last executing test programs: 6.397620345s ago: executing program 1 (id=38353): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000007c0)='cpuacct.usage_user\x00', 0x275a, 0x0) write$UHID_INPUT(r0, &(0x7f0000000940)={0x8, {"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", 0x1000}}, 0x1006) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) write$UHID_INPUT(r1, &(0x7f0000000940)={0x8, {"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", 0x1000}}, 0xb00) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev}, 0x1c) r3 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_ERRQUEUE(r3, 0x6b, 0x2, 0x0, &(0x7f0000000080)) 5.768705132s ago: executing program 1 (id=38354): socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='io.stat\x00', 0x275a, 0x0) socket(0x200000100000011, 0x803, 0x0) socket$packet(0x11, 0x2, 0x300) socket(0x200000100000011, 0x803, 0x0) socket$packet(0x11, 0x2, 0x300) socket(0x200000100000011, 0x803, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2800000035000100000000000000000003ffffffe5000000100001800c001000040010", @ANYRES8=0x0, @ANYRES16=r0, @ANYRES64=r1], 0x28}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000200)={0x1b, 0x0, 0x0, 0x1, 0x0, r0, 0x2, '\x00', r3, r0, 0x0, 0x5, 0x3}, 0x48) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r4, 0xffffffffffffffff}, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x8, 0x2, 0x7, 0x0, 0x2021, r4, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x25, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a5000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r6, &(0x7f0000514ff4), 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, 0x0, 0x0) 5.349176419s ago: executing program 1 (id=38355): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x1f4, 0x0, 0xfffffffffffffd25) 5.108530771s ago: executing program 1 (id=38356): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000080)="a1", 0x20000081}], 0x2, 0x0) vmsplice(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)='c', 0x1}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 2.593598157s ago: executing program 0 (id=38361): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@setlink={0x3c, 0x13, 0x501, 0x0, 0x0, {}, [@IFLA_ALT_IFNAME={0x14, 0x35, 'veth0_vlan\x00'}, @IFLA_OPERSTATE={0x5, 0x10, 0x5}]}, 0x3c}}, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) getgroups(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) 2.438057271s ago: executing program 1 (id=38362): r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f00000003c0)=ANY=[@ANYBLOB="12010000020000402505a1a440000102030109025c0002010000000904000001020d0000052406000105240000000d240f010a000500000000000006241a0000000905810300020000000904010000020d00000904010102020d00000905820200021b000b090503020002"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000880)={0x84, &(0x7f0000000440)={0x0, 0x0, 0x12, "86ec7bde71050a7fe15e020a3e04fc963b82"}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x40, 0x9, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={0x40, 0x1c, 0x1}, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) 2.219017871s ago: executing program 0 (id=38363): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) sendmsg$inet6(r0, &(0x7f0000000140)={&(0x7f0000000080)={0xa, 0x4622, 0x1000000080000, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000029"], 0x18}, 0x0) 1.617866434s ago: executing program 0 (id=38364): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x541e, 0x0) 1.285575434s ago: executing program 0 (id=38365): socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x50, 0x4, 0x2}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, 0x20000000}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r1, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_GETKMSGREDIRECT(r2, 0x541c, &(0x7f0000000000)) 820.373096ms ago: executing program 0 (id=38366): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x3, &(0x7f0000000380)=[{}, {0x64}, {0x6}]}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x14}, 0x14}}, 0x0) 183.548863ms ago: executing program 0 (id=38367): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x4b0}}, 0x0) 0s ago: executing program 1 (id=38368): r0 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r0, 0x68, 0x0, 0x2) kernel console output (not intermixed with test programs): 2207): avc: denied { ioctl } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7439.001708][ T31] audit: type=1400 audit(7438.930:122208): avc: denied { read } for pid=2816 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 7439.002542][ T31] audit: type=1400 audit(7438.930:122209): avc: denied { search } for pid=2816 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7439.003119][ T31] audit: type=1400 audit(7438.930:122210): avc: denied { append } for pid=2816 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7439.003797][ T31] audit: type=1400 audit(7438.930:122211): avc: denied { append open } for pid=2816 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7444.137631][ T31] kauditd_printk_skb: 139 callbacks suppressed [ 7444.137738][ T31] audit: type=1400 audit(7444.060:122351): avc: denied { search } for pid=27207 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7444.171574][ T31] audit: type=1400 audit(7444.100:122352): avc: denied { module_request } for pid=27204 comm="syz.0.38023" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7444.335576][ T31] audit: type=1400 audit(7444.260:122353): avc: denied { read } for pid=2816 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 7444.336519][ T31] audit: type=1400 audit(7444.260:122354): avc: denied { search } for pid=2816 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7444.346522][ T31] audit: type=1400 audit(7444.260:122355): avc: denied { append } for pid=2816 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7444.347461][ T31] audit: type=1400 audit(7444.260:122356): avc: denied { append open } for pid=2816 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7444.357747][ T31] audit: type=1400 audit(7444.260:122357): avc: denied { getattr } for pid=2816 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7444.721522][ T31] audit: type=1400 audit(7444.650:122358): avc: denied { read write } for pid=26619 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7444.731472][ T31] audit: type=1400 audit(7444.660:122359): avc: denied { open } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7444.732263][ T31] audit: type=1400 audit(7444.660:122360): avc: denied { ioctl } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7449.203389][ T31] kauditd_printk_skb: 154 callbacks suppressed [ 7449.203502][ T31] audit: type=1400 audit(7449.130:122515): avc: denied { search } for pid=27239 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7449.228547][ T31] audit: type=1400 audit(7449.150:122516): avc: denied { getattr } for pid=27239 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=691 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7449.231239][ T31] audit: type=1400 audit(7449.150:122517): avc: denied { write } for pid=27239 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7449.232091][ T31] audit: type=1400 audit(7449.150:122518): avc: denied { remove_name } for pid=27239 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=691 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7449.232945][ T31] audit: type=1400 audit(7449.150:122519): avc: denied { unlink } for pid=27239 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=691 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7449.356269][ T31] audit: type=1400 audit(7449.280:122520): avc: denied { read write } for pid=26619 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7449.399715][ T31] audit: type=1400 audit(7449.320:122521): avc: denied { read write open } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7449.400753][ T31] audit: type=1400 audit(7449.320:122522): avc: denied { ioctl } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7449.657270][ T31] audit: type=1400 audit(7449.580:122523): avc: denied { read write } for pid=26619 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7449.689602][ T31] audit: type=1400 audit(7449.610:122524): avc: denied { read write open } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7450.599804][T27249] ALSA: mixer_oss: invalid OSS volume 'ü' [ 7455.034343][ T31] kauditd_printk_skb: 130 callbacks suppressed [ 7455.034422][ T31] audit: type=1400 audit(7454.960:122655): avc: denied { read write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7455.036499][ T31] audit: type=1400 audit(7454.960:122656): avc: denied { open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7455.059571][ T31] audit: type=1400 audit(7454.980:122657): avc: denied { ioctl } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7455.224230][ T31] audit: type=1400 audit(7455.150:122658): avc: denied { read } for pid=27275 comm="syz.1.38038" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7455.225253][ T31] audit: type=1400 audit(7455.150:122659): avc: denied { open } for pid=27275 comm="syz.1.38038" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7455.229669][ T31] audit: type=1400 audit(7455.150:122660): avc: denied { ioctl } for pid=27275 comm="syz.1.38038" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x1269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7455.272671][ T31] audit: type=1400 audit(7455.200:122661): avc: denied { write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7455.290399][ T31] audit: type=1400 audit(7455.200:122662): avc: denied { read write open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7455.291456][ T31] audit: type=1400 audit(7455.200:122663): avc: denied { ioctl } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7455.409353][ T31] audit: type=1326 audit(7455.330:122664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27277 comm="syz.1.38039" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130520 code=0x7ffc0000 [ 7456.756068][T27293] netlink: 'syz.1.38044': attribute type 1 has an