audit: type=1400 audit(651.970:7624): avc: denied { ioctl } for pid=14812 comm="syz.1.5419" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 652.075780][ T29] audit: type=1400 audit(651.990:7625): avc: denied { ioctl } for pid=14812 comm="syz.1.5419" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 652.079601][ T41] usb 2-1: unable to get BOS descriptor or descriptor too short [ 652.105174][ T29] audit: type=1400 audit(652.010:7626): avc: denied { ioctl } for pid=14812 comm="syz.1.5419" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 652.127791][ T29] audit: type=1400 audit(652.040:7627): avc: denied { ioctl } for pid=14812 comm="syz.1.5419" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 652.175587][ T41] usb 2-1: config 1 interface 0 altsetting 2 bulk endpoint 0x1 has invalid maxpacket 16 [ 652.176772][ T41] usb 2-1: config 1 interface 0 altsetting 2 has 2 endpoint descriptors, different from the interface descriptor's value: 1 [ 652.178041][ T41] usb 2-1: config 1 interface 0 has no altsetting 0 [ 652.308314][ T41] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 652.312156][ T41] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 652.315908][ T41] usb 2-1: Product: syz [ 652.317098][ T41] usb 2-1: Manufacturer: syz [ 652.317791][ T41] usb 2-1: SerialNumber: syz [ 652.369155][T14814] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 652.881147][ T41] usb 2-1: USB disconnect, device number 7 [ 655.016482][T14866] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14866 comm=syz.1.5439 [ 656.939003][ T29] kauditd_printk_skb: 79 callbacks suppressed [ 656.940246][ T29] audit: type=1400 audit(656.850:7707): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 656.966049][ T29] audit: type=1400 audit(656.880:7708): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 656.979364][ T29] audit: type=1400 audit(656.880:7709): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 657.172416][ T29] audit: type=1400 audit(657.080:7710): avc: denied { read write } for pid=14895 comm="syz.1.5454" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 657.178683][ T29] audit: type=1400 audit(657.090:7711): avc: denied { read write open } for pid=14895 comm="syz.1.5454" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 657.250615][ T29] audit: type=1400 audit(657.160:7712): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 657.262527][ T29] audit: type=1400 audit(657.170:7713): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 657.263010][ T29] audit: type=1400 audit(657.170:7714): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 657.460883][ T29] audit: type=1400 audit(657.370:7715): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 657.479435][ T29] audit: type=1400 audit(657.390:7716): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 657.844726][T14909] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=14909 comm=syz.0.5461 [ 662.068844][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 662.082527][ T29] audit: type=1400 audit(661.980:7789): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 662.083226][ T29] audit: type=1400 audit(661.990:7790): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 662.083545][ T29] audit: type=1400 audit(661.990:7791): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 662.256521][ T29] audit: type=1400 audit(662.170:7792): avc: denied { module_request } for pid=14977 comm="syz.1.5495" kmod=6E65746465762D03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 662.319634][ T29] audit: type=1400 audit(662.230:7793): avc: denied { read } for pid=14978 comm="syz.0.5496" name="comedi3" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 662.330108][ T29] audit: type=1400 audit(662.240:7794): avc: denied { read open } for pid=14978 comm="syz.0.5496" path="/dev/comedi3" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 662.352788][ T29] audit: type=1400 audit(662.260:7795): avc: denied { ioctl } for pid=14978 comm="syz.0.5496" path="/dev/comedi3" dev="devtmpfs" ino=714 ioctlcmd=0x6612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 662.606719][ T29] audit: type=1400 audit(662.520:7796): avc: denied { sys_module } for pid=14977 comm="syz.1.5495" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 662.613145][ T29] audit: type=1400 audit(662.530:7797): avc: denied { module_request } for pid=14977 comm="syz.1.5495" kmod=03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 663.038375][ T29] audit: type=1400 audit(662.950:7798): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 667.085236][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 667.088747][ T29] audit: type=1400 audit(667.000:7862): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 667.107565][ T29] audit: type=1400 audit(667.020:7863): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 667.113848][ T29] audit: type=1400 audit(667.030:7864): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 667.225772][ T29] audit: type=1400 audit(667.140:7865): avc: denied { allowed } for pid=15054 comm="syz.1.5533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 667.245292][ T29] audit: type=1400 audit(667.160:7866): avc: denied { create } for pid=15054 comm="syz.1.5533" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 667.252096][ T29] audit: type=1400 audit(667.160:7867): avc: denied { map } for pid=15054 comm="syz.1.5533" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39968 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 667.258470][ T29] audit: type=1400 audit(667.170:7868): avc: denied { read write } for pid=15054 comm="syz.1.5533" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39968 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 667.260212][ T29] audit: type=1400 audit(667.170:7869): avc: denied { read } for pid=15055 comm="syz.0.5532" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 667.270453][ T29] audit: type=1400 audit(667.180:7870): avc: denied { read open } for pid=15055 comm="syz.0.5532" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 667.285569][ T29] audit: type=1400 audit(667.200:7871): avc: denied { setattr } for pid=15055 comm="syz.0.5532" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 667.561178][T15060] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15060 comm=syz.1.5535 [ 667.918758][T15065] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15065 comm=syz.0.5537 [ 672.125674][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 672.126297][ T29] audit: type=1400 audit(672.040:7971): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 672.129232][ T29] audit: type=1400 audit(672.040:7972): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 672.133981][ T29] audit: type=1400 audit(672.050:7973): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 672.315840][ T29] audit: type=1400 audit(672.230:7974): avc: denied { create } for pid=15163 comm="syz.1.5586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 672.334414][ T29] audit: type=1400 audit(672.250:7975): avc: denied { ioctl } for pid=15163 comm="syz.1.5586" path="socket:[39620]" dev="sockfs" ino=39620 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 672.450633][ T29] audit: type=1400 audit(672.360:7976): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 672.455457][ T29] audit: type=1400 audit(672.370:7977): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 672.466342][ T29] audit: type=1400 audit(672.380:7978): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 672.586259][ T29] audit: type=1400 audit(672.500:7979): avc: denied { create } for pid=15169 comm="syz.0.5590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 672.603520][ T29] audit: type=1400 audit(672.520:7980): avc: denied { write } for pid=15169 comm="syz.0.5590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 677.224669][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 677.226064][ T29] audit: type=1400 audit(677.140:8051): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 677.237591][ T29] audit: type=1400 audit(677.150:8052): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 677.254620][ T29] audit: type=1400 