last executing test programs: 7m12.349173186s ago: executing program 0 (id=19814): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000002140)={0x0, 0x0, &(0x7f0000002100)={&(0x7f0000000c80)={0x4c, 0x12, 0x800, 0x70bd27, 0x25dfdbfd, {0x29, 0x86, 0xd, 0x7, {0x4e20, 0x4e22, [0x6, 0xf8, 0xfffffffa, 0x1], [0x4, 0x2, 0x1, 0x49], 0x0, [0x6, 0x7fff]}, 0x11e, 0x6}}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x814) 7m11.943977077s ago: executing program 0 (id=19817): r0 = openat$uhid(0xffffff9c, &(0x7f0000001fc0), 0x0, 0x0) cachestat(r0, &(0x7f0000002000), &(0x7f0000002040), 0x0) 7m11.6637119s ago: executing program 0 (id=19819): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/profiling', 0xa0042, 0x0) write$snddsp(r0, 0x0, 0x0) 7m11.649912751s ago: executing program 1 (id=19820): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x8000) 7m11.356064594s ago: executing program 1 (id=19821): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000880), 0x4) 7m11.355923604s ago: executing program 0 (id=19822): r0 = syz_open_dev$sndpcmc(&(0x7f0000000000), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_RESET(r0, 0x40044145, 0x0) 7m11.154821539s ago: executing program 1 (id=19823): r0 = syz_open_dev$mouse(&(0x7f0000000380), 0xffff, 0x101040) getpeername$inet(r0, 0x0, 0x0) 7m11.154684239s ago: executing program 0 (id=19824): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) setsockopt$MRT6_ASSERT(r0, 0x29, 0xcf, 0x0, 0x0) 7m10.973954153s ago: executing program 1 (id=19825): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001280)='/sys/firmware/fdt', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, 0x0) 7m10.801144327s ago: executing program 1 (id=19826): r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setstatus(r0, 0xb, 0x0) 7m10.774595459s ago: executing program 0 (id=19827): r0 = openat$nci(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x5450) 7m10.603500612s ago: executing program 1 (id=19828): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) 6m25.466570319s ago: executing program 32 (id=19827): r0 = openat$nci(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x5450) 6m25.401986224s ago: executing program 33 (id=19828): r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x801, 0x0) write$rfkill(r0, &(0x7f0000000080)={0x0, 0x0, 0x3, 0x1}, 0x8) 3.282846568s ago: executing program 2 (id=22320): r0 = socket(0x1, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) connect$llc(r0, &(0x7f0000003f80)={0x1a, 0x30f, 0xa, 0x2, 0x7, 0x1, @random="876c2f80d5a3"}, 0x10) 2.960673232s ago: executing program 2 (id=22322): r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x10}, 0x10}}, 0x0) read$FUSE(r0, &(0x7f0000000600)={0x2020}, 0x2020) 2.702993322s ago: executing program 2 (id=22324): r0 = syz_open_dev$evdev(&(0x7f0000000540), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000140)=""/154) 2.431098193s ago: executing program 2 (id=22326): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = dup2(r0, r0) ioctl$TIOCMBIS(r1, 0x5416, 0x0) 2.162353784s ago: executing program 2 (id=22329): pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r1, 0x5451, 0x0) 1.831666989s ago: executing program 2 (id=22331): r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x40000000040201, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000500)={0x0, 0xfffffffffffffd83, 0xfa00, {0x0, 0x0}}, 0xfdbc) ioctl$SNDCTL_DSP_STEREO(r0, 0xc0045003, &(0x7f0000000100)) 1.341345787s ago: executing program 3 (id=22333): mkdirat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2\x00', 0x1ff) r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs2/binder1\x00', 0x915a, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, 0x0, 0x0) 1.058557529s ago: executing program 3 (id=22334): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000900)) 758.391462ms ago: executing program 3 (id=22335): r0 = socket(0x11, 0x2, 0x0) r1 = dup2(r0, r0) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) 512.81682ms ago: executing program 3 (id=22336): r0 = openat$sequencer2(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r1, 0x330f, 0x0) 235.345932ms ago: executing program 3 (id=22337): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000002ec0)={0x0, 0x0, 0x0}, 0x40) 0s ago: executing program 3 (id=22338): r0 = socket(0x2b, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x14}, 0x1, 0x0, 0x0, 0x8800}, 0xc810) kernel console output (not intermixed with test programs): m_r:sysadm_t tclass=rds_socket permissive=1 [ 2389.554265][ T31] audit: type=1400 audit(2389.500:82724): avc: denied { read } for pid=14104 comm="syz.3.20618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2389.695897][ T31] audit: type=1400 audit(2389.640:82725): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2389.697797][ T31] audit: type=1400 audit(2389.640:82726): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2391.221160][T14136] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=14136 comm=syz.3.20633 [ 2394.230994][ T31] kauditd_printk_skb: 140 callbacks suppressed [ 2394.231218][ T31] audit: type=1400 audit(2394.180:82867): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2394.233024][ T31] audit: type=1400 audit(2394.180:82868): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2394.235079][ T31] audit: type=1400 audit(2394.180:82869): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2394.385324][ T31] audit: type=1400 audit(2394.330:82870): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2394.387324][ T31] audit: type=1400 audit(2394.330:82871): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2394.389281][ T31] audit: type=1400 audit(2394.330:82872): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2394.406562][ T31] audit: type=1400 audit(2394.350:82873): avc: denied { read } for pid=14197 comm="syz.3.20663" name="sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2394.414969][ T31] audit: type=1400 audit(2394.360:82874): avc: denied { read open } for pid=14197 comm="syz.3.20663" path="/dev/sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2394.432748][ T31] audit: type=1400 audit(2394.380:82875): avc: denied { ioctl } for pid=14197 comm="syz.3.20663" path="/dev/sequencer" dev="devtmpfs" ino=712 ioctlcmd=0x551c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2394.605874][ T31] audit: type=1400 audit(2394.550:82876): avc: denied { create } for pid=14201 comm="syz.3.20666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2399.242061][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 2399.242829][ T31] audit: type=1400 audit(2399.190:82950): avc: denied { ioctl } for pid=14265 comm="syz.2.20697" path="/dev/sequencer" dev="devtmpfs" ino=712 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2399.337606][ T31] audit: type=1400 audit(2399.270:82951): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2399.341726][ T31] audit: type=1400 audit(2399.280:82952): avc: denied { create } for pid=14267 comm="syz.3.20698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2399.346911][ T31] audit: type=1400 audit(2399.290:82953): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2399.356592][ T31] audit: type=1400 audit(2399.300:82954): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2399.373492][ T31] audit: type=1400 audit(2399.310:82955): avc: denied { write } for pid=14267 comm="syz.3.20698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2399.536787][T14271] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14271 comm=syz.3.20700 [ 2399.604867][ T31] audit: type=1400 audit(2399.550:82956): avc: denied { read write } for pid=14270 comm="syz.2.20699" name="vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2399.612250][ T31] audit: type=1400 audit(2399.560:82957): avc: denied { read write open } for pid=14270 comm="syz.2.20699" path="/dev/vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2399.625558][ T31] audit: type=1400 audit(2399.570:82958): avc: denied { ioctl } for pid=14270 comm="syz.2.20699" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2399.740345][ T31] audit: type=1400 audit(2399.670:82959): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2404.252452][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 2404.252794][ T31] audit: type=1400 audit(2404.200:83022): avc: denied { read write } for pid=14313 comm="syz.2.20719" name="vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 2404.260583][ T31] audit: type=1400 audit(2404.210:83023): avc: denied { read write open } for pid=14313 comm="syz.2.20719" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 2404.276079][ T31] audit: type=1400 audit(2404.220:83024): avc: denied { ioctl } for pid=14313 comm="syz.2.20719" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 ioctlcmd=0x4805 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 2404.328137][ T31] audit: type=1400 audit(2404.270:83025): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2404.331503][ T31] audit: type=1400 audit(2404.280:83026): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2404.333274][ T31] audit: type=1400 audit(2404.280:83027): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2404.467759][ T31] audit: type=1400 audit(2404.410:83028): avc: denied { create } for pid=14317 comm="syz.3.20722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2404.474000][ T31] audit: type=1400 audit(2404.420:83029): avc: denied { write } for pid=14317 comm="syz.3.20722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2404.557754][ T31] audit: type=1400 audit(2404.500:83030): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2404.570055][ T31] audit: type=1400 audit(2404.510:83031): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2407.605557][T14388] sctp: [Deprecated]: syz.2.20756 (pid 14388) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2407.605557][T14388] Use struct sctp_sack_info instead [ 2409.345619][ T31] kauditd_printk_skb: 154 callbacks suppressed [ 2409.346817][ T31] audit: type=1400 audit(2409.290:83186): avc: denied { create } for pid=14414 comm="syz.3.20769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2409.360774][ T31] audit: type=1400 audit(2409.300:83187): avc: denied { write } for pid=14414 comm="syz.3.20769" path="socket:[142601]" dev="sockfs" ino=142601 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2409.367382][ T31] audit: type=1400 audit(2409.310:83188): avc: denied { write } for pid=14414 comm="syz.3.20769" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2409.795597][ T31] audit: type=1400 audit(2409.740:83189): avc: denied { create } for pid=14418 comm="syz.3.20771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2409.815402][ T31] audit: type=1400 audit(2409.760:83190): avc: denied { read } for pid=14418 comm="syz.3.20771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2410.330942][ T31] audit: type=1400 audit(2410.270:83191): avc: denied { write } for pid=14418 comm="syz.3.20771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2410.721155][ T31] audit: type=1400 audit(2410.660:83192): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2410.721643][ T31] audit: type=1400 audit(2410.660:83193): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2410.721943][ T31] audit: type=1400 audit(2410.660:83194): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2410.922903][ T31] audit: type=1400 audit(2410.870:83195): avc: denied { mounton } for pid=14425 comm="syz.2.20774" path="/427/file0" dev="tmpfs" ino=2190 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2414.368395][ T31] kauditd_printk_skb: 82 callbacks suppressed [ 2414.368680][ T31] audit: type=1400 audit(2414.310:83278): avc: denied { create } for pid=14477 comm="syz.2.20798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2414.375361][ T31] audit: type=1400 audit(2414.320:83279): avc: denied { ioctl } for pid=14477 comm="syz.2.20798" path="socket:[142711]" dev="sockfs" ino=142711 ioctlcmd=0xaf03 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2414.410463][ T31] audit: type=1400 audit(2414.360:83280): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2414.413293][ T31] audit: type=1400 audit(2414.360:83281): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2414.416256][ T31] audit: type=1400 audit(2414.360:83282): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2414.491720][ T31] audit: type=1400 audit(2414.440:83283): avc: denied { read } for pid=14480 comm="syz.2.20800" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2414.494675][ T31] audit: type=1400 audit(2414.440:83284): avc: denied { read open } for pid=14480 comm="syz.2.20800" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2414.500828][ T31] audit: type=1400 audit(2414.450:83285): avc: denied { read write } for pid=14480 comm="syz.2.20800" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2414.503330][ T31] audit: type=1400 audit(2414.450:83286): avc: denied { read write open } for pid=14480 comm="syz.2.20800" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2414.537443][ T31] audit: type=1400 