invalid length. [ 7456.756589][T27293] netlink: 'syz.1.38044': attribute type 3 has an invalid length. [ 7456.756945][T27293] netlink: 9348 bytes leftover after parsing attributes in process `syz.1.38044'. [ 7461.280683][ T31] kauditd_printk_skb: 80 callbacks suppressed [ 7461.280804][ T31] audit: type=1400 audit(7461.190:122745): avc: denied { read write } for pid=26619 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7461.282027][ T31] audit: type=1400 audit(7461.190:122746): avc: denied { open } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7461.282824][ T31] audit: type=1400 audit(7461.190:122747): avc: denied { ioctl } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7461.504962][ T31] audit: type=1400 audit(7461.430:122748): avc: denied { create } for pid=27307 comm="syz.0.38049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7461.520921][ T31] audit: type=1400 audit(7461.450:122749): avc: denied { setopt } for pid=27307 comm="syz.0.38049" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7461.528241][ T31] audit: type=1400 audit(7461.450:122750): avc: denied { create } for pid=27307 comm="syz.0.38049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7461.662971][ T31] audit: type=1400 audit(7461.580:122751): avc: denied { read write } for pid=26619 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7461.722911][ T31] audit: type=1400 audit(7461.580:122752): avc: denied { open } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7461.726310][ T31] audit: type=1400 audit(7461.580:122753): avc: denied { ioctl } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7461.939816][ T31] audit: type=1400 audit(7461.830:122754): avc: denied { create } for pid=27310 comm="syz.0.38050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7467.066898][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 7467.067558][ T31] audit: type=1400 audit(7466.990:122823): avc: denied { read } for pid=27310 comm="syz.0.38050" name="tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7467.101719][ T31] audit: type=1400 audit(7467.030:122824): avc: denied { read open } for pid=27310 comm="syz.0.38050" path="/dev/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7467.111135][ T31] audit: type=1400 audit(7467.030:122825): avc: denied { ioctl } for pid=27310 comm="syz.0.38050" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7467.163144][ T31] audit: type=1400 audit(7467.090:122826): avc: denied { ioctl } for pid=27310 comm="syz.0.38050" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54cd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7469.907689][ T31] audit: type=1400 audit(7469.820:122827): avc: denied { read write } for pid=27327 comm="syz.1.38058" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7469.938613][ T31] audit: type=1400 audit(7469.820:122828): avc: denied { open } for pid=27327 comm="syz.1.38058" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7469.959601][ T31] audit: type=1400 audit(7469.850:122829): avc: denied { create } for pid=27327 comm="syz.1.38058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7469.961276][ T31] audit: type=1400 audit(7469.850:122830): avc: denied { write } for pid=27327 comm="syz.1.38058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7484.681429][ T31] audit: type=1400 audit(7484.590:122831): avc: denied { read write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7484.719440][ T31] audit: type=1400 audit(7484.590:122832): avc: denied { read write open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7484.749618][ T31] audit: type=1400 audit(7484.590:122833): avc: denied { ioctl } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7484.881195][ T31] audit: type=1400 audit(7484.790:122834): avc: denied { read } for pid=27339 comm="syz.1.38059" name="pcmC0D0p" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7484.884145][ T31] audit: type=1400 audit(7484.810:122835): avc: denied { open } for pid=27339 comm="syz.1.38059" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7484.891793][ T31] audit: type=1400 audit(7484.810:122836): avc: denied { map } for pid=27339 comm="syz.1.38059" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7484.960625][ T31] audit: type=1400 audit(7484.870:122837): avc: denied { read write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7484.961654][ T31] audit: type=1400 audit(7484.870:122838): avc: denied { open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7484.962440][ T31] audit: type=1400 audit(7484.870:122839): avc: denied { ioctl } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7485.124051][ T31] audit: type=1400 audit(7485.050:122840): avc: denied { create } for pid=27341 comm="syz.1.38060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 7487.923578][T27353] i2c i2c-0: readbytes: invalid block length (255) [ 7490.853130][ T31] kauditd_printk_skb: 67 callbacks suppressed [ 7490.853188][ T31] audit: type=1400 audit(7490.780:122908): avc: denied { read write } for pid=26619 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7490.860036][ T31] audit: type=1400 audit(7490.790:122909): avc: denied { open } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7490.862381][ T31] audit: type=1400 audit(7490.790:122910): avc: denied { ioctl } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7491.106069][ T31] audit: type=1400 audit(7491.030:122911): avc: denied { read write } for pid=26619 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7491.107184][ T31] audit: type=1400 audit(7491.030:122912): avc: denied { open } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7491.108058][ T31] audit: type=1400 audit(7491.030:122913): avc: denied { ioctl } for pid=26619 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7491.296337][ T31] audit: type=1400 audit(7491.220:122914): avc: denied { prog_load } for pid=27371 comm="syz.0.38072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7491.297309][ T31] audit: type=1400 audit(7491.220:122915): avc: denied { bpf } for pid=27371 comm="syz.0.38072" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7491.298058][ T31] audit: type=1400 audit(7491.220:122916): avc: denied { perfmon } for pid=27371 comm="syz.0.38072" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7491.298810][ T31] audit: type=1400 audit(7491.220:122917): avc: denied { prog_run } for pid=27371 comm="syz.0.38072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7492.292889][T27381] netlink: 'syz.1.38075': attribute type 10 has an invalid length. [ 7492.335817][T25089] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7492.460566][T25089] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7492.537397][T25089] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7492.661385][T25089] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7492.663892][T27386] netlink: 8 bytes leftover after parsing attributes in process `syz.1.38077'. [ 7493.313260][T25089] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 7493.378809][T25089] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 7493.383912][T25089] bond0 (unregistering): Released all slaves [ 7493.424234][T27401] xfrm1: entered allmulticast mode [ 7493.614757][T25089] hsr_slave_0: left promiscuous mode [ 7493.617680][T25089] hsr_slave_1: left promiscuous mode [ 7493.665843][T25089] veth1_macvtap: left promiscuous mode [ 7493.666318][T25089] veth0_macvtap: left promiscuous mode [ 7493.666695][T25089] veth1_vlan: left promiscuous mode [ 7493.667059][T25089] veth0_vlan: left promiscuous mode [ 7495.943168][ T31] kauditd_printk_skb: 102 callbacks suppressed [ 7495.943284][ T31] audit: type=1400 audit(7495.870:123020): avc: denied { module_request } for pid=27382 comm="syz-executor" kmod="netdev-rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7496.019433][ T31] audit: type=1400 audit(7495.940:123021): avc: denied { prog_load } for pid=27420 comm="syz.1.38082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7496.021005][ T31] audit: type=1400 audit(7495.940:123022): avc: denied { bpf } for pid=27420 comm="syz.1.38082" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7496.022326][ T31] audit: type=1400 audit(7495.940:123023): avc: denied { perfmon } for pid=27420 comm="syz.1.38082" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7496.027605][ T31] audit: type=1400 audit(7495.950:123024): avc: denied { read } for pid=27420 comm="syz.1.38082" name="nbd1" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7496.049910][ T31] audit: type=1400 audit(7495.950:123025): avc: denied { open } for pid=27420 comm="syz.1.38082" path="/dev/nbd1" dev="devtmpfs" ino=652 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7496.051230][ T31] audit: type=1400 audit(7495.970:123026): avc: denied { create } for pid=27420 comm="syz.1.38082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 7496.052438][ T31] audit: type=1400 audit(7495.970:123027): avc: denied { module_request } for pid=27420 comm="syz.1.38082" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7496.239569][ T31] audit: type=1400 audit(7496.160:123028): avc: denied { sys_module } for pid=27382 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7496.241468][ T31] audit: type=1400 audit(7496.160:123029): avc: denied { module_request } for pid=27382 comm="syz-executor" kmod="rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7497.019467][T27097] usb 2-1: new low-speed USB device number 47 using dummy_hcd [ 7497.378443][T27097] usb 2-1: config index 0 descriptor too short (expected 6427, got 27) [ 7497.379550][T27097] usb 2-1: config 0 has an invalid interface number: 21 but max is 0 [ 7497.379926][T27097] usb 2-1: config 0 has no interface number 0 [ 7497.380310][T27097] usb 2-1: config 0 interface 21 altsetting 0 endpoint 0x82 is Bulk; changing to Interrupt [ 7497.380822][T27097] usb 2-1: config 0 interface 21 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 7497.381214][T27097] usb 2-1: New USB device found, idVendor=06cd, idProduct=0202, bcdDevice=92.d4 [ 7497.381532][T27097] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 