audit(677.170:8053): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 677.464085][ T29] audit: type=1400 audit(677.380:8054): avc: denied { create } for pid=15251 comm="syz.1.5630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 677.476052][ T29] audit: type=1400 audit(677.390:8055): avc: denied { write } for pid=15251 comm="syz.1.5630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 677.556845][ T29] audit: type=1400 audit(677.470:8056): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 677.570537][ T29] audit: type=1400 audit(677.480:8057): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 677.585613][ T29] audit: type=1400 audit(677.500:8058): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 677.846226][ T29] audit: type=1400 audit(677.760:8059): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 677.849281][ T29] audit: type=1400 audit(677.760:8060): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 678.175211][T15262] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15262 comm=syz.0.5635 [ 681.382292][ T992] usb 1-1: new full-speed USB device number 5 using dummy_hcd [ 681.681967][ T992] usb 1-1: unable to get BOS descriptor or descriptor too short [ 681.710664][ T992] usb 1-1: not running at top speed; connect to a high speed hub [ 681.768404][ T992] usb 1-1: config 1 has an invalid interface number: 2 but max is 1 [ 681.772066][ T992] usb 1-1: config 1 has an invalid interface number: 57 but max is 1 [ 681.773396][ T992] usb 1-1: config 1 has no interface number 0 [ 681.774481][ T992] usb 1-1: config 1 has no interface number 1 [ 681.775513][ T992] usb 1-1: config 1 interface 2 altsetting 8 endpoint 0x5 has invalid maxpacket 1023, setting to 64 [ 681.776714][ T992] usb 1-1: config 1 interface 2 has no altsetting 0 [ 681.777585][ T992] usb 1-1: config 1 interface 57 has no altsetting 0 [ 681.887531][ T992] usb 1-1: New USB device found, idVendor=1514, idProduct=2008, bcdDevice=57.90 [ 681.888629][ T992] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 681.889931][ T992] usb 1-1: Product: syz [ 681.890750][ T992] usb 1-1: Manufacturer: syz [ 681.892470][ T992] usb 1-1: SerialNumber: syz [ 682.174255][ T992] ftdi_sio 1-1:1.2: FTDI USB Serial Device converter detected [ 682.189629][ T992] ftdi_sio ttyUSB0: unknown device type: 0x5790 [ 682.221680][ T992] usb 1-1: USB disconnect, device number 5 [ 682.226132][ T992] ftdi_sio 1-1:1.2: device disconnected [ 682.361953][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 682.362893][ T29] audit: type=1400 audit(682.270:8158): avc: denied { read } for pid=15340 comm="syz.1.5665" dev="nsfs" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 682.364364][ T29] audit: type=1400 audit(682.270:8159): avc: denied { read open } for pid=15340 comm="syz.1.5665" path="net:[4026532737]" dev="nsfs" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 682.369251][ T29] audit: type=1400 audit(682.280:8160): avc: denied { create } for pid=15340 comm="syz.1.5665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 682.447153][ T29] audit: type=1400 audit(682.360:8161): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 682.453050][ T29] audit: type=1400 audit(682.370:8162): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 682.458033][ T29] audit: type=1400 audit(682.370:8163): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 682.675845][ T29] audit: type=1400 audit(682.590:8164): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 682.680672][ T29] audit: type=1400 audit(682.590:8165): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 682.692826][ T29] audit: type=1400 audit(682.600:8166): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 682.852969][ T29] audit: type=1400 audit(682.760:8167): avc: denied { write } for pid=15346 comm="syz.1.5669" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 684.428075][T15375] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15375 comm=syz.1.5682 [ 684.970759][T15383] capability: warning: `syz.1.5686' uses 32-bit capabilities (legacy support in use) [ 685.733602][T15393] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15393 comm=syz.0.5691 [ 687.421872][ T29] kauditd_printk_skb: 79 callbacks suppressed [ 687.427183][ T29] audit: type=1400 audit(687.330:8247): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 687.427599][ T29] audit: type=1400 audit(687.330:8248): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 687.433748][ T29] audit: type=1400 audit(687.350:8249): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 687.649471][ T29] audit: type=1400 audit(687.560:8250): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 687.656215][ T29] audit: type=1400 audit(687.570:8251): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 687.671947][ T29] audit: type=1400 audit(687.570:8252): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 687.920716][ T29] audit: type=1400 audit(687.830:8253): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 687.945676][ T29] audit: type=1400 audit(687.860:8254): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 687.949751][ T29] audit: type=1400 audit(687.860:8255): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 688.252235][ T29] audit: type=1400 audit(688.160:8256): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 692.684834][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 692.686911][ T29] audit: type=1400 audit(692.600:8334): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 692.692722][ T29] audit: type=1400 audit(692.600:8335): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 692.699129][ T29] audit: type=1400 audit(692.610:8336): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 692.974802][ T29] audit: type=1400 audit(692.890:8337): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 692.980184][ T29] audit: type=1400 audit(692.890:8338): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 692.993127][ T29] audit: type=1400 audit(692.900:8339): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 693.223830][ T29] audit: type=1400 audit(693.140:8340): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 693.229187][ T29] audit: type=1400 audit(693.140:8341): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 693.235417][ T29] audit: type=1400 audit(693.150:8342): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 693.513250][ T29] audit: type=1400 audit(693.430:8343): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 694.276596][T15537] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15537 comm=syz.0.5762 [ 697.908458][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 697.909524][ T29] audit: type=1400 audit(697.820:8412): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 697.938082][ T29] audit: type=1400 audit(697.850:8413): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 697.954798][ T29] audit: type=1400 audit(697.870:8414): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 698.204406][ T29] audit: type=1400 audit(698.120:8415): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 698.207556][ T29] audit: type=1400 audit(698.120:8416): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 698.213094][ T29] audit: type=1400 audit(698.120:8417): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 698.480821][ T29] audit: type=1400 audit(698.390:8418): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 698.494704][ T29] audit: type=1400 audit(698.410:8419): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 698.499667][ T29] audit: type=1400 audit(698.410:8420): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 698.553195][T15603] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15603 comm=syz.0.5795 [ 698.751113][ T29] audit: type=1400 audit(698.660:8421): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 702.916104][ T29] kauditd_printk_skb: 104 callbacks suppressed [ 702.917162][ T29] audit: type=1400 audit(702.830:8526): avc: denied { search } for pid=15649 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 702.922403][ T29] audit: type=1400 audit(702.840:8527): avc: denied { search } for pid=15649 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 