audit(2414.480:83287): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2419.880085][ T31] kauditd_printk_skb: 176 callbacks suppressed [ 2419.880574][ T31] audit: type=1400 audit(2419.810:83464): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2419.887554][ T31] audit: type=1400 audit(2419.830:83465): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2419.891918][ T31] audit: type=1400 audit(2419.830:83466): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2420.079928][ T31] audit: type=1400 audit(2420.020:83467): avc: denied { create } for pid=14600 comm="syz.2.20859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2420.096689][ T31] audit: type=1400 audit(2420.040:83468): avc: denied { ioctl } for pid=14600 comm="syz.2.20859" path="socket:[142336]" dev="sockfs" ino=142336 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2420.105312][ T31] audit: type=1400 audit(2420.050:83469): avc: denied { ioctl } for pid=14600 comm="syz.2.20859" path="socket:[143361]" dev="sockfs" ino=143361 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 2420.172273][ T31] audit: type=1400 audit(2420.120:83470): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2420.193540][ T31] audit: type=1400 audit(2420.130:83471): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2420.193967][ T31] audit: type=1400 audit(2420.130:83472): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2420.372093][ T31] audit: type=1400 audit(2420.320:83473): avc: denied { create } for pid=14605 comm="syz.2.20861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2421.132016][T14623] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14623 comm=syz.2.20870 [ 2425.061036][ T31] kauditd_printk_skb: 178 callbacks suppressed [ 2425.061308][ T31] audit: type=1400 audit(2425.010:83652): avc: denied { setopt } for pid=14705 comm="syz.2.20909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2425.090661][ T31] audit: type=1400 audit(2425.040:83653): avc: denied { create } for pid=14710 comm="syz.3.20911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2425.114736][ T31] audit: type=1400 audit(2425.060:83654): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2425.118874][ T31] audit: type=1400 audit(2425.060:83655): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2425.136571][ T31] audit: type=1400 audit(2425.080:83656): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2425.256403][ T31] audit: type=1400 audit(2425.200:83657): avc: denied { read } for pid=14714 comm="syz.2.20912" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2425.264166][ T31] audit: type=1400 audit(2425.210:83658): avc: denied { read open } for pid=14714 comm="syz.2.20912" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2425.278783][ T31] audit: type=1400 audit(2425.220:83659): avc: denied { ioctl } for pid=14714 comm="syz.2.20912" path="/dev/dlm-control" dev="devtmpfs" ino=85 ioctlcmd=0x1500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2425.343072][ T31] audit: type=1400 audit(2425.290:83660): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2425.345443][ T31] audit: type=1400 audit(2425.290:83661): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2427.363496][T14764] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14764 comm=syz.3.20935 [ 2430.757084][ T31] kauditd_printk_skb: 106 callbacks suppressed [ 2430.760947][ T31] audit: type=1400 audit(2430.700:83768): avc: denied { read write } for pid=14788 comm="syz.3.20947" name="vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2430.775063][ T31] audit: type=1400 audit(2430.720:83769): avc: denied { read write open } for pid=14788 comm="syz.3.20947" path="/dev/vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2430.786110][ T31] audit: type=1400 audit(2430.730:83770): avc: denied { ioctl } for pid=14788 comm="syz.3.20947" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0x4b3a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2431.282052][ T31] audit: type=1400 audit(2431.230:83771): avc: denied { read } for pid=14792 comm="syz.3.20949" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2431.289135][ T31] audit: type=1400 audit(2431.230:83772): avc: denied { read open } for pid=14792 comm="syz.3.20949" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2431.308057][ T31] audit: type=1400 audit(2431.250:83773): avc: denied { ioctl } for pid=14792 comm="syz.3.20949" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2431.544387][ T31] audit: type=1400 audit(2431.490:83774): avc: denied { read } for pid=14794 comm="syz.3.20950" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2431.551816][ T31] audit: type=1400 audit(2431.500:83775): avc: denied { read open } for pid=14794 comm="syz.3.20950" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2431.580453][ T31] audit: type=1400 audit(2431.520:83776): avc: denied { read write } for pid=14794 comm="syz.3.20950" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2431.584028][ T31] audit: type=1400 audit(2431.530:83777): avc: denied { read write open } for pid=14794 comm="syz.3.20950" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2434.207253][T14829] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=21 sclass=netlink_audit_socket pid=14829 comm=syz.3.20967 [ 2435.946050][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 2435.946625][ T31] audit: type=1400 audit(2435.890:83828): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2435.960742][ T31] audit: type=1400 audit(2435.900:83829): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2435.963893][ T31] audit: type=1400 audit(2435.910:83830): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2436.186871][ T31] audit: type=1400 audit(2436.130:83831): avc: denied { mounton } for pid=14847 comm="syz.2.20976" path="/523/file0" dev="tmpfs" ino=2681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2436.227252][ T31] audit: type=1400 audit(2436.170:83832): avc: denied { unmount } for pid=11776 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2436.277065][ T31] audit: type=1400 audit(2436.220:83833): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2436.280588][ T31] audit: type=1400 audit(2436.220:83834): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2436.283477][ T31] audit: type=1400 audit(2436.230:83835): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2436.504286][ T31] audit: type=1400 audit(2436.450:83836): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2436.509186][ T31] audit: type=1400 audit(2436.450:83837): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2437.706337][T14861] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=152 sclass=netlink_xfrm_socket pid=14861 comm=syz.3.20982 [ 2441.092734][ T31] kauditd_printk_skb: 74 callbacks suppressed [ 2441.093130][ T31] audit: type=1400 audit(2441.040:83912): avc: denied { create } for pid=14887 comm="syz.2.20996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2441.098393][ T31] audit: type=1400 audit(2441.040:83913): avc: denied { bind } for pid=14887 comm="syz.2.20996" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2441.098973][ T31] audit: type=1400 audit(2441.040:83914): avc: denied { node_bind } for pid=14887 comm="syz.2.20996" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 2441.310297][ T31] audit: type=1400 audit(2441.240:83915): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2441.310995][ T31] audit: type=1400 audit(2441.240:83916): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2441.311112][ T31] audit: type=1400 audit(2441.240:83917): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2442.462084][ T31] audit: type=1400 audit(2442.400:83918): avc: denied { create } for pid=14889 comm="syz.2.20997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2442.504168][ T31] audit: type=1400 audit(2442.450:83919): avc: denied { write } for pid=14889 comm="syz.2.20997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2442.651223][ T31] audit: type=1400 audit(2442.590:83920): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2442.663938][ T31] audit: type=1400 audit(2442.610:83921): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2446.117516][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 2446.117928][ T31] audit: type=1400 audit(2446.060:83954): avc: denied { create } for pid=14911 comm="syz.3.21008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2446.146096][ T31] audit: type=1400 audit(2446.090:83955): avc: denied { write } for pid=14911 comm="syz.3.21008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2446.662507][ T31] audit: type=1400 audit(2446.610:83956): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2446.664806][ T31] audit: type=1400 audit(2446.610:83957): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2446.690812][ T31] audit: type=1400 audit(2446.610:83958): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2446.748662][ T31] audit: type=1400 audit(2446.690:83959): avc: denied { read } for pid=14915 comm="syz.3.21010" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2446.753219][ T31] audit: type=1400 audit(2446.700:83960): avc: denied { read open } for pid=14915 comm="syz.3.21010" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2446.768622][ T31] audit: type=1400 audit(2446.710:83961): avc: denied { ioctl } for pid=14915 comm="syz.3.21010" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x5005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2447.133028][ T31] audit: type=1400 audit(2447.080:83962): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2447.136580][ T31] audit: type=1400 audit(2447.080:83963): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2451.254151][ T31] kauditd_printk_skb: 124 callbacks suppressed [ 2451.261496][ T31] audit: type=1400 audit(2451.200:84088): avc: denied { execmem } for pid=14988 comm="syz.3.21046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2451.291902][ T31] audit: type=1400 audit(2451.240:84089): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2451.294994][ T31] audit: type=1400 audit(2451.240:84090): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2451.298046][ T31] audit: type=1400 audit(2451.240:84091): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2451.396106][ T31] audit: type=1400 audit(2451.340:84092): avc: denied { read } for pid=14990 comm="syz.3.21048" name="event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2451.397588][ T31] audit: type=1400 audit(2451.340:84093): avc: denied { read open } for pid=14990 comm="syz.3.21048" path="/dev/input/event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2451.407769][ T31] audit: type=1400 audit(2451.350:84094): avc: denied { ioctl } for pid=14990 comm="syz.3.21048" path="/dev/input/event0" dev="devtmpfs" ino=703 ioctlcmd=0x451b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2451.492484][ T31] audit: type=1400 audit(2451.430:84095): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2451.494274][ T31] audit: type=1400 audit(2451.430:84096): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2451.495166][ T31] audit: type=1400 audit(2451.430:84097): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2451.554929][T14995] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=14995 comm=syz.3.21049 [ 2456.295770][ T31] kauditd_printk_skb: 117 callbacks suppressed [ 2456.296138][ T31] audit: type=1400 audit(2456.240:84215): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2456.302776][ T31] audit: type=1400 audit(2456.250:84216): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2456.324545][ T31] audit: type=1400 audit(2456.270:84217): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2456.378947][ T31] audit: type=1400 audit(2456.320:84218): avc: denied { read } for pid=15067 comm="syz.3.21086" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2456.390924][ T31] audit: type=1400 audit(2456.330:84219): avc: denied { read open } for pid=15067 comm="syz.3.21086" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2456.525326][ T31] audit: type=1400 audit(2456.470:84220): avc: denied { create } for pid=15069 comm="syz.3.21087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2456.532497][ T31] audit: type=1400 audit(2456.480:84221): avc: denied { read } for pid=15070 comm="syz.2.21085" dev="nsfs" ino=4026532991 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2456.535126][ T31] audit: type=1400 audit(2456.480:84222): avc: denied { read open } for pid=15070 comm="syz.2.21085" path="net:[4026532991]" dev="nsfs" ino=4026532991 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2456.539417][ T31] audit: type=1400 audit(2456.480:84223): avc: denied { create } for pid=15070 comm="syz.2.21085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2456.544275][ T31] audit: type=1400 audit(2456.490:84224): avc: denied { write } for pid=15069 comm="syz.3.21087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2461.343165][ T31] kauditd_printk_skb: 119 callbacks suppressed [ 2461.347359][ T31] audit: type=1400 audit(2461.290:84344): avc: denied { read } for pid=15152 