7497.387125][T27097] usb 2-1: config 0 descriptor?? [ 7498.241647][T27097] usb 2-1: USB disconnect, device number 47 [ 7500.970757][ T31] kauditd_printk_skb: 106 callbacks suppressed [ 7500.970873][ T31] audit: type=1400 audit(7500.890:123136): avc: denied { search } for pid=27569 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7501.125634][ T31] audit: type=1400 audit(7501.050:123137): avc: denied { read } for pid=2816 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 7501.142706][ T31] audit: type=1400 audit(7501.070:123138): avc: denied { search } for pid=2816 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7501.143702][ T31] audit: type=1400 audit(7501.070:123139): avc: denied { append } for pid=2816 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7501.144470][ T31] audit: type=1400 audit(7501.070:123140): avc: denied { open } for pid=2816 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7501.145275][ T31] audit: type=1400 audit(7501.070:123141): avc: denied { getattr } for pid=2816 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7501.236323][ T31] audit: type=1400 audit(7501.130:123142): avc: denied { sys_module } for pid=27382 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7501.237295][ T31] audit: type=1400 audit(7501.130:123143): avc: denied { module_request } for pid=27382 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7501.284105][ T31] audit: type=1400 audit(7501.210:123144): avc: denied { read write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7501.299581][ T31] audit: type=1400 audit(7501.220:123145): avc: denied { read write open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7501.630190][T27575] netlink: 'syz.1.38086': attribute type 10 has an invalid length. [ 7501.630998][T27575] netlink: 40 bytes leftover after parsing attributes in process `syz.1.38086'. [ 7501.793742][T27382] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 7501.816713][T27382] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 7502.030802][T27627] tmpfs: Bad value for 'huge' [ 7505.891944][T27382] hsr_slave_0: entered promiscuous mode [ 7505.910923][T27382] hsr_slave_1: entered promiscuous mode [ 7505.913783][T27382] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 7505.914062][T27382] Cannot create hsr debugfs directory [ 7505.996896][ T31] kauditd_printk_skb: 124 callbacks suppressed [ 7505.996971][ T31] audit: type=1400 audit(7505.920:123270): avc: denied { module_request } for pid=27382 comm="syz-executor" kmod="rtnl-link-virt_wifi" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7506.055591][ T31] audit: type=1400 audit(7505.980:123271): avc: denied { write } for pid=27682 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7506.079421][ T31] audit: type=1400 audit(7506.000:123272): avc: denied { write open } for pid=27682 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7506.080207][ T31] audit: type=1400 audit(7506.000:123273): avc: denied { getattr } for pid=27682 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7506.081729][ T31] audit: type=1400 audit(7506.000:123274): avc: denied { ioctl } for pid=27682 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7506.628271][ T31] audit: type=1400 audit(7506.550:123275): avc: denied { write } for pid=27725 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7506.629862][ T31] audit: type=1400 audit(7506.550:123276): avc: denied { open } for pid=27725 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7506.630608][ T31] audit: type=1400 audit(7506.550:123277): avc: denied { getattr } for pid=27725 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7506.641867][ T31] audit: type=1400 audit(7506.550:123278): avc: denied { ioctl } for pid=27725 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7506.669780][ T31] audit: type=1400 audit(7506.590:123279): avc: denied { search } for pid=27725 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7507.369499][T27382] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 7507.393742][T27382] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 7507.414856][T27382] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 7507.434855][T27382] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 7509.370365][T27097] usb 2-1: new high-speed USB device number 48 using dummy_hcd [ 7509.600009][T27097] usb 2-1: Using ep0 maxpacket: 8 [ 7509.682098][T27097] usb 2-1: config index 0 descriptor too short (expected 301, got 45) [ 7509.682711][T27097] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 7509.683176][T27097] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 7509.684576][T27097] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 7509.699705][T27097] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 7509.700507][T27097] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 7509.700912][T27097] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 7509.944280][T27097] usb 2-1: GET_CAPABILITIES returned 0 [ 7509.944721][T27097] usbtmc 2-1:16.0: can't read capabilities [ 7510.010623][T27382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 7510.156500][T27097] usb 2-1: USB disconnect, device number 48 [ 7510.464774][T27829] netlink: 4 bytes leftover after parsing attributes in process `syz.1.38097'. [ 7511.011474][ T31] kauditd_printk_skb: 109 callbacks suppressed [ 7511.011585][ T31] audit: type=1400 audit(7510.940:123389): avc: denied { read write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7511.012831][ T31] audit: type=1400 audit(7510.940:123390): avc: denied { open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7511.013834][ T31] audit: type=1400 audit(7510.940:123391): avc: denied { ioctl } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7511.147878][ T31] audit: type=1400 audit(7511.070:123392): avc: denied { write } for pid=27832 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7511.179342][ T31] audit: type=1400 audit(7511.100:123393): avc: denied { write open } for pid=27832 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7511.180073][ T31] audit: type=1400 audit(7511.100:123394): avc: denied { getattr } for pid=27832 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7511.182104][ T31] audit: type=1400 audit(7511.100:123395): avc: denied { ioctl } for pid=27832 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7511.205619][ T31] audit: type=1400 audit(7511.130:123396): avc: denied { search } for pid=27832 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7511.235926][ T31] audit: type=1400 audit(7511.160:123397): avc: denied { search } for pid=27832 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7511.236956][ T31] audit: type=1400 audit(7511.160:123398): avc: denied { search } for pid=27832 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7512.064455][T27843] netlink: 'syz.1.38098': attribute type 10 has an invalid length. [ 7512.064989][T27843] netlink: 40 bytes leftover after parsing attributes in process `syz.1.38098'. [ 7512.443206][T27382] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 7512.443581][T27382] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 7516.192249][ T31] kauditd_printk_skb: 169 callbacks suppressed [ 7516.192372][ T31] audit: type=1400 audit(7516.120:123568): avc: denied { write } for pid=27875 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7516.193997][ T31] audit: type=1400 audit(7516.120:123569): avc: denied { open } for pid=27875 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7516.194945][ T31] audit: type=1400 audit(7516.120:123570): avc: denied { getattr } for pid=27875 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7516.195915][ T31] audit: type=1400 audit(7516.120:123571): avc: denied { ioctl } for pid=27875 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7516.209315][ T31] audit: type=1400 audit(7516.120:123572): avc: denied { create } for pid=27877 comm="syz.1.38104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7516.227336][ T31] audit: type=1400 audit(7516.150:123573): avc: denied { search } for pid=27875 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7516.228420][ T31] audit: type=1400 audit(7516.150:123574): avc: denied { search } for pid=27875 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7516.239713][ T31] audit: type=1400 audit(7516.160:123575): avc: denied { setopt } for pid=27877 comm="syz.1.38104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7516.300045][ T31] audit: type=1400 audit(7516.210:123576): avc: denied { read write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7516.301679][ T31] audit: type=1400 audit(7516.210:123577): avc: denied { open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7518.399692][T27160] atkbd serio139: keyboard reset failed on [ 7519.596602][T27908] TCP: request_sock_subflow_v6: Possible SYN flooding on port [fe80::aa]:20002. Sending cookies. [ 7521.217025][ T31] kauditd_printk_skb: 203 callbacks suppressed [ 7521.217112][ T31] audit: type=1400 audit(7521.140:123782): avc: denied { read write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7521.218231][ T31] audit: type=1400 audit(7521.140:123783): avc: denied { open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7521.219992][ T31] audit: type=1400 audit(7521.140:123784): avc: denied { ioctl } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7521.221161][ T31] audit: type=1400 audit(7521.110:123781): avc: denied { search } for pid=27921 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7521.222036][ T31] audit: type=1400 audit(7521.150:123785): avc: denied { search } for pid=27921 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7521.318211][ T31] audit: type=1400 audit(7521.240:123786): avc: denied { read } for pid=2816 comm="syslogd" name="log" dev="vda" ino=671 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 7521.322642][ T31] audit: type=1400 audit(7521.240:123787): avc: denied { search } for pid=2816 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7521.350112][ T31] audit: type=1400 audit(7521.270:123788): avc: denied { append } for pid=2816 