702.925462][ T29] audit: type=1400 audit(702.840:8528): avc: denied { search } for pid=15649 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 702.932068][ T29] audit: type=1400 audit(702.840:8529): avc: denied { read open } for pid=15649 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 703.113917][ T29] audit: type=1400 audit(703.030:8530): avc: denied { getattr } for pid=15649 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 703.121110][ T29] audit: type=1400 audit(703.030:8531): avc: denied { search } for pid=15649 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 703.134405][ T29] audit: type=1400 audit(703.050:8532): avc: denied { search } for pid=15649 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 703.182663][ T29] audit: type=1400 audit(703.050:8533): avc: denied { search } for pid=15649 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 703.183026][ T29] audit: type=1400 audit(703.050:8534): avc: denied { search } for pid=15649 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 703.185868][ T29] audit: type=1400 audit(703.100:8535): avc: denied { search } for pid=15649 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 706.998758][T15678] syz.1.5830: vmalloc error: size 268435456, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 707.002893][T15678] CPU: 0 UID: 0 PID: 15678 Comm: syz.1.5830 Tainted: G L syzkaller #0 PREEMPT [ 707.003013][T15678] Tainted: [L]=SOFTLOCKUP [ 707.003029][T15678] Hardware name: ARM-Versatile Express [ 707.003079][T15678] Call trace: [ 707.003108][T15678] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 707.003222][T15678] r7:ffffffff r6:822b1608 r5:60000013 r4:822956f0 [ 707.003235][T15678] [<80201b58>] (show_stack) from [<8021ee24>] (dump_stack_lvl+0x70/0x7c) [ 707.003269][T15678] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 707.003301][T15678] r5:84431800 r4:00000000 [ 707.003310][T15678] [<8021ee30>] (dump_stack) from [<80509848>] (warn_alloc+0xd8/0x180) [ 707.003342][T15678] [<80509770>] (warn_alloc) from [<804f7d4c>] (__vmalloc_node_range_noprof+0xc0/0x654) [ 707.003376][T15678] r3:10000000 r2:822b1608 [ 707.003390][T15678] r6:00000dc0 r5:822b1640 r4:ff800000 [ 707.003399][T15678] [<804f7c8c>] (__vmalloc_node_range_noprof) from [<804f8548>] (vzalloc_noprof+0x6c/0x74) [ 707.003440][T15678] r10:b5403587 r9:00000000 r8:85390000 r7:00000010 r6:85d94c40 r5:00000000 [ 707.003451][T15678] r4:00000000 [ 707.003460][T15678] [<804f84dc>] (vzalloc_noprof) from [<8176caac>] (xt_counters_alloc+0x28/0x34) [ 707.003499][T15678] r4:85d94c00 [ 707.003507][T15678] [<8176ca84>] (xt_counters_alloc) from [<818320bc>] (do_arpt_set_ctl+0x338/0x814) [ 707.003541][T15678] [<81831d84>] (do_arpt_set_ctl) from [<816f4b18>] (nf_setsockopt+0x60/0x7c) [ 707.003585][T15678] r10:00000126 r9:84431800 r8:00000060 r7:854a4780 r6:846c2640 r5:81831d84 [ 707.003609][T15678] r4:829f1a08 [ 707.003627][T15678] [<816f4abc>] (nf_setsockopt) from [<81793210>] (ip_setsockopt+0x88/0x98) [ 707.003670][T15678] r6:846c2640 r5:00000060 r4:00000060 [ 707.003679][T15678] [<8179318c>] (ip_setsockopt) from [<817d86f4>] (udp_setsockopt+0x38/0x64) [ 707.003714][T15678] r6:00000060 r5:00000000 r4:817d86bc [ 707.003723][T15678] [<817d86c0>] (udp_setsockopt) from [<81599cbc>] (sock_common_setsockopt+0x38/0x40) [ 707.003762][T15678] r4:817d86bc [ 707.003771][T15678] [<81599c88>] (sock_common_setsockopt) from [<815954f8>] (do_sock_setsockopt+0x70/0xc8) [ 707.003805][T15678] r4:81599c84 [ 707.003813][T15678] [<81595488>] (do_sock_setsockopt) from [<81598954>] (__sys_setsockopt+0x7c/0xc4) [ 707.003852][T15678] r8:00000000 r7:853db900 r6:853db901 r5:00000060 r4:00000000 [ 707.003861][T15678] [<815988d8>] (__sys_setsockopt) from [<815989b8>] (sys_setsockopt+0x1c/0x24) [ 707.003900][T15678] r8:8020029c r7:00000126 r6:00316318 r5:00000000 r4:00000060 [ 707.003909][T15678] [<8159899c>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 707.003940][T15678] Exception stack(0xf4b4dfa8 to 0xf4b4dff0) [ 707.003963][T15678] dfa0: 00000060 00000000 00000003 00000000 00000060 20000000 [ 707.003982][T15678] dfc0: 00000060 00000000 00316318 00000126 00300000 00000000 00006364 76f7a0bc [ 707.003997][T15678] dfe0: 76f79ec0 76f79eb0 0001929c 00132320 [ 707.014541][T15678] Mem-Info: [ 707.014995][T15678] active_anon:1258 inactive_anon:0 isolated_anon:0 [ 707.014995][T15678] active_file:6144 inactive_file:35525 isolated_file:0 [ 707.014995][T15678] unevictable:768 dirty:7 writeback:0 [ 707.014995][T15678] slab_reclaimable:1087 slab_unreclaimable:40221 [ 707.014995][T15678] mapped:2332 shmem:777 pagetables:399 [ 707.014995][T15678] sec_pagetables:0 bounce:0 [ 707.014995][T15678] kernel_misc_reclaimable:0 [ 707.014995][T15678] free:373597 free_pcp:1413 free_cma:4032 [ 707.016743][T15678] Node 0 active_anon:5032kB inactive_anon:0kB active_file:24576kB inactive_file:142100kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:9328kB dirty:28kB writeback:0kB shmem:3108kB kernel_stack:1432kB pagetables:1596kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 707.017838][T15678] Normal free:1238980kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:1816kB unevictable:0kB writepending:4kB zspages:0kB present:1556480kB managed:1426900kB mlocked:0kB bounce:0kB free_pcp:5652kB local_pcp:2896kB free_cma:0kB [ 707.019236][T15678] lowmem_reserve[]: 0 4224 4224 [ 707.020375][T15678] Normal: 3*4kB (UME) 1*8kB (E) 1*16kB (M) 1*32kB (M) 2*64kB (UM) 2*128kB (UE) 2*256kB (M) 4*512kB (M) 5*1024kB (ME) 3*2048kB (ME) 299*4096kB (UM) = 1238980kB [ 707.026480][T15678] 42446 total pagecache pages [ 707.026909][T15678] 0 pages in swap cache [ 707.027358][T15678] Free swap = 124996kB [ 707.027739][T15678] Total swap = 124996kB [ 707.028091][T15678] 524288 pages RAM [ 707.028420][T15678] 135168 pages HighMem/MovableOnly [ 707.028775][T15678] 32395 pages reserved [ 707.029248][T15678] 4096 pages cma reserved [ 707.784468][T15689] SELinux: Context system_u:object_r:syslogd_var_run_t:s0 is not valid (left unmapped). [ 708.074668][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 708.078543][ T29] audit: type=1400 audit(707.990:8664): avc: denied { read } for pid=15691 comm="syz.1.5837" dev="nsfs" ino=4026532647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 708.080559][ T29] audit: type=1400 audit(707.990:8665): avc: denied { read open } for pid=15691 comm="syz.1.5837" path="mnt:[4026532647]" dev="nsfs" ino=4026532647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 708.170408][ T29] audit: type=1400 audit(708.080:8666): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 708.176720][ T29] audit: type=1400 audit(708.090:8667): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 708.192024][ T29] audit: type=1400 audit(708.100:8668): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 708.423826][ T29] audit: type=1400 audit(708.340:8669): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 708.428809][ T29] audit: type=1400 audit(708.340:8670): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 708.445585][ T29] audit: type=1400 audit(708.360:8671): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 708.618335][ T29] audit: type=1400 audit(708.530:8672): avc: denied { write } for pid=15700 comm="syz.0.5842" name="arp" dev="proc" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 708.620910][ T29] audit: type=1400 audit(708.530:8673): avc: denied { write } for pid=15700 comm="syz.0.5842" path="/proc/5982/net/arp" dev="proc" ino=4026532665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 713.176521][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 713.177178][ T29] audit: type=1400 audit(713.090:8741): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.185637][ T29] audit: type=1400 audit(713.100:8742): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.188790][ T29] audit: type=1400 audit(713.100:8743): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.314915][ T29] audit: type=1400 audit(713.230:8744): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.317996][ T29] audit: type=1400 audit(713.230:8745): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.327356][ T29] audit: type=1400 audit(713.240:8746): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.460578][ T29] audit: type=1400 audit(713.370:8747): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.464705][ T29] audit: type=1400 audit(713.380:8748): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.473895][ T29] audit: type=1400 audit(713.390:8749): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 713.590376][ T29] audit: type=1400 audit(713.500:8750): avc: denied { read append } for pid=15787 comm="syz.1.5885" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 713.702130][T15790] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15790 comm=syz.0.5886 [ 717.654043][T15863] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=263 sclass=netlink_tcpdiag_socket pid=15863 comm=syz.0.5921 [ 718.440916][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 718.449452][ T29] audit: type=1400 audit(718.350:8848): avc: denied { create } for pid=15877 comm="syz.0.5930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 718.452131][ T29] audit: type=1400 audit(718.360:8849): avc: denied { setopt } for pid=15877 comm="syz.0.5930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 719.387454][T15888] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15888 comm=syz.0.5935 [ 719.606358][ T29] audit: type=1400 audit(719.520:8850): avc: denied { read } for pid=15889 comm="syz.0.5936" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 719.613721][ T29] audit: type=1400 audit(719.530:8851): avc: denied { read open } for pid=15889 comm="syz.0.5936" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 720.529687][ T29] audit: type=1400 audit(720.440:8852): avc: denied { map } for pid=15897 comm="syz.0.5940" path="socket:[41774]" dev="sockfs" ino=41774 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 720.756363][ T29] audit: type=1400 audit(720.670:8853): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 720.760220][ T29] audit: type=1400 audit(720.670:8854): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 720.775398][ T29] audit: type=1400 audit(720.690:8855): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 721.025821][ T29] audit: type=1400 audit(720.930:8856): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 721.029824][ T29] audit: type=1400 audit(720.940:8857): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 721.667629][T15915] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15915 comm=syz.1.5948 [ 721.700354][T15916] binder: 15914:15916 ioctl c018620c 20000440 returned -1 [ 722.316983][T15924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5137 sclass=netlink_route_socket pid=15924 comm=syz.0.5953 [ 723.450715][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 723.460631][ T29] audit: type=1400 audit(723.360:8895): avc: denied { write } for pid=15940 comm="syz.1.5962" name="dsp" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 723.466815][ T29] audit: type=1400 audit(723.380:8896): avc: denied { write open } for pid=15940 comm="syz.1.5962" path="/dev/dsp" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 723.537728][ T29] audit: type=1400 audit(723.450:8897): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 723.551867][ T29] audit: type=1400 audit(723.460:8898): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 723.555769][ T29] audit: type=1400 audit(723.470:8899): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 723.731854][ T29] audit: type=1400 audit(723.640:8900): avc: denied { create } for pid=15944 comm="syz.1.5964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 723.751802][ T29] audit: type=1400 audit(723.660:8901): avc: denied { ioctl } for pid=15944 comm="syz.1.5964" path="socket:[42482]" dev="sockfs" ino=42482 ioctlcmd=0x8902 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 723.815950][ T29] audit: type=1400 audit(723.730:8902): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 723.821197][ T29] audit: type=1400 audit(723.730:8903): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 723.827097][ T29] audit: type=1400 audit(723.740:8904): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 725.628437][T15977] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15977 comm=syz.0.5980 [ 728.470213][ T29] kauditd_printk_skb: 79 callbacks suppressed [ 728.470932][ T29] audit: type=1400 audit(728.380:8984): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 728.477674][ T29] audit: type=1400 audit(728.390:8985): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 728.481155][ T29] audit: type=1400 audit(728.390:8986): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 728.728176][ T29] audit: type=1400 audit(728.640:8987): avc: denied { read write } for pid=16032 comm="syz.0.6008" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 728.732154][ T29] audit: type=1400 audit(728.640:8988): avc: denied { read write open } for pid=16032 comm="syz.0.6008" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 728.737242][ T29] audit: type=1400 audit(728.650:8989): avc: denied { map } for pid=16032 comm="syz.0.6008" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 728.739897][ T29] audit: type=1400 audit(728.650:8990): avc: denied { read } for pid=16032 comm="syz.0.6008" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 728.858872][ T29] audit: type=1400 audit(728.770:8991): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 728.867662][ T29] audit: type=1400 audit(728.780:8992): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 728.870858][ T29] audit: type=1400 audit(728.780:8993): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 730.725871][T16070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16070 comm=syz.0.6026 [ 733.484164][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 733.492459][ T29] audit: type=1400 audit(733.400:9044): avc: denied { write } for pid=16102 comm="syz.1.6042" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_run_t:s0" [ 733.494595][ T29] audit: type=1400 audit(733.400:9045): avc: denied { write open } for pid=16102 comm="syz.1.6042" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_run_t:s0" [ 733.506476][ T29] audit: type=1400 audit(733.420:9046): avc: denied { ioctl } for pid=16102 comm="syz.1.6042" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_run_t:s0" [ 733.608652][ T29] audit: type=1400 audit(733.520:9047): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 733.612020][ T29] audit: type=1400 audit(733.520:9048): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 733.649658][ T29] audit: type=1400 audit(733.560:9049): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 733.856427][ T29] audit: type=1400 audit(733.770:9050): avc: denied { create } for pid=16107 comm="syz.1.6044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 733.982222][ T29] audit: type=1400 audit(733.890:9051): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 733.985278][ T29] audit: type=1400 audit(733.900:9052): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 733.996250][ T29] audit: type=1400 audit(733.910:9053): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 736.955510][T16157] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16157 comm=syz.1.6069 [ 738.597509][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 738.598577][ T29] audit: type=1400 audit(738.510:9120): avc: denied { append } for pid=16172 comm="syz.1.6077" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 738.605031][ T29] audit: type=1400 audit(738.520:9121): avc: denied { append open } for pid=16172 comm="syz.1.6077" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 738.615251][ T29] audit: type=1400 audit(738.530:9122): avc: denied { ioctl } for pid=16172 comm="syz.1.6077" path="/dev/sequencer" dev="devtmpfs" ino=721 ioctlcmd=0x6d00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 738.678623][ T29] audit: type=1400 audit(738.590:9123): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 738.685547][ T29] audit: type=1400 audit(738.590:9124): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 738.688082][ T29] audit: type=1400 audit(738.600:9125): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 