comm="syz.3.21126" name="mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2461.350323][ T31] audit: type=1400 audit(2461.290:84345): avc: denied { read open } for pid=15152 comm="syz.3.21126" path="/dev/mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2461.361840][ T31] audit: type=1400 audit(2461.310:84346): avc: denied { ioctl } for pid=15152 comm="syz.3.21126" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2461.371961][ T31] audit: type=1400 audit(2461.320:84347): avc: denied { ioctl } for pid=15152 comm="syz.3.21126" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0x940f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2461.513833][ T31] audit: type=1400 audit(2461.460:84348): avc: denied { read } for pid=15154 comm="syz.3.21127" name="mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2461.517642][ T31] audit: type=1400 audit(2461.460:84349): avc: denied { read open } for pid=15154 comm="syz.3.21127" path="/dev/mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2461.529045][ T31] audit: type=1400 audit(2461.470:84350): avc: denied { ioctl } for pid=15154 comm="syz.3.21127" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0x541c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2461.633120][ T31] audit: type=1400 audit(2461.580:84351): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2461.636287][ T31] audit: type=1400 audit(2461.580:84352): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2461.643576][ T31] audit: type=1400 audit(2461.590:84353): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2463.094853][T15188] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2463.095401][T15188] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2466.803916][ T31] kauditd_printk_skb: 90 callbacks suppressed [ 2466.804911][ T31] audit: type=1400 audit(2466.750:84444): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2466.818407][ T31] audit: type=1400 audit(2466.760:84445): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2466.823688][ T31] audit: type=1400 audit(2466.770:84446): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2467.044882][ T31] audit: type=1400 audit(2466.990:84447): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2467.051910][ T31] audit: type=1400 audit(2466.990:84448): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2467.057943][ T31] audit: type=1400 audit(2467.000:84449): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2467.196111][ T31] audit: type=1400 audit(2467.140:84450): avc: denied { execmem } for pid=15214 comm="syz.2.21155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2467.242334][ T31] audit: type=1400 audit(2467.190:84451): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2467.244758][ T31] audit: type=1400 audit(2467.190:84452): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2467.251194][ T31] audit: type=1400 audit(2467.190:84453): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2471.952144][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 2471.952580][ T31] audit: type=1400 audit(2471.900:84497): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2471.958445][ T31] audit: type=1400 audit(2471.900:84498): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2471.966321][ T31] audit: type=1400 audit(2471.910:84499): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2472.045201][ T31] audit: type=1400 audit(2471.990:84500): avc: denied { read write } for pid=15254 comm="syz.2.21174" name="vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2472.047871][ T31] audit: type=1400 audit(2471.990:84501): avc: denied { read write open } for pid=15254 comm="syz.2.21174" path="/dev/vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2472.056653][ T31] audit: type=1400 audit(2472.000:84502): avc: denied { ioctl } for pid=15254 comm="syz.2.21174" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2472.066424][ T31] audit: type=1400 audit(2472.010:84503): avc: denied { ioctl } for pid=15254 comm="syz.2.21174" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0xaf04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2472.134894][ T31] audit: type=1400 audit(2472.080:84504): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2472.138212][ T31] audit: type=1400 audit(2472.080:84505): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2472.142324][ T31] audit: type=1400 audit(2472.080:84506): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2477.028734][ T31] kauditd_printk_skb: 99 callbacks suppressed [ 2477.029065][ T31] audit: type=1400 audit(2476.970:84606): avc: denied { read } for pid=15322 comm="syz.3.21207" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2477.029344][ T31] audit: type=1400 audit(2476.970:84607): avc: denied { read open } for pid=15322 comm="syz.3.21207" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2477.047187][ T31] audit: type=1400 audit(2476.990:84608): avc: denied { ioctl } for pid=15322 comm="syz.3.21207" path="/dev/ttyS3" dev="devtmpfs" ino=607 ioctlcmd=0x5200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2477.220403][ T31] audit: type=1400 audit(2477.160:84609): avc: denied { create } for pid=15324 comm="syz.3.21208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2477.226494][ T31] audit: type=1400 audit(2477.170:84610): avc: denied { setopt } for pid=15324 comm="syz.3.21208" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2477.234066][ T31] audit: type=1400 audit(2477.180:84611): avc: denied { setopt } for pid=15324 comm="syz.3.21208" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2477.599887][ T31] audit: type=1400 audit(2477.540:84612): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2477.605659][ T31] audit: type=1400 audit(2477.550:84613): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2477.608694][ T31] audit: type=1400 audit(2477.550:84614): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2477.708369][ T31] audit: type=1400 audit(2477.650:84615): avc: denied { read } for pid=15330 comm="syz.3.21212" dev="nsfs" ino=4026533089 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2482.170587][ T31] kauditd_printk_skb: 143 callbacks suppressed [ 2482.175358][ T31] audit: type=1400 audit(2482.120:84759): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2482.180813][ T31] audit: type=1400 audit(2482.130:84760): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2482.190868][ T31] audit: type=1400 audit(2482.130:84761): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2482.326320][ T31] audit: type=1400 audit(2482.270:84762): avc: denied { write } for pid=15429 comm="syz.2.21258" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2482.330163][ T31] audit: type=1400 audit(2482.270:84763): avc: denied { write open } for pid=15429 comm="syz.2.21258" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2482.374303][ T31] audit: type=1400 audit(2482.320:84764): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2482.376162][ T31] audit: type=1400 audit(2482.320:84765): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2482.391421][ T31] audit: type=1400 audit(2482.330:84766): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2482.538359][ T31] audit: type=1400 audit(2482.480:84767): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2482.550316][ T31] audit: type=1400 audit(2482.490:84768): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2489.083383][ T31] kauditd_printk_skb: 148 callbacks suppressed [ 2489.084518][ T31] audit: type=1400 audit(2489.030:84917): avc: denied { create } for pid=15533 comm="syz.3.21305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2489.098449][ T31] audit: type=1400 audit(2489.040:84918): avc: denied { connect } for pid=15533 comm="syz.3.21305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2489.194363][ T31] audit: type=1400 audit(2489.140:84919): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2489.196562][ T31] audit: type=1400 audit(2489.140:84920): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2489.207406][ T31] audit: type=1400 audit(2489.140:84921): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2489.378812][ T31] audit: type=1400 audit(2489.320:84922): avc: denied { read } for pid=15535 comm="syz.2.21306" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2489.384109][ T31] audit: type=1400 audit(2489.330:84923): avc: denied { read open } for pid=15535 comm="syz.2.21306" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2489.400959][ T31] audit: type=1400 audit(2489.340:84924): avc: denied { ioctl } for pid=15535 comm="syz.2.21306" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2489.468821][ T31] audit: type=1400 audit(2489.410:84925): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2489.474270][ T31] audit: type=1400 audit(2489.420:84926): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2494.238336][ T31] kauditd_printk_skb: 801 callbacks suppressed [ 2494.238585][ T31] audit: type=1400 audit(2494.180:85728): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2494.302613][ T31] audit: type=1400 audit(2494.250:85729): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2494.320143][ T31] audit: type=1400 audit(2494.250:85730): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2494.752402][ T31] audit: type=1400 audit(2494.700:85731): avc: denied { read } for pid=15596 comm="syz.2.21329" name="ubi_ctrl" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2494.756827][ T31] audit: type=1400 audit(2494.700:85732): avc: denied { read open } for pid=15596 comm="syz.2.21329" path="/dev/ubi_ctrl" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2494.793070][ T31] audit: type=1400 audit(2494.740:85733): avc: denied { create } for pid=15596 comm="syz.2.21329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2494.831656][ T31] audit: type=1400 audit(2494.780:85734): avc: denied { ioctl } for pid=15596 comm="syz.2.21329" path="/dev/ubi_ctrl" dev="devtmpfs" ino=673 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2494.866471][ T31] audit: type=1400 audit(2494.810:85735): avc: denied { mounton } for pid=15597 comm="syz.3.21328" path="/792/file0" dev="tmpfs" ino=4076 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2494.893190][ T31] audit: type=1400 audit(2494.840:85736): avc: denied { remount } for pid=15597 comm="syz.3.21328" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2494.924447][ T31] audit: type=1400 audit(2494.870:85737): avc: denied { unmount } for pid=11779 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2497.633510][T15619] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=272 sclass=netlink_audit_socket pid=15619 comm=syz.2.21339 [ 2499.396559][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 2499.401840][ T31] audit: type=1400 audit(2499.340:85791): avc: denied { execmem } for pid=15634 comm="syz.2.21346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2499.446129][ T31] audit: type=1400 audit(2499.390:85792): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2499.448604][ T31] audit: type=1400 audit(2499.390:85793): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2499.457181][ T31] audit: type=1400 audit(2499.400:85794): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2499.566432][ T31] audit: type=1400 audit(2499.510:85795): avc: denied { create } for pid=15636 comm="syz.3.21348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2499.577267][ T31] audit: type=1400 audit(2499.520:85796): avc: denied { read } for pid=15637 comm="syz.2.21349" name="sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2499.580051][ T31] audit: type=1400 audit(2499.530:85797): avc: denied { read open } for pid=15637 comm="syz.2.21349" path="/dev/sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2499.582587][ T31] audit: type=1400 audit(2499.530:85798): avc: denied { read } for pid=15636 comm="syz.3.21348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2499.596457][ T31] audit: type=1400 audit(2499.540:85799): avc: denied { ioctl } for pid=15637 comm="syz.2.21349" path="/dev/sequencer" dev="devtmpfs" ino=712 ioctlcmd=0x6403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2499.633741][ T31] audit: type=1400 audit(2499.580:85800): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2499.863696][T15643] ALSA: seq fatal error: cannot create timer (-22) [ 2504.606204][ T31] kauditd_printk_skb: 72 callbacks suppressed [ 2504.606617][ T31] audit: type=1400 audit(2504.550:85873): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2504.608995][ T31] audit: type=1400 audit(2504.550:85874): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2504.609311][ T31] audit: type=1400 audit(2504.550:85875): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2505.462967][ T31] audit: type=1400 audit(2505.410:85876): avc: denied { create } for pid=15689 comm="syz.3.21375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2505.483148][ T31] audit: type=1400 audit(2505.430:85877): avc: denied { ioctl } for pid=15689 comm="syz.3.21375" path="socket:[146170]" dev="sockfs" ino=146170 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2505.530112][ T31] audit: type=1400 audit(2505.470:85878): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2505.542922][ T31] audit: type=1400 audit(2505.490:85879): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2505.550074][ T31] audit: type=1400 audit(2505.490:85880): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2506.048902][ T31] audit: type=1400 audit(2505.990:85881): avc: denied { create } for pid=15693 comm="syz.3.21377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2506.094123][ T31] audit: type=1400 audit(2506.040:85882): avc: denied { ioctl } for pid=15693 comm="syz.3.21377" path="socket:[146178]" dev="sockfs" ino=146178 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2509.701982][ T31] kauditd_printk_skb: 105 callbacks suppressed [ 2509.702509][ T31] audit: type=1400 audit(2509.650:85988): avc: denied { execmem } for pid=15768 comm="syz.2.21412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2509.799271][ T31] audit: type=1400 audit(2509.730:85989): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2509.802282][ T31] audit: type=1400 audit(2509.750:85990): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2509.807304][ T31] audit: type=1400 audit(2509.750:85991): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2509.942342][ T31] audit: type=1400 audit(2509.890:85992): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2509.944100][ T31] audit: type=1400 audit(2509.890:85993): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2509.954164][ T31] audit: type=1400 audit(2509.900:85994): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2510.109076][ T31] audit: type=1400 audit(2510.050:85995): avc: denied { map_create } for pid=15776 comm="syz.2.21416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2510.117393][ T31] audit: type=1400 audit(2510.060:85996): avc: denied { map_read map_write } for pid=15776 comm="syz.2.21416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2510.126134][ T31] audit: type=1400 audit(2510.070:85997): avc: denied { map_read map_write } for pid=15776 comm="syz.2.21416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2512.240060][T15816] usb usb2: usbfs: process 15816 (syz.2.21434) did not claim interface 0 before use [ 2514.818881][ T31] kauditd_printk_skb: 132 callbacks suppressed [ 2514.819232][ T31] audit: type=1400 audit(2514.760:86130): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2514.828088][ T31] audit: type=1400 audit(2514.770:86131): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2514.836186][ T31] audit: type=1400 audit(2514.780:86132): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2514.858561][ T31] audit: type=1400 audit(2514.800:86133): avc: denied { read write } for pid=15863 comm="syz.3.21459" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2514.858979][ T31] audit: type=1400 audit(2514.800:86134): avc: denied { read write open } for pid=15863 comm="syz.3.21459" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2514.869110][ T31] audit: type=1400 audit(2514.810:86135): avc: denied { create } for pid=15863 comm="syz.3.21459" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2514.870457][ T31] audit: type=1400 audit(2514.810:86136): avc: denied { ioctl } for pid=15863 comm="syz.3.21459" path="socket:[147166]" dev="sockfs" ino=147166 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2515.016636][ T31] audit: type=1400 audit(2514.960:86137): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2515.018713][ T31] audit: type=1400 audit(2514.960:86138): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2515.022156][ T31] audit: type=1400 audit(2514.970:86139): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2520.047836][ T31] kauditd_printk_skb: 172 callbacks suppressed [ 2520.048190][ T31] audit: type=1400 audit(2519.990:86312): avc: denied { create } for pid=15969 comm="syz.3.21512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2520.054774][ T31] audit: type=1400 audit(2520.000:86313): avc: denied { ioctl } for pid=15969 comm="syz.3.21512" path="socket:[147629]" dev="sockfs" ino=147629 ioctlcmd=0x9436 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2520.544151][ T31] audit: type=1400 audit(2520.490:86314): avc: denied { read } for pid=15974 comm="syz.3.21514" name="mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2520.548877][ T31] audit: type=1400 audit(2520.490:86315): avc: denied { read open } for pid=15974 comm="syz.3.21514" path="/dev/mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2520.557004][ T31] audit: type=1400 audit(2520.500:86316): avc: denied { ioctl } for pid=15974 comm="syz.3.21514" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2520.564665][ T31] audit: type=1400 audit(2520.510:86317): avc: denied { ioctl } for pid=15974 comm="syz.3.21514" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0xaf03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2520.837437][ T31] audit: type=1400 audit(2520.780:86318): avc: denied { create } for pid=15976 comm="syz.3.21515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2520.864255][ T31] audit: type=1400 audit(2520.810:86319): avc: denied { write } for pid=15976 comm="syz.3.21515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2521.291273][ T31] audit: type=1400 audit(2521.240:86320): avc: denied { read } for pid=15980 comm="syz.3.21517" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2521.293478][ T31] audit: type=1400 audit(2521.240:86321): avc: denied { read open } for pid=15980 comm="syz.3.21517" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2522.234277][T15972] SELinux: Context system_u:object_r:hald_mac_exec_t:s0 is not valid (left unmapped). [ 2525.053670][ T31] kauditd_printk_skb: 103 callbacks suppressed [ 2525.054274][ T31] audit: type=1400 audit(2525.000:86425): avc: denied { read } for pid=16052 comm="syz.3.21553" dev="nsfs" ino=4026533089 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2525.056690][ T31] audit: type=1400 audit(2525.000:86426): avc: denied { read open } for pid=16052 comm="syz.3.21553" path="net:[4026533089]" dev="nsfs" ino=4026533089 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2525.060377][ T31] audit: type=1400 audit(2525.010:86427): avc: denied { create } for pid=16052 comm="syz.3.21553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2525.067485][ T31] audit: type=1400 audit(2525.010:86428): avc: denied { write } for pid=16052 comm="syz.3.21553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2525.136203][ T31] audit: type=1400 audit(2525.080:86429): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2525.137275][ T31] audit: type=1400 audit(2525.080:86430): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2525.140998][ T31] audit: type=1400 audit(2525.090:86431): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2525.200517][ T31] audit: type=1400 audit(2525.150:86432): avc: denied { read } for pid=16055 comm="syz.3.21555" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 2525.201700][ T31] audit: type=1400 audit(2525.150:86433): avc: denied { read open } for pid=16055 comm="syz.3.21555" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 2525.206883][ T31] audit: type=1400 audit(2525.150:86434): avc: denied { ioctl } for pid=16055 comm="syz.3.21555" path="/dev/loop-control" dev="devtmpfs" ino=632 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 2529.676340][T16145] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5137 sclass=netlink_route_socket pid=16145 comm=syz.2.21597 [ 2530.061006][ T31] kauditd_printk_skb: 147 callbacks suppressed [ 2530.062047][ T31] audit: type=1400 audit(2530.010:86582): avc: denied { write } for pid=16150 comm="syz.2.21600" path="socket:[148729]" dev="sockfs" ino=148729 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2530.067411][ T31] audit: type=1400 audit(2530.010:86583): avc: denied { write } for pid=16150 comm="syz.2.21600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2530.142233][ T31] audit: type=1400 audit(2530.090:86584): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2530.145015][ T31] audit: type=1400 audit(2530.090:86585): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2530.148123][ T31] audit: type=1400 audit(2530.090:86586): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2530.212377][ T31] audit: type=1400 audit(2530.160:86587): avc: denied { read } for pid=16154 comm="syz.3.21602" name="timer" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2530.213669][ T31] audit: type=1400 audit(2530.160:86588): avc: denied { read open } for pid=16154 comm="syz.3.21602" path="/dev/snd/timer" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2530.218675][ T31] audit: type=1400 audit(2530.160:86589): avc: denied { ioctl } for pid=16154 comm="syz.3.21602" path="/dev/snd/timer" dev="devtmpfs" ino=710 ioctlcmd=0x5410 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2530.228681][ T31] audit: type=1400 audit(2530.170:86590): avc: denied { ioctl } for pid=16154 comm="syz.3.21602" path="/dev/snd/timer" dev="devtmpfs" ino=710 ioctlcmd=0x5420 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2530.263837][ T31] audit: type=1400 audit(2530.210:86591): avc: denied { create } for pid=16155 comm="syz.2.21603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2530.895278][T16169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16169 comm=syz.2.21609 [ 2536.237899][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 2536.240516][ T31] audit: type=1400 audit(2536.180:86665): avc: denied { create } for pid=16211 comm="syz.3.21629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2536.400294][ T31] audit: type=1400 audit(2536.340:86666): avc: denied { read } for pid=16213 comm="syz.3.21630" name="sequencer2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2536.403748][ T31] audit: type=1400 audit(2536.350:86667): avc: denied { read open } for pid=16213 comm="syz.3.21630" path="/dev/sequencer2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2536.416482][ T31] audit: type=1400 audit(2536.360:86668): avc: denied { ioctl } for pid=16213 comm="syz.3.21630" path="/dev/sequencer2" dev="devtmpfs" ino=713 ioctlcmd=0x5301 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2536.571070][ T31] audit: type=1400 audit(2536.520:86669): avc: denied { mounton } for pid=16215 comm="syz.3.21631" path="/958/file0" dev="tmpfs" ino=4928 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2536.574782][ T31] audit: type=1400 audit(2536.520:86670): avc: denied { mount } for pid=16215 comm="syz.3.21631" name="/" dev="ramfs" ino=148858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2536.602896][ T31] audit: type=1400 audit(2536.550:86671): avc: denied { unmount } for pid=11779 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2536.732420][ T31] audit: type=1400 audit(2536.680:86672): avc: denied { read write } for pid=16217 comm="syz.3.21632" name="vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2536.733719][ T31] audit: type=1400 audit(2536.680:86673): avc: denied { read write open } for pid=16217 comm="syz.3.21632" path="/dev/vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2536.740660][ T31] audit: type=1400 audit(2536.690:86674): avc: denied { ioctl } for pid=16217 comm="syz.3.21632" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0x5340 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2541.268243][ T31] kauditd_printk_skb: 137 callbacks suppressed [ 2541.268530][ T31] audit: type=1400 audit(2541.210:86812): avc: denied { read } for pid=16300 comm="syz.3.21673" name="sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2541.275077][ T31] audit: type=1400 audit(2541.220:86813): avc: denied { read open } for pid=16300 comm="syz.3.21673" path="/dev/sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2541.284954][ T31] audit: type=1400 audit(2541.230:86814): avc: denied { ioctl } for pid=16300 comm="syz.3.21673" path="/dev/sequencer" dev="devtmpfs" ino=712 ioctlcmd=0x54df scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2541.462172][ T31] audit: type=1400 audit(2541.410:86815): avc: denied { create } for pid=16302 comm="syz.3.21674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2541.471273][ T31] audit: type=1400 audit(2541.420:86816): avc: denied { getopt } for pid=16302 comm="syz.3.21674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2541.766128][ T31] audit: type=1400 audit(2541.710:86817): avc: denied { read } for pid=16306 comm="syz.3.21676" name="mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2541.771797][ T31] audit: type=1400 audit(2541.720:86818): avc: denied { read open } for pid=16306 comm="syz.3.21676" path="/dev/mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2541.786345][ T31] audit: type=1400 audit(2541.730:86819): avc: denied { ioctl } for pid=16306 comm="syz.3.21676" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0x550c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2541.911844][ T31] audit: type=1400 audit(2541.860:86820): avc: denied { read } for pid=16308 comm="syz.3.21677" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 