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7521.351024][ T31] audit: type=1400 audit(7521.270:123789): avc: denied { append open } for pid=2816 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7521.351612][ T31] audit: type=1400 audit(7521.270:123790): avc: denied { getattr } for pid=2816 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7521.965023][T27382] veth0_vlan: entered promiscuous mode [ 7522.044464][T27382] veth1_vlan: entered promiscuous mode [ 7522.234744][T27382] veth0_macvtap: entered promiscuous mode [ 7522.253143][T27382] veth1_macvtap: entered promiscuous mode [ 7522.604569][T27382] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 7522.605444][T27382] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 7522.605796][T27382] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 7522.606149][T27382] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 7524.407682][T27943] netlink: 87 bytes leftover after parsing attributes in process `syz.1.38114'. [ 7526.188032][T27966] cgroup: Need name or subsystem set [ 7526.252874][ T31] kauditd_printk_skb: 175 callbacks suppressed [ 7526.252981][ T31] audit: type=1400 audit(7526.180:123966): avc: denied { read write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7526.255822][ T31] audit: type=1400 audit(7526.180:123967): avc: denied { read write open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7526.257599][ T31] audit: type=1400 audit(7526.180:123968): avc: denied { ioctl } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7526.399848][ T31] audit: type=1400 audit(7526.320:123969): avc: denied { read } for pid=27967 comm="syz.1.38121" name="controlC0" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7526.400808][ T31] audit: type=1400 audit(7526.320:123970): avc: denied { open } for pid=27967 comm="syz.1.38121" path="/dev/snd/controlC0" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7526.401599][ T31] audit: type=1400 audit(7526.320:123971): avc: denied { write } for pid=27967 comm="syz.1.38121" name="vhost-net" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7526.419875][ T31] audit: type=1400 audit(7526.340:123972): avc: denied { ioctl } for pid=27967 comm="syz.1.38121" path="/dev/vhost-net" dev="devtmpfs" ino=723 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7526.539888][ T31] audit: type=1400 audit(7526.460:123973): avc: denied { read write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7526.540908][ T31] audit: type=1400 audit(7526.460:123974): avc: denied { open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7526.541799][ T31] audit: type=1400 audit(7526.460:123975): avc: denied { ioctl } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7531.708647][ T31] kauditd_printk_skb: 176 callbacks suppressed [ 7531.708781][ T31] audit: type=1400 audit(7531.630:124152): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7531.761335][ T31] audit: type=1400 audit(7531.690:124153): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7531.762634][ T31] audit: type=1400 audit(7531.690:124154): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7532.022488][ T31] audit: type=1400 audit(7531.950:124155): avc: denied { search } for pid=28003 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7532.023746][ T31] audit: type=1400 audit(7531.950:124156): avc: denied { getattr } for pid=28003 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7532.024673][ T31] audit: type=1400 audit(7531.950:124157): avc: denied { write } for pid=28003 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7532.025761][ T31] audit: type=1400 audit(7531.950:124158): avc: denied { remove_name } for pid=28003 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7532.026608][ T31] audit: type=1400 audit(7531.950:124159): avc: denied { unlink } for pid=28003 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7532.092832][ T31] audit: type=1400 audit(7532.020:124160): avc: denied { mounton } for pid=28004 comm="syz.0.38134" path="/proc/25/task" dev="proc" ino=329382 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 7532.096243][ T31] audit: type=1400 audit(7532.020:124161): avc: denied { mount } for pid=28004 comm="syz.0.38134" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 7535.630130][T25092] usb 2-1: new high-speed USB device number 49 using dummy_hcd [ 7535.809935][T25092] usb 2-1: Using ep0 maxpacket: 8 [ 7535.901618][T25092] usb 2-1: config 0 has an invalid interface number: 5 but max is 0 [ 7535.902007][T25092] usb 2-1: config 0 has no interface number 0 [ 7535.924309][T25092] usb 2-1: New USB device found, idVendor=1498, idProduct=a090, bcdDevice=f0.ff [ 7535.925510][T25092] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 7535.925990][T25092] usb 2-1: Product: syz [ 7535.926315][T25092] usb 2-1: Manufacturer: syz [ 7535.926618][T25092] usb 2-1: SerialNumber: syz [ 7535.971725][T25092] usb 2-1: config 0 descriptor?? [ 7537.061902][ T31] kauditd_printk_skb: 121 callbacks suppressed [ 7537.062056][ T31] audit: type=1400 audit(7536.990:124283): avc: denied { write } for pid=28032 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7537.063649][ T31] audit: type=1400 audit(7536.990:124284): avc: denied { open } for pid=28032 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7537.076266][ T31] audit: type=1400 audit(7537.000:124285): avc: denied { getattr } for pid=28032 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7537.077398][ T31] audit: type=1400 audit(7537.000:124286): avc: denied { ioctl } for pid=28032 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7537.160286][ T31] audit: type=1400 audit(7537.080:124287): avc: denied { search } for pid=28032 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7537.161268][ T31] audit: type=1400 audit(7537.080:124288): avc: denied { search } for pid=28032 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7537.319978][ T31] audit: type=1400 audit(7537.240:124289): avc: denied { search } for pid=28033 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7537.320994][ T31] audit: type=1400 audit(7537.240:124290): avc: denied { read } for pid=28033 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7537.323954][ T31] audit: type=1400 audit(7537.240:124291): avc: denied { open } for pid=28033 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7537.324790][ T31] audit: type=1400 audit(7537.240:124292): avc: denied { getattr } for pid=28033 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7546.815207][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 7546.815298][ T31] audit: type=1400 audit(7546.740:124343): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7546.822383][ T31] audit: type=1400 audit(7546.750:124344): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7546.830839][ T31] audit: type=1400 audit(7546.760:124345): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7547.159401][ T31] audit: type=1400 audit(7547.080:124346): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7547.161059][ T31] audit: type=1400 audit(7547.080:124347): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7547.161848][ T31] audit: type=1400 audit(7547.080:124348): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7547.400314][ T31] audit: type=1400 audit(7547.320:124349): avc: denied { create } for pid=28049 comm="syz.0.38144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7547.420105][ T31] audit: type=1400 audit(7547.340:124350): avc: denied { setopt } for pid=28049 comm="syz.0.38144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7547.440322][ T31] audit: type=1400 audit(7547.360:124351): avc: denied { write } for pid=28049 comm="syz.0.38144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7547.489517][ T31] audit: type=1400 audit(7547.410:124352): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7551.893472][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 7551.893608][ T31] audit: type=1400 audit(7551.820:124406): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7551.897079][ T31] audit: type=1400 audit(7551.820:124407): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7551.919913][ T31] audit: type=1400 audit(7551.840:124408): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7552.166495][ T31] audit: type=1400 audit(7552.090:124409): avc: denied { read } for pid=28078 comm="syz.0.38156" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:printer_device_t:s0" [ 7552.173530][ T31] audit: type=1400 audit(7552.100:124410): avc: denied { open } for pid=28078 comm="syz.0.38156" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:printer_device_t:s0" [ 7552.199831][ T31] audit: type=1400 audit(7552.110:124411): avc: denied { read } for pid=28078 comm="syz.0.38156" name="tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7552.200835][ T31] audit: type=1400 audit(7552.110:124412): avc: denied { open } for pid=28078 comm="syz.0.38156" path="/dev/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7552.221268][ T31] audit: type=1400 audit(7552.140:124413): avc: denied { ioctl } for pid=28078 comm="syz.0.38156" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7552.505886][ T31] audit: type=1400 audit(7552.430:124414): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7552.539755][ T31] audit: type=1400 audit(7552.460:124415): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7555.115235][T27139] usb 2-1: USB disconnect, device number 49 [ 7556.099655][T27097] usb 2-1: new high-speed USB device number 50 using dummy_hcd [ 7556.313936][T27097] usb 2-1: Using ep0 maxpacket: 8 [ 7556.420064][T27097] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 7556.420875][T27097] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 7556.421400][T27097] usb 2-1: New USB device found, idVendor=06a3, idProduct=0ccd, bcdDevice= 0.00 [ 7556.422017][T27097] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 7556.433972][T27097] usb 2-1: config 0 descriptor?? [ 7557.047607][T27097] saitek 0003:06A3:0CCD.0021: unknown main item tag 0x0 [ 7557.047967][T27097] saitek 0003:06A3:0CCD.0021: unknown main item tag 