738.930728][ T29] audit: type=1400 audit(738.840:9126): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 738.943035][ T29] audit: type=1400 audit(738.850:9127): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 738.944976][ T29] audit: type=1400 audit(738.850:9128): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 739.158183][ T29] audit: type=1400 audit(739.070:9129): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 743.137421][T16236] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5130 sclass=netlink_route_socket pid=16236 comm=syz.0.6109 [ 743.859092][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 743.860247][ T29] audit: type=1400 audit(743.770:9196): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 743.886452][ T29] audit: type=1400 audit(743.800:9197): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 743.889816][ T29] audit: type=1400 audit(743.800:9198): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 743.915105][ T29] audit: type=1400 audit(743.830:9199): avc: denied { read } for pid=16246 comm="syz.0.6114" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 743.917730][ T29] audit: type=1400 audit(743.830:9200): avc: denied { read open } for pid=16246 comm="syz.0.6114" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 743.939143][ T29] audit: type=1400 audit(743.850:9201): avc: denied { create } for pid=16246 comm="syz.0.6114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 744.090299][ T29] audit: type=1400 audit(744.000:9202): avc: denied { read append } for pid=16248 comm="syz.1.6115" name="comedi4" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.094890][ T29] audit: type=1400 audit(744.010:9203): avc: denied { read open } for pid=16248 comm="syz.1.6115" path="/dev/comedi4" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.116198][ T29] audit: type=1400 audit(744.030:9204): avc: denied { ioctl } for pid=16248 comm="syz.1.6115" path="/dev/comedi4" dev="devtmpfs" ino=715 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.229200][ T29] audit: type=1400 audit(744.140:9205): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 748.947781][T16326] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=16326 comm=syz.0.6154 [ 749.085295][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 749.089266][ T29] audit: type=1400 audit(749.000:9274): avc: denied { read } for pid=16328 comm="syz.0.6155" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 749.089726][ T29] audit: type=1400 audit(749.000:9275): avc: denied { read open } for pid=16328 comm="syz.0.6155" path="/dev/random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 749.199952][ T29] audit: type=1400 audit(749.110:9276): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.216554][ T29] audit: type=1400 audit(749.130:9277): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.232679][ T29] audit: type=1400 audit(749.140:9278): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.355116][ T29] audit: type=1400 audit(749.270:9279): avc: denied { create } for pid=16332 comm="syz.0.6158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 749.360985][ T29] audit: type=1400 audit(749.270:9280): avc: denied { write } for pid=16332 comm="syz.0.6158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 749.544771][ T29] audit: type=1400 audit(749.460:9281): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.548188][ T29] audit: type=1400 audit(749.460:9282): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 749.552658][ T29] audit: type=1400 audit(749.470:9283): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.190735][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 754.192671][ T29] audit: type=1400 audit(754.100:9351): avc: denied { read } for pid=16409 comm="syz.1.6194" dev="nsfs" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 754.197469][ T29] audit: type=1400 audit(754.110:9352): avc: denied { read open } for pid=16409 comm="syz.1.6194" path="net:[4026532737]" dev="nsfs" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 754.200318][ T29] audit: type=1400 audit(754.110:9353): avc: denied { create } for pid=16409 comm="syz.1.6194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 754.221744][ T29] audit: type=1400 audit(754.130:9354): avc: denied { getopt } for pid=16409 comm="syz.1.6194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 754.267140][ T29] audit: type=1400 audit(754.180:9355): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.269106][ T29] audit: type=1400 audit(754.180:9356): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.290407][ T29] audit: type=1400 audit(754.200:9357): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.612459][ T29] audit: type=1400 audit(754.520:9358): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.627918][ T29] audit: type=1400 audit(754.540:9359): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 754.644286][ T29] audit: type=1400 audit(754.560:9360): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.229143][ T29] kauditd_printk_skb: 76 callbacks suppressed [ 759.232335][ T29] audit: type=1400 audit(759.140:9437): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.233891][ T29] audit: type=1400 audit(759.150:9438): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.237521][ T29] audit: type=1400 audit(759.150:9439): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.555820][ T29] audit: type=1400 audit(759.460:9440): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.557782][ T29] audit: type=1400 audit(759.470:9441): avc: denied { create } for pid=16501 comm="syz.0.6240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 759.564532][ T29] audit: type=1400 audit(759.480:9442): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.575437][ T29] audit: type=1400 audit(759.480:9443): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 759.579886][ T29] audit: type=1400 audit(759.490:9444): avc: denied { ioctl } for pid=16501 comm="syz.0.6240" path="socket:[44507]" dev="sockfs" ino=44507 ioctlcmd=0x8919 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 759.863846][ T29] audit: type=1400 audit(759.780:9445): avc: denied { create } for pid=16504 comm="syz.0.6242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 759.871107][ T29] audit: type=1400 audit(759.780:9446): avc: denied { write } for pid=16504 comm="syz.0.6242" path="socket:[44517]" dev="sockfs" ino=44517 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 764.539239][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 764.539587][ T29] audit: type=1400 audit(764.450:9525): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.552119][ T29] audit: type=1400 audit(764.460:9526): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.552484][ T29] audit: type=1400 audit(764.460:9527): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.719801][ T29] audit: type=1400 audit(764.630:9528): avc: denied { create } for pid=16586 comm="syz.1.6282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 764.758737][ T29] audit: type=1400 audit(764.670:9529): avc: denied { write } for pid=16586 comm="syz.1.6282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 764.836590][ T29] audit: type=1400 audit(764.750:9530): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.840281][ T29] audit: type=1400 audit(764.750:9531): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 764.852076][ T29] audit: type=1400 audit(764.760:9532): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.020815][ T29] audit: type=1400 audit(764.930:9533): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 765.028314][ T29] audit: type=1400 audit(764.940:9534): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.712293][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 769.716288][ T29] audit: type=1400 audit(769.620:9601): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.736711][ T29] audit: type=1400 audit(769.650:9602): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.745820][ T29] audit: type=1400 audit(769.660:9603): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.965321][ T29] audit: type=1400 