2541.914378][ T31] audit: type=1400 audit(2541.860:86821): avc: denied { read open } for pid=16308 comm="syz.3.21677" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 2546.284799][ T31] kauditd_printk_skb: 154 callbacks suppressed [ 2546.285318][ T31] audit: type=1400 audit(2546.230:86976): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2546.293659][ T31] audit: type=1400 audit(2546.240:86977): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2546.310392][ T31] audit: type=1400 audit(2546.250:86978): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2546.433114][ T31] audit: type=1400 audit(2546.380:86979): avc: denied { create } for pid=16397 comm="syz.3.21721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2546.443302][ T31] audit: type=1400 audit(2546.390:86980): avc: denied { write } for pid=16397 comm="syz.3.21721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2546.473666][ T31] audit: type=1400 audit(2546.420:86981): avc: denied { create } for pid=16396 comm="syz.2.21722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2546.530930][ T31] audit: type=1400 audit(2546.470:86982): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2546.531390][ T31] audit: type=1400 audit(2546.480:86983): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2546.540296][ T31] audit: type=1400 audit(2546.480:86984): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2546.730646][ T31] audit: type=1400 audit(2546.670:86985): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2547.364625][T16415] ptrace attach of "/syz-executor exec"[16416] was attempted by "/syz-executor exec"[16415] [ 2551.431100][ T31] kauditd_printk_skb: 97 callbacks suppressed [ 2551.431409][ T31] audit: type=1400 audit(2551.380:87083): avc: denied { read write } for pid=16470 comm="syz.2.21757" name="vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2551.435286][ T31] audit: type=1400 audit(2551.380:87084): avc: denied { read write open } for pid=16470 comm="syz.2.21757" path="/dev/vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2551.459901][ T31] audit: type=1400 audit(2551.400:87085): avc: denied { read write } for pid=16470 comm="syz.2.21757" name="vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2551.465615][ T31] audit: type=1400 audit(2551.410:87086): avc: denied { read write open } for pid=16470 comm="syz.2.21757" path="/dev/vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2551.474998][ T31] audit: type=1400 audit(2551.420:87087): avc: denied { ioctl } for pid=16470 comm="syz.2.21757" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0x4123 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2551.536067][ T31] audit: type=1400 audit(2551.480:87088): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2551.538623][ T31] audit: type=1400 audit(2551.480:87089): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2551.544225][ T31] audit: type=1400 audit(2551.490:87090): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2551.668300][ T31] audit: type=1400 audit(2551.610:87091): avc: denied { create } for pid=16474 comm="syz.2.21759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2551.709312][ T31] audit: type=1400 audit(2551.650:87092): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2556.532427][ T31] kauditd_printk_skb: 152 callbacks suppressed [ 2556.532750][ T31] audit: type=1400 audit(2556.480:87245): avc: denied { create } for pid=16562 comm="syz.2.21803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2556.543577][ T31] audit: type=1400 audit(2556.490:87246): avc: denied { ioctl } for pid=16562 comm="syz.2.21803" path="socket:[149563]" dev="sockfs" ino=149563 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2556.547635][ T31] audit: type=1400 audit(2556.490:87247): avc: denied { write } for pid=16562 comm="syz.2.21803" path="socket:[149564]" dev="sockfs" ino=149564 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 2556.556548][ T31] audit: type=1400 audit(2556.500:87248): avc: denied { write } for pid=16562 comm="syz.2.21803" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 2556.603244][ T31] audit: type=1400 audit(2556.550:87249): avc: denied { create } for pid=16563 comm="syz.3.21804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2556.616353][ T31] audit: type=1400 audit(2556.560:87250): avc: denied { write } for pid=16563 comm="syz.3.21804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2556.633154][ T31] audit: type=1400 audit(2556.580:87251): avc: denied { read } for pid=16563 comm="syz.3.21804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2556.633427][ T31] audit: type=1400 audit(2556.580:87252): avc: denied { read } for pid=16563 comm="syz.3.21804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2556.654320][ T31] audit: type=1400 audit(2556.600:87253): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2556.670409][ T31] audit: type=1400 audit(2556.600:87254): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2561.638243][ T31] kauditd_printk_skb: 119 callbacks suppressed [ 2561.638722][ T31] audit: type=1400 audit(2561.580:87374): avc: denied { read } for pid=16645 comm="syz.2.21844" name="mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.652171][ T31] audit: type=1400 audit(2561.590:87375): avc: denied { read open } for pid=16645 comm="syz.2.21844" path="/dev/mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.662699][ T31] audit: type=1400 audit(2561.610:87376): avc: denied { ioctl } for pid=16645 comm="syz.2.21844" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0xaf14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.744380][ T31] audit: type=1400 audit(2561.690:87377): avc: denied { execmem } for pid=16647 comm="syz.3.21845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2561.754216][ T31] audit: type=1400 audit(2561.700:87378): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2561.760224][ T31] audit: type=1400 audit(2561.700:87379): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2561.764703][ T31] audit: type=1400 audit(2561.710:87380): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2561.955002][ T31] audit: type=1400 audit(2561.900:87381): avc: denied { read } for pid=16649 comm="syz.2.21846" name="mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.958402][ T31] audit: type=1400 audit(2561.900:87382): avc: denied { read open } for pid=16649 comm="syz.2.21846" path="/dev/mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.978286][ T31] audit: type=1400 audit(2561.920:87383): avc: denied { ioctl } for pid=16649 comm="syz.2.21846" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2566.747604][ T31] kauditd_printk_skb: 102 callbacks suppressed [ 2566.751806][ T31] audit: type=1400 audit(2566.690:87486): avc: denied { write } for pid=16721 comm="syz.2.21882" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2566.753068][ T31] audit: type=1400 audit(2566.700:87487): avc: denied { write open } for pid=16721 comm="syz.2.21882" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2566.864423][ T31] audit: type=1400 audit(2566.810:87488): avc: denied { create } for pid=16723 comm="syz.3.21883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2566.873442][ T31] audit: type=1400 audit(2566.820:87489): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2566.874570][ T31] audit: type=1400 audit(2566.820:87490): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2566.877827][ T31] audit: type=1400 audit(2566.820:87491): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2566.881689][ T31] audit: type=1400 audit(2566.830:87492): avc: denied { ioctl } for pid=16723 comm="syz.3.21883" path="socket:[149797]" dev="sockfs" ino=149797 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2566.886024][ T31] audit: type=1400 audit(2566.830:87493): avc: denied { write } for pid=16723 comm="syz.3.21883" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 2567.042356][ T31] audit: type=1400 audit(2566.990:87494): avc: denied { read } for pid=16726 comm="syz.2.21884" dev="nsfs" ino=4026532991 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2567.044593][ T31] audit: type=1400 audit(2566.990:87495): avc: denied { read open } for pid=16726 comm="syz.2.21884" path="net:[4026532991]" dev="nsfs" ino=4026532991 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2568.329102][T16753] sctp: [Deprecated]: syz.3.21898 (pid 16753) Use of struct sctp_assoc_value in delayed_ack socket option. [ 2568.329102][T16753] Use struct sctp_sack_info instead [ 2571.835143][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 2571.836075][ T31] audit: type=1400 audit(2571.780:87569): avc: denied { create } for pid=16801 comm="syz.2.21921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2571.845495][ T31] audit: type=1400 audit(2571.790:87570): avc: denied { write } for pid=16801 comm="syz.2.21921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2571.914113][ T31] audit: type=1400 audit(2571.860:87571): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2571.920125][ T31] audit: type=1400 audit(2571.860:87572): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2571.920432][ T31] audit: type=1400 audit(2571.860:87573): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2572.028002][ T31] audit: type=1400 audit(2571.970:87574): avc: denied { read } for pid=16805 comm="syz.2.21923" dev="nsfs" ino=4026532991 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2572.030789][ T31] audit: type=1400 audit(2571.970:87575): avc: denied { read open } for pid=16805 comm="syz.2.21923" path="net:[4026532991]" dev="nsfs" ino=4026532991 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2572.032512][ T31] audit: type=1400 audit(2571.980:87576): avc: denied { create } for pid=16805 comm="syz.2.21923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2572.065034][ T31] audit: type=1400 audit(2572.010:87577): avc: denied { read } for pid=16805 comm="syz.2.21923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2572.140447][ T31] audit: type=1400 audit(2572.080:87578): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2572.313154][T16812] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16812 comm=syz.2.21925 [ 2575.587415][T16858] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=16858 comm=syz.3.21946 [ 2577.506848][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 2577.510609][ T31] audit: type=1400 audit(2577.450:87654): avc: denied { read } for pid=16874 comm="syz.3.21954" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:gpg_agent_exec_t:s0" [ 2577.511130][ T31] audit: type=1400 audit(2577.450:87655): avc: denied { read open } for pid=16874 comm="syz.3.21954" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:gpg_agent_exec_t:s0" [ 2577.528279][ T31] audit: type=1400 audit(2577.470:87656): avc: denied { read } for pid=16874 comm="syz.3.21954" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2577.535306][ T31] audit: type=1400 audit(2577.480:87657): avc: denied { read open } for pid=16874 comm="syz.3.21954" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2577.554265][ T31] audit: type=1400 audit(2577.500:87658): avc: denied { ioctl } for pid=16874 comm="syz.3.21954" path="/dev/fb0" dev="devtmpfs" ino=615 ioctlcmd=0x6615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:gpg_agent_exec_t:s0" [ 2577.831320][ T31] audit: type=1400 audit(2577.780:87659): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2577.835112][ T31] audit: type=1400 audit(2577.780:87660): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2577.839315][ T31] audit: type=1400 audit(2577.780:87661): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2577.896708][ T31] audit: type=1400 audit(2577.840:87662): avc: denied { mounton } for pid=16876 comm="syz.3.21955" path="/1131/file0" dev="tmpfs" ino=5814 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2577.898884][ T31] audit: type=1400 audit(2577.840:87663): avc: denied { mount } for pid=16876 comm="syz.3.21955" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2582.521812][ T31] kauditd_printk_skb: 81 callbacks suppressed [ 2582.522172][ T31] audit: type=1400 audit(2582.470:87745): avc: denied { read append } for pid=16947 comm="syz.3.21989" name="mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2582.533382][ T31] audit: type=1400 audit(2582.480:87746): avc: denied { read open } for pid=16947 comm="syz.3.21989" path="/dev/mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2582.547650][ T31] audit: type=1400 audit(2582.490:87747): avc: denied { ioctl } for pid=16947 comm="syz.3.21989" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2582.562108][ T31] audit: type=1400 audit(2582.500:87748): avc: denied { ioctl } for pid=16947 comm="syz.3.21989" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0x4d65 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2582.724542][ T31] audit: type=1400 audit(2582.670:87749): avc: denied { read } for pid=16949 comm="syz.2.21990" dev="nsfs" ino=4026532991 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2582.728429][ T31] audit: type=1400 audit(2582.670:87750): avc: denied { read open } for pid=16949 comm="syz.2.21990" path="net:[4026532991]" dev="nsfs" ino=4026532991 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2582.736887][ T31] audit: type=1400 audit(2582.680:87751): avc: denied { create } for pid=16949 comm="syz.2.21990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2582.758123][ T31] audit: type=1400 audit(2582.700:87752): avc: denied { read } for pid=16949 comm="syz.2.21990" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 2582.806780][ T31] audit: type=1400 audit(2582.750:87753): avc: denied { create } for pid=16951 comm="syz.3.21991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2582.811637][ T31] audit: type=1400 audit(2582.760:87754): avc: denied { ioctl } for pid=16951 comm="syz.3.21991" path="socket:[151260]" dev="sockfs" ino=151260 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2588.288903][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 2588.294444][ T31] audit: type=1400 audit(2588.230:87817): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2588.302703][ T31] audit: type=1400 audit(2588.250:87818): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2588.305834][ T31] audit: type=1400 audit(2588.250:87819): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2588.595494][ T31] audit: type=1400 audit(2588.540:87820): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2588.601952][ T31] audit: type=1400 audit(2588.540:87821): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2588.611169][ T31] audit: type=1400 audit(2588.550:87822): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2588.771724][ T31] audit: type=1400 audit(2588.720:87823): avc: denied { read } for pid=17012 comm="syz.3.22021" name="loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 2588.778655][ T31] audit: type=1400 audit(2588.720:87824): avc: denied { read open } for pid=17012 comm="syz.3.22021" path="/dev/loop-control" dev="devtmpfs" ino=632 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 2588.792808][ T31] audit: type=1400 audit(2588.740:87825): avc: denied { ioctl } for pid=17012 comm="syz.3.22021" path="/dev/loop-control" dev="devtmpfs" ino=632 ioctlcmd=0x7004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="u:r:untrusted_app:s0:c512,c768" [ 2589.030507][ T31] audit: type=1400 audit(2588.970:87826): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2590.848868][T17041] usb usb1: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 2593.524821][ T31] kauditd_printk_skb: 99 callbacks suppressed [ 2593.525363][ T31] audit: type=1400 audit(2593.470:87926): avc: denied { create } for pid=17077 comm="syz.3.22053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2593.527645][ T31] audit: type=1400 audit(2593.470:87927): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2593.530028][ T31] audit: type=1400 audit(2593.470:87928): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2593.544121][ T31] audit: type=1400 audit(2593.490:87929): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2593.567015][ T31] audit: type=1400 audit(2593.510:87930): avc: denied { getopt } for pid=17077 comm="syz.3.22053" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2593.856525][ T31] audit: type=1400 audit(2593.800:87931): avc: denied { read } for pid=17080 comm="syz.3.22055" name="mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2593.859027][ T31] audit: type=1400 audit(2593.800:87932): avc: denied { read open } for pid=17080 comm="syz.3.22055" path="/dev/mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2593.874712][ T31] audit: type=1400 audit(2593.820:87933): avc: denied { ioctl } for pid=17080 comm="syz.3.22055" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0x6403 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2593.931992][ T31] audit: type=1400 audit(2593.880:87934): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2593.936510][ T31] audit: type=1400 audit(2593.880:87935): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2598.619098][ T31] kauditd_printk_skb: 99 callbacks suppressed [ 2598.620079][ T31] audit: type=1400 audit(2598.560:88035): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2598.636928][ T31] audit: type=1400 audit(2598.580:88036): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2598.642815][ T31] audit: type=1400 audit(2598.590:88037): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2598.892950][ T31] audit: type=1400 audit(2598.840:88038): avc: denied { execmem } for pid=17148 comm="syz.3.22087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2598.942515][ T31] audit: type=1400 audit(2598.890:88039): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2598.947756][ T31] audit: type=1400 audit(2598.890:88040): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2598.961115][ T31] audit: type=1400 audit(2598.900:88041): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2599.152511][ T31] audit: type=1400 audit(2599.100:88042): avc: denied { read } for pid=17152 comm="syz.2.22088" name="sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2599.158205][ T31] audit: type=1400 audit(2599.100:88043): avc: denied { read open } for pid=17152 comm="syz.2.22088" path="/dev/sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2599.177218][ T31] audit: type=1400 audit(2599.110:88044): avc: denied { ioctl } for pid=17152 comm="syz.2.22088" path="/dev/sequencer" dev="devtmpfs" ino=712 ioctlcmd=0x5701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2603.697194][ T31] kauditd_printk_skb: 104 callbacks suppressed [ 2603.697712][ T31] audit: type=1400 audit(2603.640:88149): avc: denied { read } for pid=17214 comm="syz.2.22118" dev="nsfs" ino=4026532991 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2603.710677][ T31] audit: type=1400 audit(2603.650:88150): avc: denied { read open } for pid=17214 comm="syz.2.22118" path="net:[4026532991]" dev="nsfs" ino=4026532991 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2603.721777][ T31] audit: type=1400 audit(2603.670:88151): avc: denied { create } for pid=17214 comm="syz.2.22118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 2603.821532][ T31] audit: type=1400 audit(2603.770:88152): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2603.825116][ T31] audit: type=1400 audit(2603.770:88153): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2603.839266][ T31] audit: type=1400 audit(2603.780:88154): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2604.042698][ T31] audit: type=1400 audit(2603.990:88155): avc: denied { create } for pid=17217 comm="syz.3.22120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2604.068716][ T31] audit: type=1400 audit(2604.010:88156): avc: denied { ioctl } for pid=17217 comm="syz.3.22120" path="socket:[151721]" dev="sockfs" ino=151721 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2604.084398][ T31] audit: type=1400 audit(2604.030:88157): avc: denied { write } for pid=17217 comm="syz.3.22120" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 2604.161869][ T31] audit: type=1400 audit(2604.110:88158): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2608.821195][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 2608.821601][ T31] audit: type=1400 audit(2608.770:88210): avc: denied { read } for pid=17252 comm="syz.2.22136" name="sequencer2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2608.824741][ T31] audit: type=1400 audit(2608.770:88211): avc: denied { read open } for pid=17252 comm="syz.2.22136" path="/dev/sequencer2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2608.835664][ T31] audit: type=1400 audit(2608.780:88212): avc: denied { ioctl } for pid=17252 comm="syz.2.22136" path="/dev/sequencer2" dev="devtmpfs" ino=713 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2608.942991][ T31] audit: type=1400 audit(2608.890:88213): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2608.947333][ T31] audit: type=1400 audit(2608.890:88214): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2608.960698][ T31] audit: type=1400 audit(2608.900:88215): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2608.998911][ T31] audit: type=1400 audit(2608.940:88216): avc: denied { create } for pid=17254 comm="syz.3.22137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2609.031145][ T31] audit: type=1400 audit(2608.970:88217): avc: denied { write } for pid=17254 comm="syz.3.22137" path="socket:[151788]" dev="sockfs" ino=151788 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2609.031458][ T31] audit: type=1400 audit(2608.970:88218): avc: denied { write } for pid=17254 comm="syz.3.22137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2609.221895][ T31] audit: type=1400 audit(2609.170:88219): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2613.901060][ T31] kauditd_printk_skb: 89 callbacks suppressed [ 2613.901530][ T31] audit: type=1400 audit(2613.840:88309): avc: denied { create } for pid=17328 comm="syz.3.22172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2613.923224][ T31] audit: type=1400 audit(2613.870:88310): avc: denied { write } for pid=17328 comm="syz.3.22172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2614.073197][ T31] audit: type=1400 audit(2614.020:88311): avc: denied { read } for pid=17330 comm="syz.2.22173" name="mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2614.078111][ T31] audit: type=1400 audit(2614.020:88312): avc: denied { read open } for pid=17330 comm="syz.2.22173" path="/dev/mixer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2614.088728][ T31] audit: type=1400 audit(2614.030:88313): avc: denied { ioctl } for pid=17330 comm="syz.2.22173" path="/dev/mixer" dev="devtmpfs" ino=719 ioctlcmd=0x551e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2614.196125][ T31] audit: type=1400 audit(2614.140:88314): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2614.202456][ T31] audit: type=1400 audit(2614.150:88315): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2614.217706][ T31] audit: type=1400 audit(2614.160:88316): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2614.431909][ T31] audit: type=1400 audit(2614.380:88317): avc: denied { create } for pid=17334 comm="syz.2.22175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2614.460143][ T31] audit: type=1400 audit(2614.400:88318): avc: denied { setopt } for pid=17334 comm="syz.2.22175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2619.823145][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 2619.823357][ T31] audit: type=1400 audit(2619.770:88377): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2619.826225][ T31] audit: type=1400 audit(2619.770:88378): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2619.828324][ T31] audit: type=1400 audit(2619.770:88379): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2619.976293][ T31] audit: type=1400 audit(2619.920:88380): avc: denied { read } for pid=17380 comm="syz.2.22197" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2619.980010][ T31] audit: type=1400 audit(2619.920:88381): avc: denied { read open } for pid=17380 comm="syz.2.22197" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2619.994252][ T31] audit: type=1400 audit(2619.940:88382): avc: denied { ioctl } for pid=17380 comm="syz.2.22197" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x4dfc scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2620.102961][ T31] audit: type=1400 audit(2620.050:88383): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2620.106221][ T31] audit: type=1400 audit(2620.050:88384): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2620.110132][ T31] audit: type=1400 audit(2620.050:88385): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2620.354772][ T31] audit: type=1400 audit(2620.300:88386): avc: denied { read write } for pid=17383 comm="syz.3.22199" name="vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2625.008066][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 2625.008449][ T31] audit: type=1400 audit(2624.950:88441): avc: denied { create } for pid=17429 comm="syz.2.22219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2625.030425][ T31] audit: type=1400 audit(2624.970:88442): avc: denied { write } for pid=17429 comm="syz.2.22219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2625.147242][ T31] audit: type=1400 audit(2625.090:88443): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2625.156105][ T31] audit: type=1400 audit(2625.100:88444): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2625.177104][ T31] audit: type=1400 audit(2625.120:88445): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2625.300135][ T31] audit: type=1400 audit(2625.240:88446): avc: denied { read } for pid=17432 comm="syz.3.22221" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2625.300558][ T31] audit: type=1400 audit(2625.240:88447): avc: denied { read open } for pid=17432 comm="syz.3.22221" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2625.308958][ T31] audit: type=1400 audit(2625.250:88448): avc: denied { ioctl } for pid=17432 comm="syz.3.22221" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2625.438997][ T31] audit: type=1400 audit(2625.380:88449): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2625.444883][ T31] audit: type=1400 audit(2625.390:88450): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2630.080930][ T31] kauditd_printk_skb: 98 callbacks suppressed [ 2630.081560][ T31] audit: type=1400 audit(2630.020:88549): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2630.081783][ T31] audit: type=1400 audit(2630.020:88550): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2630.101384][ T31] audit: type=1400 audit(2630.050:88551): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2630.268924][ T31] audit: type=1400 audit(2630.210:88552): avc: denied { read } for pid=17504 comm="syz.3.22257" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2630.278587][ T31] audit: type=1400 audit(2630.220:88553): avc: denied { read open } for pid=17504 comm="syz.3.22257" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2630.308018][ T31] audit: type=1400 audit(2630.250:88554): avc: denied { read write } for pid=17504 comm="syz.3.22257" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2630.320234][ T31] audit: type=1400 audit(2630.260:88555): avc: denied { read write open } for pid=17504 comm="syz.3.22257" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2630.386028][ T31] audit: type=1400 audit(2630.330:88556): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2630.394260][ T31] audit: type=1400 audit(2630.330:88557): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2630.394714][ T31] audit: type=1400 audit(2630.340:88558): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2635.343620][ T31] kauditd_printk_skb: 91 callbacks suppressed [ 2635.344039][ T31] audit: type=1400 audit(2635.290:88650): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2635.357774][ T31] audit: type=1400 audit(2635.290:88651): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2635.358206][ T31] audit: type=1400 audit(2635.300:88652): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2635.601433][ T31] audit: type=1400 audit(2635.550:88653): avc: denied { read } for pid=17565 comm="syz.2.22286" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.610576][ T31] audit: type=1400 audit(2635.550:88654): avc: denied { read open } for pid=17565 comm="syz.2.22286" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.616190][ T31] audit: type=1400 audit(2635.560:88655): avc: denied { ioctl } for pid=17565 comm="syz.2.22286" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.807091][ T31] audit: type=1400 audit(2635.750:88656): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2635.807658][ T31] audit: type=1400 audit(2635.750:88657): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2635.813289][ T31] audit: type=1400 audit(2635.760:88658): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2635.834781][ T31] audit: type=1400 audit(2635.780:88659): avc: denied { create } for pid=17571 comm="syz.3.22287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2640.432796][ T31] kauditd_printk_skb: 96 callbacks suppressed [ 2640.434056][ T31] audit: type=1400 audit(2640.380:88756): avc: denied { read write } for pid=17634 comm="syz.2.22319" name="renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2640.442107][ T31] audit: type=1400 audit(2640.390:88757): avc: denied { read write open } for pid=17634 comm="syz.2.22319" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2640.457049][ T31] audit: type=1400 audit(2640.400:88758): avc: denied { ioctl } for pid=17634 comm="syz.2.22319" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2640.516677][ T31] audit: type=1400 audit(2640.460:88759): avc: denied { read } for pid=17635 comm="syz.3.22318" name="dmmidi2" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2640.519460][ T31] audit: type=1400 audit(2640.460:88760): avc: denied { read open } for pid=17635 comm="syz.3.22318" path="/dev/dmmidi2" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2640.576398][ T31] audit: type=1400 audit(2640.520:88761): avc: denied { read write } for pid=11776 comm="syz-executor" name="loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2640.578823][ T31] audit: type=1400 audit(2640.520:88762): avc: denied { read write open } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2640.584831][ T31] audit: type=1400 audit(2640.520:88763): avc: denied { ioctl } for pid=11776 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=856 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2640.772288][ T31] audit: type=1400 audit(2640.720:88764): avc: denied { execmem } for pid=17638 comm="syz.2.22320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2640.782981][ T31] audit: type=1400 audit(2640.720:88765): avc: denied { create } for pid=17639 comm="syz.3.22321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2644.371620][ T32] INFO: task kworker/0:2:9155 blocked for more than 430 seconds. [ 2644.376749][ T32] Not tainted 6.15.0-rc7-syzkaller #0 [ 2644.378354][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2644.380672][ T32] task:kworker/0:2 state:D stack:0 pid:9155 tgid:9155 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 2644.381552][ T32] Workqueue: events rfkill_global_led_trigger_worker [ 2644.381873][ T32] Call trace: [ 2644.382060][ T32] [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130) [ 2644.382267][ T32] r10:829ebc90 r9:eab69e54 r8:00000002 r7:60000013 r6:eab69e5c r5:8417bc00 [ 2644.382438][ T32] r4:8417bc00 [ 2644.382562][ T32] [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24) [ 2644.382729][ T32] r5:8417bc00 r4:829ebc8c [ 2644.382786][ T32] [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2644.382900][ T32] [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18) [ 2644.383007][ T32] r10:83016070 r9:83018005 r8:8417bc00 r7:dddced80 r6:83018000 r5:82c2fa14 [ 2644.383060][ T32] r4:829ebc8c [ 2644.383105][ T32] [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40) [ 2644.383265][ T32] [<81a57204>] (mutex_lock) from [<81970a18>] (rfkill_global_led_trigger_worker+0x1c/0xc0) [ 2644.383359][ T32] [<819709fc>] (rfkill_global_led_trigger_worker) from [<802873bc>] (process_one_work+0x1b4/0x4f4) [ 2644.383462][ T32] r5:82c2fa14 r4:850dcc80 [ 2644.383551][ T32] [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8) [ 2644.383668][ T32] r10:61c88647 r9:8417bc00 r8:850dccac r7:82804d40 r6:dddced80 r5:dddceda0 [ 2644.383750][ T32] r4:850dcc80 [ 2644.383802][ T32] [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280) [ 2644.383910][ T32] r10:00000000 r9:850dcc80 r8:80287e08 r7:eb3b9e60 r6:850dcc00 r5:8417bc00 [ 2644.383964][ T32] r4:00000001 [ 2644.384012][ T32] [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2644.384099][ T32] Exception stack(0xeab69fb0 to 0xeab69ff8) [ 2644.384166][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 2644.384233][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2644.384327][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2644.384404][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [ 2644.384455][ T32] r4:847a2500 [ 2644.385041][ T32] INFO: task kworker/0:2:9155 is blocked on a mutex likely owned by task syz.1.19828:11769. [ 2644.385139][ T32] task:syz.1.19828 state:D stack:0 pid:11769 tgid:11763 ppid:3099 task_flags:0x400040 flags:0x00000001 [ 2644.385252][ T32] Call trace: [ 2644.385333][ T32] [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130) [ 2644.385540][ T32] r10:85014460 r9:ee6f5ddc r8:00000002 r7:60000013 r6:ee6f5de4 r5:84184800 [ 2644.387643][ T32] r4:84184800 [ 2644.387836][ T32] [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24) [ 2644.387969][ T32] r5:84184800 r4:8501445c [ 2644.388017][ T32] [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2644.388110][ T32] [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18) [ 2644.388377][ T32] r10:81e86e5c r9:20000080 r8:00000000 r7:84184800 r6:00000001 r5:8501445c [ 2644.388447][ T32] r4:85014400 [ 2644.388495][ T32] [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40) [ 2644.388588][ T32] [<81a57204>] (mutex_lock) from [<819b5050>] (nfc_dev_down+0x20/0xc8) [ 2644.388717][ T32] [<819b5030>] (nfc_dev_down) from [<819b5124>] (nfc_rfkill_set_block+0x2c/0x68) [ 2644.388823][ T32] r7:84184800 r6:00000001 r5:85014400 r4:00000001 [ 2644.388891][ T32] [<819b50f8>] (nfc_rfkill_set_block) from [<81971814>] (rfkill_set_block+0x90/0x144) [ 2644.389012][ T32] r5:00000000 r4:85015c00 [ 2644.389155][ T32] [<81971784>] (rfkill_set_block) from [<81971d74>] (rfkill_fop_write+0x150/0x274) [ 2644.389400][ T32] r7:84184800 r6:85015c00 r5:829ebca0 r4:00000008 [ 2644.389906][ T32] [<81971c24>] (rfkill_fop_write) from [<805520a8>] (vfs_write+0xac/0x448) [ 2644.390020][ T32] r6:00000008 r5:8639e180 r4:81971c24 [ 2644.390685][ T32] [<80551ffc>] (vfs_write) from [<8055260c>] (ksys_write+0xd0/0xe4) [ 2644.393843][ T32] r10:00000004 r9:84184800 r8:8020029c r7:00000008 r6:20000080 r5:8639e180 [ 2644.393925][ T32] r4:8639e181 [ 2644.393975][ T32] [<8055253c>] (ksys_write) from [<80552630>] (sys_write+0x10/0x14) [ 2644.394216][ T32] r7:00000004 r6:002e6300 r5:00000000 r4:00000000 [ 2644.394274][ T32] [<80552620>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2644.394412][ T32] Exception stack(0xee6f5fa8 to 0xee6f5ff0) [ 2644.394515][ T32] 5fa0: 00000000 00000000 00000003 20000080 00000008 00000000 [ 2644.394640][ T32] 5fc0: 00000000 00000000 002e6300 00000004 002d0000 00000000 00006364 76bc40bc [ 2644.394708][ T32] 5fe0: 76bc3ec0 76bc3eb0 0001939c 00131f30 [ 2644.394882][ T32] INFO: task syz.0.19827:11761 blocked for more than 430 seconds. [ 2644.394976][ T32] Not tainted 6.15.0-rc7-syzkaller #0 [ 2644.395145][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2644.395286][ T32] task:syz.0.19827 state:D stack:0 pid:11761 tgid:11761 ppid:3100 task_flags:0x400040 flags:0x00000001 [ 2644.395549][ T32] Call trace: [ 2644.395626][ T32] [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130) [ 2644.395742][ T32] r10:829ebc90 r9:ee585dec r8:00000002 r7:60000013 r6:ee585df4 r5:83b6a400 [ 2644.395838][ T32] r4:83b6a400 [ 2644.395924][ T32] [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24) [ 2644.396065][ T32] r5:83b6a400 r4:829ebc8c [ 2644.396119][ T32] [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2644.396210][ T32] [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18) [ 2644.396310][ T32] r10:000001b4 r9:83b6a400 r8:850d4910 r7:84a5b800 r6:84a5b824 r5:85015e40 [ 2644.396364][ T32] r4:85015c00 [ 2644.396409][ T32] [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40) [ 2644.396494][ T32] [<81a57204>] (mutex_lock) from [<81971504>] (rfkill_unregister+0x5c/0xc4) [ 2644.396635][ T32] [<819714a8>] (rfkill_unregister) from [<819b47d8>] (nfc_unregister_device+0x44/0x118) [ 2644.396739][ T32] r5:8501445c r4:85014400 [ 2644.396790][ T32] [<819b4794>] (nfc_unregister_device) from [<819c1858>] (nci_unregister_device+0x94/0x98) [ 2644.396886][ T32] r5:84a5b824 r4:84a5b824 [ 2644.397030][ T32] [<819c17c4>] (nci_unregister_device) from [<80b82ddc>] (virtual_ncidev_close+0x18/0x30) [ 2644.397272][ T32] r9:83b6a400 r8:850d4910 r7:83c69458 r6:83418908 r5:040e001b r4:8652d380 [ 2644.397360][ T32] [<80b82dc4>] (virtual_ncidev_close) from [<80553c0c>] (__fput+0xd8/0x2ec) [ 2644.399557][ T32] r5:040e001b r4:84901180 [ 2644.400350][ T32] [<80553b34>] (__fput) from [<80553eb4>] (____fput+0x14/0x18) [ 2644.400556][ T32] r9:83b6a400 r8:82a716d0 r7:83b6a400 r6:83b6ac94 r5:83b6ac64 r4:00000000 [ 2644.400613][ T32] [<80553ea0>] (____fput) from [<8028d014>] (task_work_run+0x90/0xb8) [ 2644.400709][ T32] [<8028cf84>] (task_work_run) from [<8022bc08>] (do_work_pending+0x448/0x4f8) [ 2644.400815][ T32] r9:83b6a400 r8:8020029c r7:000001b4 r6:8020029c r5:ee585fb0 r4:83b6a400 [ 2644.400866][ T32] [<8022b7c0>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 2644.400951][ T32] Exception stack(0xee585fb0 to 0xee585ff8) [ 2644.401019][ T32] 5fa0: 00000000 0000001e 00000000 7efe3928 [ 2644.401085][ T32] 5fc0: 00000000 00004d73 00000000 000001b4 00000000 002e62d4 ffffffff 00000000 [ 2644.401148][ T32] 5fe0: 7efe3818 7efe3808 000266d4 00131f30 20000010 00000003 [ 2644.401250][ T32] r10:000001b4 r9:83b6a400 r8:8020029c r7:000001b4 r6:00000000 r5:00004d73 [ 2644.401381][ T32] r4:00000000 [ 2644.401755][ T32] INFO: task syz.0.19827:11761 is blocked on a mutex likely owned by task syz.1.19828:11769. [ 2644.401833][ T32] task:syz.1.19828 state:D stack:0 pid:11769 tgid:11763 ppid:3099 task_flags:0x400040 flags:0x00000001 [ 2644.401956][ T32] Call trace: [ 2644.402233][ T32] [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130) [ 2644.402407][ T32] r10:85014460 r9:ee6f5ddc r8:00000002 r7:60000013 r6:ee6f5de4 r5:84184800 [ 2644.402481][ T32] r4:84184800 [ 2644.402531][ T32] [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24) [ 2644.402870][ T32] r5:84184800 r4:8501445c [ 2644.402934][ T32] [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2644.403088][ T32] [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18) [ 2644.403199][ T32] r10:81e86e5c r9:20000080 r8:00000000 r7:84184800 r6:00000001 r5:8501445c [ 2644.403254][ T32] r4:85014400 [ 2644.403329][ T32] [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40) [ 2644.405364][ T32] [<81a57204>] (mutex_lock) from [<819b5050>] (nfc_dev_down+0x20/0xc8) [ 2644.405589][ T32] [<819b5030>] (nfc_dev_down) from [<819b5124>] (nfc_rfkill_set_block+0x2c/0x68) [ 2644.405700][ T32] r7:84184800 r6:00000001 r5:85014400 r4:00000001 [ 2644.405833][ T32] [<819b50f8>] (nfc_rfkill_set_block) from [<81971814>] (rfkill_set_block+0x90/0x144) [ 2644.405978][ T32] r5:00000000 r4:85015c00 [ 2644.406032][ T32] [<81971784>] (rfkill_set_block) from [<81971d74>] (rfkill_fop_write+0x150/0x274) [ 2644.406130][ T32] r7:84184800 r6:85015c00 r5:829ebca0 r4:00000008 [ 2644.406182][ T32] [<81971c24>] (rfkill_fop_write) from [<805520a8>] (vfs_write+0xac/0x448) [ 2644.406282][ T32] r6:00000008 r5:8639e180 r4:81971c24 [ 2644.406334][ T32] [<80551ffc>] (vfs_write) from [<8055260c>] (ksys_write+0xd0/0xe4) [ 2644.406436][ T32] r10:00000004 r9:84184800 r8:8020029c r7:00000008 r6:20000080 r5:8639e180 [ 2644.406518][ T32] r4:8639e181 [ 2644.406583][ T32] [<8055253c>] (ksys_write) from [<80552630>] (sys_write+0x10/0x14) [ 2644.406679][ T32] r7:00000004 r6:002e6300 r5:00000000 r4:00000000 [ 2644.406730][ T32] [<80552620>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2644.406818][ T32] Exception stack(0xee6f5fa8 to 0xee6f5ff0) [ 2644.406889][ T32] 5fa0: 00000000 00000000 00000003 20000080 00000008 00000000 [ 2644.407038][ T32] 5fc0: 00000000 00000000 002e6300 00000004 002d0000 00000000 00006364 76bc40bc [ 2644.407106][ T32] 5fe0: 76bc3ec0 76bc3eb0 0001939c 00131f30 [ 2644.407221][ T32] INFO: task syz.1.19828:11769 blocked for more than 430 seconds. [ 2644.407303][ T32] Not tainted 6.15.0-rc7-syzkaller #0 [ 2644.407364][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2644.407414][ T32] task:syz.1.19828 state:D stack:0 pid:11769 tgid:11763 ppid:3099 task_flags:0x400040 flags:0x00000001 [ 2644.407623][ T32] Call trace: [ 2644.407754][ T32] [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130) [ 2644.407917][ T32] r10:85014460 r9:ee6f5ddc r8:00000002 r7:60000013 r6:ee6f5de4 r5:84184800 [ 2644.407981][ T32] r4:84184800 [ 2644.408095][ T32] [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24) [ 2644.408200][ T32] r5:84184800 r4:8501445c [ 2644.408249][ T32] [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2644.408343][ T32] [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18) [ 2644.408464][ T32] r10:81e86e5c r9:20000080 r8:00000000 r7:84184800 r6:00000001 r5:8501445c [ 2644.408546][ T32] r4:85014400 [ 2644.408678][ T32] [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40) [ 2644.408764][ T32] [<81a57204>] (mutex_lock) from [<819b5050>] (nfc_dev_down+0x20/0xc8) [ 2644.408849][ T32] [<819b5030>] (nfc_dev_down) from [<819b5124>] (nfc_rfkill_set_block+0x2c/0x68) [ 2644.408949][ T32] r7:84184800 r6:00000001 r5:85014400 r4:00000001 [ 2644.408996][ T32] [<819b50f8>] (nfc_rfkill_set_block) from [<81971814>] (rfkill_set_block+0x90/0x144) [ 2644.409146][ T32] r5:00000000 r4:85015c00 [ 2644.409198][ T32] [<81971784>] (rfkill_set_block) from [<81971d74>] (rfkill_fop_write+0x150/0x274) [ 2644.420325][ T32] r7:84184800 r6:85015c00 r5:829ebca0 r4:00000008 [ 2644.420418][ T32] [<81971c24>] (rfkill_fop_write) from [<805520a8>] (vfs_write+0xac/0x448) [ 2644.420575][ T32] r6:00000008 r5:8639e180 r4:81971c24 [ 2644.420657][ T32] [<80551ffc>] (vfs_write) from [<8055260c>] (ksys_write+0xd0/0xe4) [ 2644.420777][ T32] r10:00000004 r9:84184800 r8:8020029c r7:00000008 r6:20000080 r5:8639e180 [ 2644.420881][ T32] r4:8639e181 [ 2644.420988][ T32] [<8055253c>] (ksys_write) from [<80552630>] (sys_write+0x10/0x14) [ 2644.421095][ T32] r7:00000004 r6:002e6300 r5:00000000 r4:00000000 [ 2644.421144][ T32] [<80552620>] (sys_write) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2644.421233][ T32] Exception stack(0xee6f5fa8 to 0xee6f5ff0) [ 2644.421307][ T32] 5fa0: 00000000 00000000 00000003 20000080 00000008 00000000 [ 2644.421379][ T32] 5fc0: 00000000 00000000 002e6300 00000004 002d0000 00000000 00006364 76bc40bc [ 2644.424018][ T32] 5fe0: 76bc3ec0 76bc3eb0 0001939c 00131f30 [ 2644.424519][ T32] INFO: task syz.1.19828:11769 is blocked on a mutex likely owned by task syz.0.19827:11761. [ 2644.424653][ T32] task:syz.0.19827 state:D stack:0 pid:11761 tgid:11761 ppid:3100 task_flags:0x400040 flags:0x00000001 [ 2644.425689][ T32] Call trace: [ 2644.426148][ T32] [<81a532e4>] (__schedule) from [<81a54268>] (schedule+0x2c/0x130) [ 2644.426471][ T32] r10:829ebc90 r9:ee585dec r8:00000002 r7:60000013 r6:ee585df4 r5:83b6a400 [ 2644.426565][ T32] r4:83b6a400 [ 2644.426631][ T32] [<81a5423c>] (schedule) from [<81a54650>] (schedule_preempt_disabled+0x18/0x24) [ 2644.426763][ T32] r5:83b6a400 r4:829ebc8c [ 2644.426864][ T32] [<81a54638>] (schedule_preempt_disabled) from [<81a56d34>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 2644.427074][ T32] [<81a56a34>] (__mutex_lock.constprop.0) from [<81a57200>] (__mutex_lock_slowpath+0x14/0x18) [ 2644.427263][ T32] r10:000001b4 r9:83b6a400 r8:850d4910 r7:84a5b800 r6:84a5b824 r5:85015e40 [ 2644.427346][ T32] r4:85015c00 [ 2644.427405][ T32] [<81a571ec>] (__mutex_lock_slowpath) from [<81a57240>] (mutex_lock+0x3c/0x40) [ 2644.427510][ T32] [<81a57204>] (mutex_lock) from [<81971504>] (rfkill_unregister+0x5c/0xc4) [ 2644.427612][ T32] [<819714a8>] (rfkill_unregister) from [<819b47d8>] (nfc_unregister_device+0x44/0x118) [ 2644.427742][ T32] r5:8501445c r4:85014400 [ 2644.427808][ T32] [<819b4794>] (nfc_unregister_device) from [<819c1858>] (nci_unregister_device+0x94/0x98) [ 2644.427922][ T32] r5:84a5b824 r4:84a5b824 [ 2644.427983][ T32] [<819c17c4>] (nci_unregister_device) from [<80b82ddc>] (virtual_ncidev_close+0x18/0x30) [ 2644.428111][ T32] r9:83b6a400 r8:850d4910 r7:83c69458 r6:83418908 r5:040e001b r4:8652d380 [ 2644.428176][ T32] [<80b82dc4>] (virtual_ncidev_close) from [<80553c0c>] (__fput+0xd8/0x2ec) [ 2644.428296][ T32] r5:040e001b r4:84901180 [ 2644.428353][ T32] [<80553b34>] (__fput) from [<80553eb4>] (____fput+0x14/0x18) [ 2644.428530][ T32] r9:83b6a400 r8:82a716d0 r7:83b6a400 r6:83b6ac94 r5:83b6ac64 r4:00000000 [ 2644.428597][ T32] [<80553ea0>] (____fput) from [<8028d014>] (task_work_run+0x90/0xb8) [ 2644.428709][ T32] [<8028cf84>] (task_work_run) from [<8022bc08>] (do_work_pending+0x448/0x4f8) [ 2644.428827][ T32] r9:83b6a400 r8:8020029c r7:000001b4 r6:8020029c r5:ee585fb0 r4:83b6a400 [ 2644.428986][ T32] [<8022b7c0>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 2644.429125][ T32] Exception stack(0xee585fb0 to 0xee585ff8) [ 2644.429239][ T32] 5fa0: 00000000 0000001e 00000000 7efe3928 [ 2644.435653][ T32] 5fc0: 00000000 00004d73 00000000 000001b4 00000000 002e62d4 ffffffff 00000000 [ 2644.435832][ T32] 5fe0: 7efe3818 7efe3808 000266d4 00131f30 20000010 00000003 [ 2644.435922][ T32] r10:000001b4 r9:83b6a400 r8:8020029c r7:000001b4 r6:00000000 r5:00004d73 [ 2644.435990][ T32] r4:00000000 [ 2644.436820][ T32] NMI backtrace for cpu 0 [ 2644.437023][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 2644.437087][ T32] Hardware name: ARM-Versatile Express [ 2644.437116][ T32] Call trace: [ 2644.437161][ T32] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2644.437284][ T32] r7:00000000 r6:00000013 r5:60000093 r4:82257fc8 [ 2644.437348][ T32] [<80201ac8>] (show_stack) from [<8021ff98>] (dump_stack_lvl+0x70/0x7c) [ 2644.437410][ T32] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 2644.437534][ T32] r5:00000000 r4:00000001 [ 2644.437558][ T32] [<8021ffa4>] (dump_stack) from [<81a3d44c>] (nmi_cpu_backtrace+0x160/0x17c) [ 2644.437615][ T32] [<81a3d2ec>] (nmi_cpu_backtrace) from [<81a3d598>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 2644.437671][ T32] r7:00000000 r6:8280c610 r5:8281af00 r4:ffffffff [ 2644.437685][ T32] [<81a3d468>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 2644.437752][ T32] r9:000393c0 r8:82ab6564 r7:8280c788 r6:00007f37 r5:8281b4c8 r4:8321970c [ 2644.437801][ T32] [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (watchdog+0x4a8/0x69c) [ 2644.437860][ T32] [<80386900>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280) [ 2644.437923][ T32] r10:00000000 r9:00000000 r8:80386900 r7:83327600 r6:83327600 r5:83251800 [ 2644.437941][ T32] r4:00000001 [ 2644.438056][ T32] [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2644.438111][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 2644.438143][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2644.438171][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2644.438196][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2644.438225][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [ 2644.438339][ T32] r4:832bfa40 [ 2644.438501][ T32] Sending NMI from CPU 0 to CPUs 1: [ 2644.439691][ C1] NMI backtrace for cpu 1 [ 2644.439891][ C1] CPU: 1 UID: 0 PID: 2821 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 2644.439949][ C1] Hardware name: ARM-Versatile Express [ 2644.440003][ C1] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 2644.440090][ C1] LR is at pl011_console_device_unlock+0x20/0x24 [ 2644.440182][ C1] pc : [<81a5c66c>] lr : [<80a62b0c>] psr: 60010113 [ 2644.440246][ C1] sp : ebbc9eb0 ip : ebbc9ec0 fp : ebbc9ebc [ 2644.440292][ C1] r10: 8295b3bc r9 : 00000001 r8 : 00000000 [ 2644.440370][ C1] r7 : 00000117 r6 : 8295b320 r5 : 00000000 r4 : 00000001 [ 2644.440423][ C1] r3 : 00003017 r2 : 00000000 r1 : 60010113 r0 : 83f3b040 [ 2644.440571][ C1] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 2644.440655][ C1] Control: 30c5387d Table: 84468e40 DAC: 00000000 [ 2644.440724][ C1] Call trace: [ 2644.440779][ C1] [<81a5c644>] (_raw_spin_unlock_irqrestore) from [<80a62b0c>] (pl011_console_device_unlock+0x20/0x24) [ 2644.440853][ C1] [<80a62aec>] (pl011_console_device_unlock) from [<802efd14>] (nbcon_emit_one+0x80/0xf8) [ 2644.440929][ C1] [<802efc94>] (nbcon_emit_one) from [<802eff34>] (nbcon_kthread_func+0x1a8/0x2a4) [ 2644.441012][ C1] r6:8280c610 r5:83a21800 r4:8295b320 [ 2644.441041][ C1] [<802efd8c>] (nbcon_kthread_func) from [<8028f07c>] (kthread+0x12c/0x280) [ 2644.441122][ C1] r10:00000000 r9:8295b320 r8:802efd8c r7:846a5800 r6:846a5800 r5:83a21800 [ 2644.441158][ C1] r4:00000001 [ 2644.441175][ C1] [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2644.441230][ C1] Exception stack(0xebbc9fb0 to 0xebbc9ff8) [ 2644.441271][ C1] 9fa0: 00000000 00000000 00000000 00000000 [ 2644.441307][ C1] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2644.441333][ C1] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2644.441365][ C1] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [ 2644.441383][ C1] r4:83362cc0 [ 2644.442552][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 2644.483210][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc7-syzkaller #0 PREEMPT [ 2644.483576][ T32] Hardware name: ARM-Versatile Express [ 2644.483784][ T32] Call trace: [ 2644.484009][ T32] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 2644.484348][ T32] r7:00000000 r6:828227fc r5:00000000 r4:82257fc8 [ 2644.484570][ T32] [<80201ac8>] (show_stack) from [<8021ff7c>] (dump_stack_lvl+0x54/0x7c) [ 2644.484876][ T32] [<8021ff28>] (dump_stack_lvl) from [<8021ffbc>] (dump_stack+0x18/0x1c) [ 2644.485172][ T32] r5:00000000 r4:82a70d4c [ 2644.485341][ T32] [<8021ffa4>] (dump_stack) from [<802025f8>] (panic+0x120/0x374) [ 2644.485624][ T32] [<802024d8>] (panic) from [<80386c14>] (watchdog+0x314/0x69c) [ 2644.485917][ T32] r3:00000001 r2:00000000 r1:00000001 r0:82258b60 [ 2644.486131][ T32] r7:8280c788 [ 2644.486270][ T32] [<80386900>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280) [ 2644.486564][ T32] r10:00000000 r9:00000000 r8:80386900 r7:83327600 r6:83327600 r5:83251800 [ 2644.486919][ T32] r4:00000001 [ 2644.487060][ T32] [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2644.487348][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 2644.487571][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 2644.487853][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2644.488126][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2644.488373][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [ 2644.488629][ T32] r4:832bfa40 [ 2644.491998][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:37:55 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82257fc8 R02=00000000 R03=81a50fc8 R04=00000006 R05=828fac48 R06=00000000 R07=828fac40 R08=83251800 R09=00000028 R10=828fac48 R11=df8e1d9c R12=df8e1da0 R13=df8e1d90 R14=803480f4 R15=81a50fd8 PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=828293f8 R01=00000001 R02=003643a3 R03=81a50fc8 R04=00000006 R05=828fac48 R06=00000000 R07=828fac40 R08=83a21800 R09=00000028 R10=828fac48 R11=ebbc9d6c R12=ebbc9d70 R13=ebbc9d60 R14=803480f4 R15=81a50fd8 PSR=a0010093 N-C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000