0x0 [ 7557.048265][T27097] saitek 0003:06A3:0CCD.0021: unknown main item tag 0x0 [ 7557.048549][T27097] saitek 0003:06A3:0CCD.0021: unbalanced collection at end of report description [ 7557.057110][T27097] saitek 0003:06A3:0CCD.0021: parse failed [ 7557.057530][T27097] saitek 0003:06A3:0CCD.0021: probe with driver saitek failed with error -22 [ 7557.243730][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 7557.243834][ T31] audit: type=1400 audit(7557.170:124461): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7557.245142][ T31] audit: type=1400 audit(7557.170:124462): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7557.246097][ T31] audit: type=1400 audit(7557.170:124463): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7557.274610][T26613] usb 2-1: USB disconnect, device number 50 [ 7557.307402][ T31] audit: type=1400 audit(7557.230:124464): avc: denied { read write } for pid=22853 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7557.308525][ T31] audit: type=1400 audit(7557.230:124465): avc: denied { open } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7557.330696][ T31] audit: type=1400 audit(7557.230:124466): avc: denied { ioctl } for pid=22853 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7557.459493][ T31] audit: type=1400 audit(7557.380:124467): avc: denied { create } for pid=28123 comm="syz.1.38163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7557.492976][ T31] audit: type=1400 audit(7557.400:124468): avc: denied { write } for pid=28123 comm="syz.1.38163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7557.493816][ T31] audit: type=1400 audit(7557.420:124469): avc: denied { create } for pid=28122 comm="syz.0.38162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7557.518105][ T31] audit: type=1400 audit(7557.420:124470): avc: denied { getopt } for pid=28122 comm="syz.0.38162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7560.732183][T28137] tap0: tun_chr_ioctl cmd 1074025675 [ 7560.733387][T28137] tap0: persist disabled [ 7562.392048][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 7562.392165][ T31] audit: type=1400 audit(7562.320:124515): avc: denied { prog_load } for pid=28151 comm="syz.1.38172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7562.398538][ T31] audit: type=1400 audit(7562.320:124516): avc: denied { prog_run } for pid=28151 comm="syz.1.38172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7562.520901][ T31] audit: type=1400 audit(7562.440:124517): avc: denied { create } for pid=28151 comm="syz.1.38172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7562.536903][ T31] audit: type=1400 audit(7562.460:124518): avc: denied { create } for pid=28151 comm="syz.1.38172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7563.354159][ T31] audit: type=1400 audit(7563.270:124519): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7563.355285][ T31] audit: type=1400 audit(7563.280:124520): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7563.356302][ T31] audit: type=1400 audit(7563.280:124521): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7563.730433][ T31] audit: type=1400 audit(7563.640:124522): avc: denied { execmem } for pid=28154 comm="syz.0.38173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 7566.511570][ T31] audit: type=1400 audit(7566.090:124523): avc: denied { prog_load } for pid=28154 comm="syz.0.38173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7566.520674][ T31] audit: type=1400 audit(7566.110:124524): avc: denied { bpf } for pid=28154 comm="syz.0.38173" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7567.953427][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 7567.953901][ T31] audit: type=1400 audit(7567.870:124533): avc: denied { module_request } for pid=28154 comm="syz.0.38173" kmod="net-pf-2-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7571.401223][ T31] audit: type=1400 audit(7571.310:124534): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7571.405009][ T31] audit: type=1400 audit(7571.310:124535): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7571.405707][ T31] audit: type=1400 audit(7571.310:124536): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7571.686294][ T31] audit: type=1400 audit(7571.610:124537): avc: denied { bpf } for pid=28161 comm="syz.0.38174" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7571.688362][ T31] audit: type=1400 audit(7571.610:124538): avc: denied { create } for pid=28161 comm="syz.0.38174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 7571.688928][ T31] audit: type=1400 audit(7571.610:124539): avc: denied { module_request } for pid=28161 comm="syz.0.38174" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7572.122753][ T31] audit: type=1400 audit(7572.050:124540): avc: denied { create } for pid=28161 comm="syz.0.38174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 7572.123864][ T31] audit: type=1400 audit(7572.050:124541): avc: denied { module_request } for pid=28161 comm="syz.0.38174" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7572.587460][ T31] audit: type=1400 audit(7572.510:124542): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7573.329646][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 7573.329810][ T31] audit: type=1400 audit(7573.250:124547): avc: denied { sys_module } for pid=28165 comm="syz.0.38175" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7573.330811][ T31] audit: type=1400 audit(7573.250:124548): avc: denied { module_request } for pid=28165 comm="syz.0.38175" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7573.921937][ T31] audit: type=1400 audit(7573.850:124549): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7573.923147][ T31] audit: type=1400 audit(7573.850:124550): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7573.924070][ T31] audit: type=1400 audit(7573.850:124551): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7574.181052][ T31] audit: type=1400 audit(7574.090:124552): avc: denied { prog_load } for pid=28169 comm="syz.0.38176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7574.182025][ T31] audit: type=1400 audit(7574.090:124553): avc: denied { bpf } for pid=28169 comm="syz.0.38176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7574.182583][ T31] audit: type=1400 audit(7574.100:124554): avc: denied { perfmon } for pid=28169 comm="syz.0.38176" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7574.236456][ T31] audit: type=1400 audit(7574.160:124555): avc: denied { prog_run } for pid=28169 comm="syz.0.38176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7574.271338][ T31] audit: type=1400 audit(7574.200:124556): avc: denied { map_create } for pid=28169 comm="syz.0.38176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7578.454202][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 7578.454447][ T31] audit: type=1400 audit(7578.380:124578): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7578.470822][ T31] audit: type=1400 audit(7578.390:124579): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7578.471766][ T31] audit: type=1400 audit(7578.390:124580): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7578.737007][ T31] audit: type=1400 audit(7578.660:124581): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7578.738263][ T31] audit: type=1400 audit(7578.660:124582): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7578.760182][ T31] audit: type=1400 audit(7578.660:124583): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7579.019494][ T31] audit: type=1400 audit(7578.940:124584): avc: denied { create } for pid=28180 comm="syz.0.38181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7579.020517][ T31] audit: type=1400 audit(7578.940:124585): avc: denied { ioctl } for pid=28180 comm="syz.0.38181" path="socket:[330635]" dev="sockfs" ino=330635 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7579.044665][ T31] audit: type=1400 audit(7578.970:124586): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7579.045811][ T31] audit: type=1400 audit(7578.970:124587): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7580.306358][T28190] netlink: 24 bytes leftover after parsing attributes in process `syz.0.38185'. [ 7583.728069][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 7583.728212][ T31] audit: type=1400 audit(7583.650:124647): avc: denied { prog_load } for pid=28205 comm="syz.0.38191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7583.730743][ T31] audit: type=1400 audit(7583.650:124648): avc: denied { bpf } for pid=28205 comm="syz.0.38191" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7583.731522][ T31] audit: type=1400 audit(7583.650:124649): avc: denied { perfmon } for pid=28205 comm="syz.0.38191" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7583.742394][ T31] audit: type=1400 audit(7583.670:124650): avc: denied { prog_run } for pid=28205 comm="syz.0.38191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7583.759405][ T31] audit: type=1400 audit(7583.680:124651): avc: denied { module_request } for pid=28205 comm="syz.0.38191" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7585.889554][ T31] audit: type=1400 audit(7585.810:124652): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7585.891782][ T31] audit: type=1400 audit(7585.820:124653): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7585.892324][ T31] audit: type=1400 audit(7585.820:124654): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7586.119293][ T31] audit: type=1400 audit(7586.040:124655): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7586.179808][ T31] audit: type=1400 audit(7586.070:124656): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7588.741500][ T31] kauditd_printk_skb: 34 callbacks suppressed [ 7588.741623][ T31] audit: type=1400 audit(7588.670:124691): avc: denied { module_request } for pid=28220 comm="syz.0.38195" kmod="crypto-cmac(aes)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7589.022407][ T31] audit: type=1400 audit(7588.950:124692): avc: denied { module_request } for pid=28220 