audit(769.880:9604): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.968076][ T29] audit: type=1400 audit(769.880:9605): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 769.972704][ T29] audit: type=1400 audit(769.880:9606): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 770.118866][ T29] audit: type=1400 audit(770.020:9607): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 770.119425][ T29] audit: type=1400 audit(770.030:9608): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 770.122126][ T29] audit: type=1400 audit(770.030:9609): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 770.236944][ T29] audit: type=1400 audit(770.150:9610): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 774.763082][ T29] kauditd_printk_skb: 95 callbacks suppressed [ 774.766877][ T29] audit: type=1400 audit(774.670:9706): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 774.782125][ T29] audit: type=1400 audit(774.690:9707): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 774.787267][ T29] audit: type=1400 audit(774.700:9708): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 775.033487][ T29] audit: type=1400 audit(774.950:9709): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 775.039218][ T29] audit: type=1400 audit(774.950:9710): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 775.060143][ T29] audit: type=1400 audit(774.970:9711): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 775.146526][ T29] audit: type=1400 audit(775.060:9712): avc: denied { read } for pid=16770 comm="syz.1.6374" dev="nsfs" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 775.149558][ T29] audit: type=1400 audit(775.060:9713): avc: denied { read open } for pid=16770 comm="syz.1.6374" path="net:[4026532737]" dev="nsfs" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 775.159190][ T29] audit: type=1400 audit(775.070:9714): avc: denied { create } for pid=16770 comm="syz.1.6374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 775.204116][ T29] audit: type=1400 audit(775.120:9715): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 775.245399][T16773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16773 comm=syz.0.6373 [ 779.774248][ T29] kauditd_printk_skb: 79 callbacks suppressed [ 779.781810][ T29] audit: type=1400 audit(779.690:9795): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 779.783919][ T29] audit: type=1400 audit(779.690:9796): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 779.785821][ T29] audit: type=1400 audit(779.690:9797): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.039123][ T29] audit: type=1400 audit(779.950:9798): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.050535][ T29] audit: type=1400 audit(779.950:9799): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.068038][ T29] audit: type=1400 audit(779.980:9800): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.310611][ T29] audit: type=1400 audit(780.220:9801): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.317423][ T29] audit: type=1400 audit(780.230:9802): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.324775][ T29] audit: type=1400 audit(780.240:9803): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 780.515893][ T29] audit: type=1400 audit(780.430:9804): avc: granted { setsecparam } for pid=16864 comm="syz.0.6420" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 784.837845][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 784.838264][ T29] audit: type=1400 audit(784.750:9938): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 784.838524][ T29] audit: type=1400 audit(784.750:9939): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 784.848272][ T29] audit: type=1400 audit(784.760:9940): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 784.945884][ T29] audit: type=1400 audit(784.860:9941): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 784.949129][ T29] audit: type=1400 audit(784.860:9942): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 784.962978][ T29] audit: type=1400 audit(784.860:9943): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 785.035135][ T29] audit: type=1400 audit(784.950:9944): avc: denied { read write } for pid=17009 comm="syz.1.6488" name="profiling" dev="sysfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:var_lock_t:s0" [ 785.036529][ T29] audit: type=1400 audit(784.950:9945): avc: denied { open } for pid=17009 comm="syz.1.6488" path="/sys/kernel/profiling" dev="sysfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:var_lock_t:s0" [ 785.087579][ T29] audit: type=1400 audit(785.000:9946): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 785.088994][ T29] audit: type=1400 audit(785.000:9947): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 787.850576][T17112] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=17112 comm=syz.0.6539 [ 789.880615][ T29] kauditd_printk_skb: 190 callbacks suppressed [ 789.882797][ T29] audit: type=1400 audit(789.790:10138): avc: denied { read write } for pid=17186 comm="syz.1.6577" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 789.886852][ T29] audit: type=1400 audit(789.800:10139): avc: denied { read write open } for pid=17186 comm="syz.1.6577" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 789.939722][ T29] audit: type=1400 audit(789.850:10140): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 789.955850][ T29] audit: type=1400 audit(789.870:10141): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 789.961926][ T29] audit: type=1400 audit(789.870:10142): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 790.034507][T17199] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17199 comm=syz.1.6579 [ 790.057155][ T29] audit: type=1400 audit(789.970:10143): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 790.059810][ T29] audit: type=1400 audit(789.970:10144): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 790.063700][ T29] audit: type=1400 audit(789.980:10145): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 790.153774][ T29] audit: type=1400 audit(790.070:10146): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 790.157537][ T29] audit: type=1400 audit(790.070:10147): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 793.953490][T17348] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17348 comm=syz.1.6653 [ 794.893514][ T29] kauditd_printk_skb: 157 callbacks suppressed [ 794.895183][ T29] audit: type=1400 audit(794.810:10305): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.902126][ T29] audit: type=1400 audit(794.810:10306): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.904224][ T29] audit: type=1400 audit(794.820:10307): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.958766][ T29] audit: type=1400 audit(794.870:10308): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.960391][ T29] audit: type=1400 audit(794.870:10309): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 794.964968][ T29] audit: type=1400 audit(794.880:10310): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 795.042931][ T29] audit: type=1400 audit(794.960:10311): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 795.044273][ T29] audit: type=1400 audit(794.960:10312): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 795.047851][ T29] audit: type=1400 audit(794.960:10313): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 795.104115][ T29] audit: type=1400 audit(795.020:10314): avc: denied { create } for pid=17394 comm="syz.1.6676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 795.732189][ T992] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 795.892038][ T992] usb 1-1: Using ep0 maxpacket: 32 [ 795.910873][ T992] usb 1-1: unable to get BOS descriptor or descriptor too short [ 795.921918][ T992] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 795.922347][ T992] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 795.922594][ T992] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 795.945587][ T992] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 795.945813][ T992] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 795.945981][ T992] usb 1-1: Product: syz [ 795.946126][ T992] usb 1-1: Manufacturer: syz [ 795.946273][ T992] usb 1-1: SerialNumber: syz [ 796.182901][ T992] usb 1-1: 0:2 : does not exist [ 796.223626][ T992] usb 1-1: USB disconnect, device number 6 [ 796.314416][T17432] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=17432 comm=syz.0.6685 [ 1254.291749][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 431s! [swapper/0:0] [ 1254.292084][ C0] Modules linked in: [ 1254.292382][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 1254.292466][ C0] Tainted: [L]=SOFTLOCKUP [ 1254.292487][ C0] Hardware name: ARM-Versatile Express [ 1254.292564][ C0] PC is at _raw_spin_unlock_irq+0x28/0x54 [ 1254.292686][ C0] LR is at tmigr_handle_remote_up+0x218/0x4b0 [ 1254.292753][ C0] pc : [<81abba3c>] lr : [<80346da4>] psr: 60000113 [ 1254.292801][ C0] sp : 82801be0 ip : 82801bf0 fp : 82801bec [ 1254.292843][ C0] r10: 00000001 r9 : 8280c9a4 r8 : 00000001 [ 1254.292890][ C0] r7 : ddddb488 r6 : 82801cb8 r5 : 830bf3b0 r4 : 830bf380 [ 1254.292934][ C0] r3 : 0000bcaf r2 : ffffffff r1 : 00000000 r0 : ddddb488 [ 1254.293063][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 1254.293141][ C0] Control: 30c5387d Table: 84cf7340 DAC: fffffffd [ 1254.293209][ C0] Call trace: [ 1254.293273][ C0] [<81abba14>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 1254.293365][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 1254.293444][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 1254.293465][ C0] r4:830bf380 [ 1254.293481][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 1254.293575][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 1254.293595][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 1254.293658][ C0] r4:82804084 [ 1254.293678][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 1254.293737][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 1254.293804][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 1254.293825][ C0] r4:8281b500 [ 1254.293841][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 1254.293903][ C0] r5:8247f12c r4:826c3a9c [ 1254.293920][ C0] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 1254.293982][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1254.294040][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 1254.294086][ C0] 1dc0: 00000001 00000000 [ 1254.294123][ C0] 1de0: 00001b27 00001b25 84230968 00000004 00000001 84230968 83f86a88 84230840 [ 1254.294158][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbbcc 81abbc00 80000013 ffffffff [ 1254.294193][ C0] r9:8281b500 r8:83f86a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc00 [ 1254.294211][ C0] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 1254.294299][ C0] r5:00000004 r4:84230840 [ 1254.294318][ C0] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 1254.294389][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841337a8 [ 1254.294406][ C0] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1254.294460][ C0] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 1254.294532][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83907218 r5:00000001 [ 1254.294554][ C0] r4:841337a8 [ 1254.294573][ C0] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 1254.294625][ C0] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 1254.294681][ C0] r5:000000ff r4:845b1a24 [ 1254.294698][ C0] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 1254.294752][ C0] r5:000000ff r4:845b1a24 [ 1254.294770][ C0] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 1254.294826][ C0] r5:000000ff r4:845b1a24 [ 1254.294844][ C0] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 1254.294904][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 1254.294923][ C0] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1254.295002][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 1254.295024][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 1254.295135][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 1254.295208][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 1254.295231][ C0] r4:000000ed [ 1254.295253][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf07c>] (kernel_init+0x0/0x138) [ 1254.295328][ C0] [<81aaef9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 1254.295409][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 1254.296253][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1254.296953][ C1] NMI backtrace for cpu 1 [ 1254.297184][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT [ 1254.297247][ C1] Tainted: [L]=SOFTLOCKUP [ 1254.297281][ C1] Hardware name: ARM-Versatile Express [ 1254.297302][ C1] PC is at _raw_spin_lock+0x4c/0x58 [ 1254.297377][ C1] LR is at _raw_spin_lock+0x18/0x58 [ 1254.297404][ C1] pc : [<81abbc00>] lr : [<81abbbcc>] psr: 80000113 [ 1254.297424][ C1] sp : df805d68 ip : df805d68 fp : df805d7c [ 1254.297442][ C1] r10: 81c05450 r9 : 84230840 r8 : 83f86a88 [ 1254.297459][ C1] r7 : 84230968 r6 : 00000000 r5 : 00000001 r4 : 84230968 [ 1254.297479][ C1] r3 : 00001b25 r2 : 00001b26 r1 : 00000000 r0 : 00000001 [ 1254.297499][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1254.297533][ C1] Control: 30c5387d Table: 85e42040 DAC: 00000000 [ 1254.297551][ C1] Call trace: frame pointer underflow [ 1254.297620][ C1] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 1254.297694][ C1] r5:00000001 r4:84230840 [ 1254.297712][ C1] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 1254.297782][ C1] r7:00000000 r6:00000000 r5:00000000 r4:84133780 [ 1254.297798][ C1] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1254.297845][ C1] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 1254.297903][ C1] r10:81c05450 r9:df805ebc r8:00000102 r7:0000c20e r6:00000008 r5:00000000 [ 1254.297922][ C1] r4:84133780 [ 1254.297935][ C1] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 1254.297980][ C1] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 1254.298029][ C1] r5:845b1844 r4:845b1844 [ 1254.298043][ C1] [<809cc820>] (gpio_led_set) from [<809ca114>] (led_set_brightness_nosleep+0x38/0x44) [ 1254.298090][ C1] r5:845b1844 r4:84bfd18c [ 1254.298104][ C1] [<809ca0dc>] (led_set_brightness_nosleep) from [<809cd178>] (led_heartbeat_function+0x84/0x144) [ 1254.298149][ C1] [<809cd0f4>] (led_heartbeat_function) from [<80326f70>] (call_timer_fn+0x30/0x220) [ 1254.298210][ C1] r7:0000c20e r6:809cd0f4 r5:84bfd18c r4:83216000 [ 1254.298225][ C1] [<80326f40>] (call_timer_fn) from [<80327424>] (__run_timers+0x2c4/0x3f8) [ 1254.298291][ C1] r9:df805ebc r8:0000c20e r7:00000000 r6:809cd0f4 r5:dddd9f00 r4:84bfd18c [ 1254.298308][ C1] [<80327160>] (__run_timers) from [<803275c0>] (run_timer_base+0x68/0x78) [ 1254.298366][ C1] r10:83216000 r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 [ 1254.298385][ C1] r4:dddd9f00 [ 1254.298399][ C1] [<80327558>] (run_timer_base) from [<803275ec>] (run_timer_softirq+0x1c/0x34) [ 1254.298446][ C1] r4:82804084 [ 1254.298459][ C1] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 1254.298511][ C1] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 1254.298574][ C1] r10:00000000 r9:83216000 r8:00000000 r7:df865e20 r6:82443ff8 r5:8247f12c [ 1254.298592][ C1] r4:83216000 [ 1254.298606][ C1] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 1254.298655][ C1] r5:8247f12c r4:826c3a9c [ 1254.298669][ C1] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 1254.298725][ C1] [<81aad5e8>] (generic_handle_arch_irq) from [<81a7d614>] (call_with_stack+0x1c/0x20) [ 1254.298786][ C1] r9:83216000 r8:83f86a88 r7:df865e54 r6:ffffffff r5:20000013 r4:809c7f4c [ 1254.298801][ C1] [<81a7d5f8>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 1254.298851][ C1] Exception stack(0xdf865e20 to 0xdf865e68) [ 1254.298890][ C1] 5e20: e024e008 00000009 00001b25 809c7f4c 84230840 00000008 00000001 84230968 [ 1254.298920][ C1] 5e40: 83f86a88 84230840 00000000 df865e8c df865e58 df865e70 809c778c 809c7f4c [ 1254.298941][ C1] 5e60: 20000013 ffffffff [ 1254.298958][ C1] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 1254.299020][ C1] r7:00000001 r6:00000000 r5:00000003 r4:841337bc [ 1254.299034][ C1] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1254.299120][ C1] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 1254.299178][ C1] r10:00000000 r9:00000000 r8:00000001 r7:ddde24c0 r6:839073d8 r5:00000001 [ 1254.299195][ C1] r4:841337bc [ 1254.299207][ C1] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 1254.299247][ C1] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 1254.299303][ C1] r5:000000ff r4:845b1b14 [ 1254.299318][ C1] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 1254.299365][ C1] r5:000000ff r4:845b1b14 [ 1254.299384][ C1] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 1254.299446][ C1] r5:000000ff r4:845b1b14 [ 1254.299481][ C1] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 1254.299554][ C1] r7:ddde24c0 r6:00000002 r5:82b15cd8 r4:000000fe [ 1254.299577][ C1] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1254.299673][ C1] r9:00000000 r8:00000001 r7:8280c710 r6:83216000 r5:8280c6d0 r4:00000001 [ 1254.299713][ C1] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 1254.299784][ C1] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 1254.299857][ C1] r10:00000000 r9:414fc0f0 r8:80003000 r7:82a7b4a4 r6:83216000 r5:00000001 [ 1254.299884][ C1] r4:00000092 [ 1254.299903][ C1] [<802b1b08>] (cpu_startup_entry) from [<8022f360>] (secondary_start_kernel+0x128/0x194) [ 1254.299975][ C1] [<8022f238>] (secondary_start_kernel) from [<80220094>] (__enable_mmu+0x0/0xc) [ 1254.300115][ C1] r7:82a7b4a4 r6:30c0387d r5:00000000 r4:830b7bc0 [ 1254.301298][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 1254.335521][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 1254.335943][ C0] Tainted: [L]=SOFTLOCKUP [ 1254.336111][ C0] Hardware name: ARM-Versatile Express [ 1254.336336][ C0] Call trace: [ 1254.336654][ C0] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 1254.337044][ C0] r7:82296540 r6:8281b500 r5:00000000 r4:822956f0 [ 1254.337317][ C0] [<80201b58>] (show_stack) from [<8021ee08>] (dump_stack_lvl+0x54/0x7c) [ 1254.337693][ C0] [<8021edb4>] (dump_stack_lvl) from [<8021ee48>] (dump_stack+0x18/0x1c) [ 1254.338089][ C0] r5:00000000 r4:82a7bd14 [ 1254.338272][ C0] [<8021ee30>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 1254.338584][ C0] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 1254.338915][ C0] r7:82ac27f8 [ 1254.339093][ C0] [<80202850>] (panic) from [<80383ecc>] (watchdog_timer_fn+0x2dc/0x350) [ 1254.339396][ C0] r3:00000001 r2:00004000 r1:82a7bd1c r0:82296540 [ 1254.339643][ C0] [<80383bf0>] (watchdog_timer_fn) from [<80329b64>] (__hrtimer_run_queues+0x1c4/0x454) [ 1254.340071][ C0] r10:8281b500 r9:00000000 r8:dddc7130 r7:80383bf0 r6:dddc7000 r5:dddc7040 [ 1254.340379][ C0] r4:dddc75d8 [ 1254.340540][ C0] [<803299a0>] (__hrtimer_run_queues) from [<8032b168>] (hrtimer_interrupt+0x148/0x2bc) [ 1254.340939][ C0] r10:04c1b660 r9:dddc7180 r8:dddc7130 r7:00000124 r6:00000003 r5:20000193 [ 1254.341255][ C0] r4:dddc7000 [ 1254.341407][ C0] [<8032b020>] (hrtimer_interrupt) from [<813405f0>] (arch_timer_handler_virt+0x30/0x38) [ 1254.341821][ C0] r10:81d0fc78 r9:8309e400 r8:00000000 r7:00000000 r6:00000000 r5:82498528 [ 1254.342121][ C0] r4:8309de40 [ 1254.342264][ C0] [<813405c0>] (arch_timer_handler_virt) from [<802ef9b4>] (handle_percpu_devid_irq+0x128/0x34c) [ 1254.342648][ C0] [<802ef88c>] (handle_percpu_devid_irq) from [<802e8b44>] (handle_irq_desc+0x74/0x84) [ 1254.343021][ C0] r10:00000001 r9:8281b500 r8:00000000 r7:df80a00c r6:826c2388 r5:df80a000 [ 1254.343352][ C0] r4:8280cc44 [ 1254.343513][ C0] [<802e8ad0>] (handle_irq_desc) from [<802e8bc0>] (generic_handle_domain_irq+0x18/0x1c) [ 1254.343880][ C0] [<802e8ba8>] (generic_handle_domain_irq) from [<802012c8>] (gic_handle_irq+0x68/0x7c) [ 1254.344264][ C0] [<80201260>] (gic_handle_irq) from [<81aad648>] (generic_handle_arch_irq+0x60/0x80) [ 1254.344743][ C0] r7:82801b90 r6:82443ff8 r5:8247f12c r4:826c3a9c [ 1254.344986][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1254.345354][ C0] Exception stack(0x82801b90 to 0x82801bd8) [ 1254.345644][ C0] 1b80: ddddb488 00000000 ffffffff 0000bcaf [ 1254.345963][ C0] 1ba0: 830bf380 830bf3b0 82801cb8 ddddb488 00000001 8280c9a4 00000001 82801bec [ 1254.346286][ C0] 1bc0: 82801bf0 82801be0 80346da4 81abba3c 60000113 ffffffff [ 1254.346564][ C0] r9:8281b500 r8:00000001 r7:82801bc4 r6:ffffffff r5:60000113 r4:81abba3c [ 1254.346863][ C0] [<81abba14>] (_raw_spin_unlock_irq) from [<80346da4>] (tmigr_handle_remote_up+0x218/0x4b0) [ 1254.347288][ C0] [<80346b8c>] (tmigr_handle_remote_up) from [<803450a4>] (__walk_groups_from+0x3c/0xe4) [ 1254.347712][ C0] r10:8281b500 r9:8280c820 r8:80346b8c r7:82801cb8 r6:830bf380 r5:00000002 [ 1254.348029][ C0] r4:830bf380 [ 1254.348276][ C0] [<80345068>] (__walk_groups_from) from [<8034743c>] (tmigr_handle_remote+0xe8/0x108) [ 1254.348678][ C0] r9:82804d80 r8:00000102 r7:00000001 r6:00000082 r5:00000002 r4:dddc7488 [ 1254.348969][ C0] [<80347354>] (tmigr_handle_remote) from [<80327600>] (run_timer_softirq+0x30/0x34) [ 1254.349284][ C0] r4:82804084 [ 1254.349417][ C0] [<803275d0>] (run_timer_softirq) from [<8025b55c>] (handle_softirqs+0x140/0x458) [ 1254.349786][ C0] [<8025b41c>] (handle_softirqs) from [<8025b9d0>] (__irq_exit_rcu+0x110/0x1d0) [ 1254.351658][ C0] r10:00000000 r9:8281b500 r8:00000000 r7:82801dd8 r6:82443ff8 r5:8247f12c [ 1254.351984][ C0] r4:8281b500 [ 1254.352145][ C0] [<8025b8c0>] (__irq_exit_rcu) from [<8025bd48>] (irq_exit+0x10/0x18) [ 1254.352532][ C0] r5:8247f12c r4:826c3a9c [ 1254.352700][ C0] [<8025bd38>] (irq_exit) from [<81aad664>] (generic_handle_arch_irq+0x7c/0x80) [ 1254.353106][ C0] [<81aad5e8>] (generic_handle_arch_irq) from [<80200bdc>] (__irq_svc+0x7c/0xbc) [ 1254.353458][ C0] Exception stack(0x82801dd8 to 0x82801e20) [ 1254.353694][ C0] 1dc0: 00000001 00000000 [ 1254.354003][ C0] 1de0: 00001b27 00001b25 84230968 00000004 00000001 84230968 83f86a88 84230840 [ 1254.354325][ C0] 1e00: 00000000 82801e3c 82801e28 82801e28 81abbbcc 81abbc00 80000013 ffffffff [ 1254.354791][ C0] r9:8281b500 r8:83f86a88 r7:82801e0c r6:ffffffff r5:80000013 r4:81abbc00 [ 1254.355131][ C0] [<81abbbb4>] (_raw_spin_lock) from [<809c776c>] (gpio_mmio_set+0x44/0x80) [ 1254.355494][ C0] r5:00000004 r4:84230840 [ 1254.355671][ C0] [<809c7728>] (gpio_mmio_set) from [<809b7f28>] (gpiochip_set+0x1c/0x44) [ 1254.356014][ C0] r7:00000001 r6:00000000 r5:00000002 r4:841337a8 [ 1254.356246][ C0] [<809b7f0c>] (gpiochip_set) from [<809ba7f0>] (gpiod_set_raw_value_commit+0x78/0x218) [ 1254.356630][ C0] [<809ba778>] (gpiod_set_raw_value_commit) from [<809bc090>] (gpiod_set_value_nocheck+0x44/0x58) [ 1254.357140][ C0] r10:00000000 r9:00000000 r8:00000001 r7:dddce4c0 r6:83907218 r5:00000001 [ 1254.357429][ C0] r4:841337a8 [ 1254.357591][ C0] [<809bc04c>] (gpiod_set_value_nocheck) from [<809bc0e0>] (gpiod_set_value+0x3c/0x88) [ 1254.357950][ C0] [<809bc0a4>] (gpiod_set_value) from [<809cc87c>] (gpio_led_set+0x5c/0x60) [ 1254.358296][ C0] r5:000000ff r4:845b1a24 [ 1254.358474][ C0] [<809cc820>] (gpio_led_set) from [<809ca1a4>] (led_set_brightness+0x84/0x90) [ 1254.358834][ C0] r5:000000ff r4:845b1a24 [ 1254.359018][ C0] [<809ca120>] (led_set_brightness) from [<809cbd24>] (led_trigger_event+0x40/0x58) [ 1254.359430][ C0] r5:000000ff r4:845b1a24 [ 1254.359626][ C0] [<809cbce4>] (led_trigger_event) from [<809cd380>] (ledtrig_cpu+0xac/0xf4) [ 1254.359975][ C0] r7:dddce4c0 r6:00000002 r5:82b15cd8 r4:000001fd [ 1254.360256][ C0] [<809cd2d4>] (ledtrig_cpu) from [<80227a38>] (arch_cpu_idle_exit+0x14/0x18) [ 1254.360630][ C0] r9:00000000 r8:00000000 r7:8280c710 r6:8281b500 r5:8280c6d0 r4:00000000 [ 1254.360926][ C0] [<80227a24>] (arch_cpu_idle_exit) from [<802b158c>] (do_idle+0x5c/0x2d8) [ 1254.361293][ C0] [<802b1530>] (do_idle) from [<802b1b38>] (cpu_startup_entry+0x30/0x34) [ 1254.361682][ C0] r10:8281aff4 r9:8280c680 r8:823bec00 r7:00000000 r6:deffc06c r5:828222e8 [ 1254.361992][ C0] r4:000000ed [ 1254.362149][ C0] [<802b1b08>] (cpu_startup_entry) from [<81aaf07c>] (kernel_init+0x0/0x138) [ 1254.362515][ C0] [<81aaef9c>] (rest_init) from [<8260145c>] (start_kernel+0x844/0x860) [ 1254.362837][ C0] [<82600c18>] (start_kernel) from [<00000000>] (0x0) [ 1254.365729][ C0] Rebooting in 86400 seconds..