comm="syz.0.38195" kmod="crypto-cmac(aes)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7589.574603][ T31] audit: type=1400 audit(7589.500:124693): avc: denied { module_request } for pid=28220 comm="syz.0.38195" kmod="crypto-hmac(sm3)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7589.862313][ T31] audit: type=1400 audit(7589.790:124694): avc: denied { module_request } for pid=28220 comm="syz.0.38195" kmod="crypto-hmac(sm3)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7590.578089][ T31] audit: type=1400 audit(7590.500:124695): avc: denied { module_request } for pid=28220 comm="syz.0.38195" kmod="crypto-cbc(des)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7590.749674][ T31] audit: type=1400 audit(7590.640:124696): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7590.750965][ T31] audit: type=1400 audit(7590.640:124697): avc: denied { read write open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7590.752023][ T31] audit: type=1400 audit(7590.640:124698): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7591.589911][ T31] audit: type=1400 audit(7591.480:124699): avc: denied { map_create } for pid=28270 comm="syz.0.38196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7591.591114][ T31] audit: type=1400 audit(7591.480:124700): avc: denied { bpf } for pid=28270 comm="syz.0.38196" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7593.919715][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 7593.919847][ T31] audit: type=1400 audit(7593.840:124716): avc: denied { mounton } for pid=28304 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 7593.921417][ T31] audit: type=1400 audit(7593.840:124717): avc: denied { mount } for pid=28304 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 7594.190634][ T31] audit: type=1400 audit(7594.070:124718): avc: denied { read } for pid=28304 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7594.191919][ T31] audit: type=1400 audit(7594.070:124719): avc: denied { read open } for pid=28304 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7594.289693][ T31] audit: type=1400 audit(7594.190:124720): avc: denied { mounton } for pid=28304 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 7595.269785][ T31] audit: type=1400 audit(7595.190:124721): avc: denied { module_request } for pid=28304 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7595.605418][ T31] audit: type=1400 audit(7595.530:124722): avc: denied { map_create } for pid=28305 comm="syz.0.38198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7595.606802][ T31] audit: type=1400 audit(7595.530:124723): avc: denied { map_read map_write } for pid=28305 comm="syz.0.38198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7595.786827][ T31] audit: type=1400 audit(7595.710:124724): avc: denied { create } for pid=28305 comm="syz.0.38198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7595.974362][ T31] audit: type=1400 audit(7595.890:124725): avc: denied { prog_load } for pid=28305 comm="syz.0.38198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7599.032992][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 7599.033123][ T31] audit: type=1400 audit(7598.960:124765): avc: denied { map_create } for pid=28319 comm="syz.0.38200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7599.039689][ T31] audit: type=1400 audit(7598.960:124766): avc: denied { perfmon } for pid=28319 comm="syz.0.38200" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7599.040548][ T31] audit: type=1400 audit(7598.960:124767): avc: denied { map_read map_write } for pid=28319 comm="syz.0.38200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7599.044989][ T31] audit: type=1400 audit(7598.970:124768): avc: denied { prog_load } for pid=28319 comm="syz.0.38200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7599.046307][ T31] audit: type=1400 audit(7598.970:124769): avc: denied { bpf } for pid=28319 comm="syz.0.38200" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7599.069796][ T31] audit: type=1400 audit(7598.970:124770): avc: denied { prog_run } for pid=28319 comm="syz.0.38200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7599.188058][ T31] audit: type=1400 audit(7599.110:124771): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7599.194588][ T31] audit: type=1400 audit(7599.110:124772): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7599.210445][ T31] audit: type=1400 audit(7599.110:124773): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7599.391807][ T31] audit: type=1400 audit(7599.310:124774): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7603.127277][T28304] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 7603.140523][T28304] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 7604.132465][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 7604.132588][ T31] audit: type=1400 audit(7604.060:124812): avc: denied { module_request } for pid=28304 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7604.394042][ T31] audit: type=1400 audit(7604.320:124813): avc: denied { prog_load } for pid=28400 comm="syz.0.38203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7604.395025][ T31] audit: type=1400 audit(7604.320:124814): avc: denied { bpf } for pid=28400 comm="syz.0.38203" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7604.395873][ T31] audit: type=1400 audit(7604.320:124815): avc: denied { perfmon } for pid=28400 comm="syz.0.38203" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7604.397461][ T31] audit: type=1400 audit(7604.320:124816): avc: denied { prog_run } for pid=28400 comm="syz.0.38203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7604.405356][ T31] audit: type=1400 audit(7604.330:124817): avc: denied { map_create } for pid=28400 comm="syz.0.38203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7604.406227][ T31] audit: type=1400 audit(7604.330:124818): avc: denied { map_read map_write } for pid=28400 comm="syz.0.38203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7604.417796][ T31] audit: type=1400 audit(7604.340:124819): avc: denied { sys_module } for pid=28304 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7604.418788][ T31] audit: type=1400 audit(7604.340:124820): avc: denied { module_request } for pid=28304 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7604.420432][ T31] audit: type=1400 audit(7604.340:124821): avc: denied { prog_load } for pid=28400 comm="syz.0.38203" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7605.266753][T28539] netlink: 32 bytes leftover after parsing attributes in process `syz.0.38205'. [ 7605.552624][T28304] hsr_slave_0: entered promiscuous mode [ 7605.556268][T28304] hsr_slave_1: entered promiscuous mode [ 7605.560764][T28304] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 7605.561343][T28304] Cannot create hsr debugfs directory [ 7606.241481][T28304] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7606.585850][T28304] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7606.730851][T28304] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7606.835713][T28304] netdevsim netdevsim1 ÿÿÿÿ (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7607.098822][T28304] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 7607.117114][T28304] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 7607.143353][T28304] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 7607.165185][T28304] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 7609.234741][ T31] kauditd_printk_skb: 130 callbacks suppressed [ 7609.234853][ T31] audit: type=1400 audit(7609.160:124952): avc: denied { search } for pid=28665 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7609.238410][ T31] audit: type=1400 audit(7609.160:124953): avc: denied { getattr } for pid=28665 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=708 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7609.283892][ T31] audit: type=1400 audit(7609.190:124954): avc: denied { search } for pid=28665 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7609.284866][ T31] audit: type=1400 audit(7609.190:124955): avc: denied { write } for pid=28665 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7609.285501][ T31] audit: type=1400 audit(7609.190:124956): avc: denied { remove_name } for pid=28665 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=708 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7609.286429][ T31] audit: type=1400 audit(7609.190:124957): avc: denied { unlink } for pid=28665 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=708 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 7609.360005][ T31] audit: type=1400 audit(7609.280:124958): avc: denied { sys_module } for pid=28304 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7609.399775][ T31] audit: type=1400 audit(7609.320:124959): avc: denied { module_request } for pid=28304 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7609.641765][ T31] audit: type=1400 audit(7609.570:124960): avc: denied { search } for pid=28667 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 7610.276467][T28304] 8021q: adding VLAN 0 to HW filter on device bond0 [ 7610.420819][ T31] audit: type=1400 audit(7610.350:124961): avc: denied { module_request } for pid=28304 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7613.100863][T28304] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 7613.101783][T28304] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 7613.714684][T20472] ip6gretap0 (unregistering): left promiscuous mode [ 7613.798170][T20472] bond0 (unregistering): Released all slaves [ 7613.912441][T20472] batadv_slave_0: left promiscuous mode [ 7613.942468][T20472] hsr_slave_0: left promiscuous mode [ 7613.950515][T20472] hsr_slave_1: left promiscuous mode [ 7613.963938][T20472] veth1_macvtap: left promiscuous mode [ 7613.964412][T20472] veth0_macvtap: left promiscuous mode [ 7613.964759][T20472] veth1_vlan: left promiscuous mode [ 7613.965197][T20472] veth0_vlan: left promiscuous mode [ 7614.438593][ T31] kauditd_printk_skb: 70 callbacks suppressed [ 7614.438683][ T31] audit: type=1400 audit(7614.360:125032): avc: denied { module_request } for pid=28304 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7614.578293][ T31] audit: type=1400 audit(7614.500:125033): avc: denied { sys_module } for pid=28304 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7614.579883][ T31] audit: type=1400 audit(7614.500:125034): avc: denied { module_request } for pid=28304 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7614.610273][ T31] audit: type=1400 audit(7614.530:125035): avc: denied { read } for pid=28707 comm="syz.0.38220" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7614.621624][ T31] audit: type=1400 audit(7614.540:125036): avc: denied { open } for pid=28707 comm="syz.0.38220" path="net:[4026532659]" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7614.622468][ T31] audit: type=1400 audit(7614.550:125037): avc: denied { create } for pid=28707 comm="syz.0.38220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 7614.625484][ T31] audit: type=1400 audit(7614.550:125038): avc: denied { connect } for pid=28707 comm="syz.0.38220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 7614.631284][ T31] audit: type=1400 audit(7614.550:125039): avc: denied { prog_load } for pid=28707 comm="syz.0.38220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7614.631992][ T31] audit: type=1400 audit(7614.550:125040): avc: denied { bpf } for pid=28707 comm="syz.0.38220" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7614.644222][ T31] audit: type=1400 audit(7614.570:125041): avc: denied { read } for pid=28707 comm="syz.0.38220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 7616.464258][T28304] veth0_vlan: entered promiscuous mode [ 7616.494539][T28304] veth1_vlan: entered promiscuous mode [ 7616.574237][T28304] veth0_macvtap: entered promiscuous mode [ 7616.585621][T28304] veth1_macvtap: entered promiscuous mode [ 7616.674207][T28304] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 7616.674847][T28304] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 7616.675189][T28304] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 7616.675706][T28304] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 7618.095595][T28761] nlmon0: entered promiscuous mode [ 7618.096101][T28761] vlan2: entered promiscuous mode [ 7618.121969][T28761] nlmon0: left promiscuous mode [ 7619.993416][ T31] kauditd_printk_skb: 112 callbacks suppressed [ 7619.993504][ T31] audit: type=1400 audit(7619.920:125154): avc: denied { read write } for pid=28304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7620.003021][ T31] audit: type=1400 audit(7619.920:125155): avc: denied { open } for pid=28304 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7620.059810][ T31] audit: type=1400 audit(7619.920:125156): avc: denied { ioctl } for pid=28304 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7620.481849][ T31] audit: type=1400 audit(7620.400:125157): avc: denied { create } for pid=28772 comm="syz.1.38233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7620.507429][ T31] audit: type=1400 audit(7620.430:125158): avc: denied { setopt } for pid=28772 comm="syz.1.38233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7620.519871][ T31] audit: type=1400 audit(7620.440:125159): avc: denied { bind } for pid=28772 comm="syz.1.38233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7620.520826][ T31] audit: type=1400 audit(7620.450:125160): avc: denied { node_bind } for pid=28772 comm="syz.1.38233" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 7620.521810][ T31] audit: type=1400 audit(7620.450:125161): avc: denied { name_bind } for pid=28772 comm="syz.1.38233" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 7620.576574][ T31] audit: type=1400 audit(7620.500:125162): avc: denied { read write } for pid=28304 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7620.595958][ T31] audit: type=1400 audit(7620.500:125163): avc: denied { open } for pid=28304 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7622.385874][T28794] syz.1.38243 (28794): /proc/28793/oom_adj is deprecated, please use /proc/28793/oom_score_adj instead. [ 7625.580355][ T31] kauditd_printk_skb: 84 callbacks suppressed [ 7625.581225][ T31] audit: type=1400 audit(7625.510:125248): avc: denied { create } for pid=28818 comm="syz.1.38253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7626.134722][ T31] audit: type=1400 audit(7626.060:125249): avc: denied { read } for pid=28818 comm="syz.1.38253" dev="nsfs" ino=4026532938 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7626.135657][ T31] audit: type=1400 audit(7626.060:125250): avc: denied { open } for pid=28818 comm="syz.1.38253" path="net:[4026532938]" dev="nsfs" ino=4026532938 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7626.136769][ T31] audit: type=1400 audit(7626.060:125251): avc: denied { create } for pid=28818 comm="syz.1.38253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 7626.149660][ T31] audit: type=1400 audit(7626.070:125252): avc: denied { connect } for pid=28818 comm="syz.1.38253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 7626.156561][ T31] audit: type=1400 audit(7626.080:125253): avc: denied { prog_load } for pid=28818 comm="syz.1.38253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7626.157771][ T31] audit: type=1400 audit(7626.080:125254): avc: denied { bpf } for pid=28818 comm="syz.1.38253" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7626.169757][ T31] audit: type=1400 audit(7626.080:125255): avc: denied { read } for pid=28818 comm="syz.1.38253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 7629.671584][ T31] audit: type=1326 audit(7629.600:125256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28821 comm="syz.1.38254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130520 code=0x7fc00000 [ 7629.672811][ T31] audit: type=1400 audit(7629.600:125257): avc: denied { create } for pid=28821 comm="syz.1.38254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7631.420070][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 7631.420173][ T31] audit: type=1326 audit(7631.340:125275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28821 comm="syz.1.38254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130520 code=0x7fc00000 [ 7638.426464][ T31] audit: type=1400 audit(7638.350:125276): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7638.428382][ T31] audit: type=1400 audit(7638.350:125277): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7638.489532][ T31] audit: type=1400 audit(7638.390:125278): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7638.584330][ T31] audit: type=1400 audit(7638.510:125279): avc: denied { read } for pid=28825 comm="syz.0.38255" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7638.585363][ T31] audit: type=1400 audit(7638.510:125280): avc: denied { open } for pid=28825 comm="syz.0.38255" path="/dev/ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7638.593989][ T31] audit: type=1400 audit(7638.520:125281): avc: denied { ioctl } for pid=28825 comm="syz.0.38255" path="/dev/ptmx" dev="devtmpfs" ino=605 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7638.595089][ T31] audit: type=1400 audit(7638.520:125282): avc: denied { sys_module } for pid=28825 comm="syz.0.38255" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7638.595646][ T31] audit: type=1400 audit(7638.520:125283): avc: denied { module_request } for pid=28825 comm="syz.0.38255" kmod="tty-ldisc-14" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7639.028087][ T31] audit: type=1400 audit(7638.950:125284): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7639.037622][ T31] audit: type=1400 audit(7638.960:125285): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7640.161513][T28835] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 7640.164780][T28835] IPv6: NLM_F_CREATE should be set when creating new route [ 7642.771754][T25089] nci: nci_extract_activation_params_nfc_dep: unsupported activation_rf_tech_and_mode 0x6 [ 7643.732781][ T31] kauditd_printk_skb: 82 callbacks suppressed [ 7643.737611][ T31] audit: type=1400 audit(7643.660:125368): avc: denied { create } for pid=28872 comm="syz.0.38266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7643.763166][ T31] audit: type=1400 audit(7643.690:125369): avc: denied { getopt } for pid=28872 comm="syz.0.38266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7649.459465][ T31] audit: type=1400 audit(7649.370:125370): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7649.460824][ T31] audit: type=1400 audit(7649.370:125371): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7649.461913][ T31] audit: type=1400 audit(7649.370:125372): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7649.603742][ T31] audit: type=1400 audit(7649.530:125373): avc: denied { create } for pid=28875 comm="syz.0.38267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7649.608572][ T31] audit: type=1400 audit(7649.530:125374): avc: denied { ioctl } for pid=28875 comm="syz.0.38267" path="socket:[332072]" dev="sockfs" ino=332072 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7649.619976][ T31] audit: type=1400 audit(7649.540:125375): avc: denied { getopt } for pid=28875 comm="syz.0.38267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7649.620742][ T31] audit: type=1400 audit(7649.550:125376): avc: denied { name_bind } for pid=28875 comm="syz.0.38267" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 7649.640117][ T31] audit: type=1400 audit(7649.560:125377): avc: denied { node_bind } for pid=28875 comm="syz.0.38267" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 7649.641305][ T31] audit: type=1400 audit(7649.560:125378): avc: denied { create } for pid=28875 comm="syz.0.38267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7651.280954][ T31] audit: type=1400 audit(7651.210:125379): avc: denied { write } for pid=28875 comm="syz.0.38267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7654.501814][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 7654.501929][ T31] audit: type=1400 audit(7654.430:125390): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7654.503794][ T31] audit: type=1400 audit(7654.430:125391): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7654.505564][ T31] audit: type=1400 audit(7654.430:125392): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7654.661377][ T31] audit: type=1400 audit(7654.590:125393): avc: denied { mounton } for pid=28886 comm="syz.0.38270" path="/115/file0" dev="tmpfs" ino=601 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 7654.665020][ T31] audit: type=1400 audit(7654.590:125394): avc: denied { mount } for pid=28886 comm="syz.0.38270" name="/" dev="ramfs" ino=331318 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 7654.756236][ T31] audit: type=1400 audit(7654.680:125395): avc: denied { unmount } for pid=27382 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 7654.819759][ T31] audit: type=1400 audit(7654.710:125396): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7654.820723][ T31] audit: type=1400 audit(7654.710:125397): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7654.821579][ T31] audit: type=1400 audit(7654.710:125398): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7654.949805][ T31] audit: type=1400 audit(7654.870:125399): avc: denied { create } for pid=28888 comm="syz.0.38271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 7659.578837][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 7659.579112][ T31] audit: type=1400 audit(7659.500:125457): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7659.825553][ T31] audit: type=1400 audit(7659.750:125458): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7659.943214][ T31] audit: type=1400 audit(7659.870:125459): avc: denied { sys_module } for pid=28904 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7659.944206][ T31] audit: type=1400 audit(7659.870:125460): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7660.070002][ T31] audit: type=1400 audit(7659.990:125461): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7660.179905][ T31] audit: type=1400 audit(7660.110:125462): avc: denied { sys_module } for pid=28904 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7660.180803][ T31] audit: type=1400 audit(7660.110:125463): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7660.327108][T28904] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 7660.335042][T28904] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 7660.384746][ T31] audit: type=1400 audit(7660.310:125464): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7660.480810][ T31] audit: type=1400 audit(7660.410:125465): avc: denied { sys_module } for pid=28904 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7660.482293][ T31] audit: type=1400 audit(7660.410:125466): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7661.977810][T28904] hsr_slave_0: entered promiscuous mode [ 7661.987413][T28904] hsr_slave_1: entered promiscuous mode [ 7662.817207][T28904] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7663.023705][T28904] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7663.097534][T28904] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7663.218901][T28904] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 7663.525605][T28904] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 7663.592346][T28904] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 7663.596425][T28904] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 7663.633460][T28904] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 7663.720419][T29230] netlink: 8 bytes leftover after parsing attributes in process `syz.0.38280'. [ 7664.715014][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 7664.715139][ T31] audit: type=1400 audit(7664.640:125509): avc: denied { sys_module } for pid=29232 comm="syz.0.38281" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7664.716314][ T31] audit: type=1400 audit(7664.640:125510): avc: denied { module_request } for pid=29232 comm="syz.0.38281" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7664.768224][ T31] audit: type=1400 audit(7664.690:125511): avc: denied { sys_module } for pid=28904 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7664.769872][ T31] audit: type=1400 audit(7664.690:125512): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7664.882731][ T31] audit: type=1400 audit(7664.810:125513): avc: denied { write } for pid=29232 comm="syz.0.38281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7665.079178][ T31] audit: type=1400 audit(7665.000:125514): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7665.313231][ T31] audit: type=1400 audit(7665.240:125515): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7665.314457][ T31] audit: type=1400 audit(7665.240:125516): avc: denied { read write open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7665.315280][ T31] audit: type=1400 audit(7665.240:125517): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7665.409633][ T31] audit: type=1400 audit(7665.330:125518): avc: denied { sys_module } for pid=28904 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7666.012652][T28904] 8021q: adding VLAN 0 to HW filter on device bond0 [ 7669.565552][T29264] syzkaller0: entered promiscuous mode [ 7669.565888][T29264] syzkaller0: entered allmulticast mode [ 7669.828588][ T31] kauditd_printk_skb: 64 callbacks suppressed [ 7669.828694][ T31] audit: type=1400 audit(7669.750:125583): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7669.833093][ T31] audit: type=1400 audit(7669.750:125584): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7669.851106][ T31] audit: type=1400 audit(7669.780:125585): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7669.981689][ T31] audit: type=1400 audit(7669.900:125586): avc: denied { read write } for pid=29271 comm="syz.0.38285" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7669.982901][ T31] audit: type=1400 audit(7669.900:125587): avc: denied { open } for pid=29271 comm="syz.0.38285" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7669.985735][ T31] audit: type=1400 audit(7669.910:125588): avc: denied { mounton } for pid=29271 comm="syz.0.38285" path="/129/file0" dev="tmpfs" ino=674 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 7670.001202][ T31] audit: type=1400 audit(7669.910:125589): avc: denied { sys_module } for pid=28904 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 7670.002440][ T31] audit: type=1400 audit(7669.920:125590): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7670.004587][ T31] audit: type=1400 audit(7669.930:125591): avc: denied { mount } for pid=29271 comm="syz.0.38285" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 7670.399680][ T31] audit: type=1400 audit(7670.320:125592): avc: denied { module_request } for pid=28904 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7674.573420][T28904] veth0_vlan: entered promiscuous mode [ 7674.681041][T28904] veth1_vlan: entered promiscuous mode [ 7675.012155][T28904] veth0_macvtap: entered promiscuous mode [ 7675.047784][T28904] veth1_macvtap: entered promiscuous mode [ 7675.060260][ T31] kauditd_printk_skb: 88 callbacks suppressed [ 7675.060322][ T31] audit: type=1400 audit(7674.970:125681): avc: denied { read write } for pid=29311 comm="syz.0.38289" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7675.061942][ T31] audit: type=1400 audit(7674.990:125682): avc: denied { open } for pid=29311 comm="syz.0.38289" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7675.094632][ T31] audit: type=1400 audit(7675.020:125683): avc: denied { prog_load } for pid=29311 comm="syz.0.38289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7675.095880][ T31] audit: type=1400 audit(7675.020:125684): avc: denied { bpf } for pid=29311 comm="syz.0.38289" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7675.096566][ T31] audit: type=1400 audit(7675.020:125685): avc: denied { perfmon } for pid=29311 comm="syz.0.38289" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7675.097366][ T31] audit: type=1400 audit(7675.020:125686): avc: denied { bpf } for pid=29311 comm="syz.0.38289" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7675.189561][ T31] audit: type=1400 audit(7675.100:125687): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7675.190724][ T31] audit: type=1400 audit(7675.100:125688): avc: denied { read write open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7675.191633][ T31] audit: type=1400 audit(7675.100:125689): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7675.254490][T28904] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 7675.255047][T28904] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 7675.255417][T28904] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 7675.255807][T28904] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 7675.396714][ T31] audit: type=1400 audit(7675.320:125690): avc: denied { map_create } for pid=29313 comm="syz.0.38290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7680.069895][ T31] kauditd_printk_skb: 95 callbacks suppressed [ 7680.069976][ T31] audit: type=1400 audit(7935.992:125786): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7680.071827][ T31] audit: type=1400 audit(7935.992:125787): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7680.260019][ T31] audit: type=1400 audit(7936.182:125788): avc: denied { create } for pid=29363 comm="syz.0.38306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7680.274335][ T31] audit: type=1400 audit(7936.192:125789): avc: denied { getopt } for pid=29363 comm="syz.0.38306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7680.309466][ T31] audit: type=1400 audit(7936.222:125790): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7680.310476][ T31] audit: type=1400 audit(7936.222:125791): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7680.311533][ T31] audit: type=1400 audit(7936.222:125792): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7680.528553][ T31] audit: type=1400 audit(7936.442:125793): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7680.530224][ T31] audit: type=1400 audit(7936.442:125794): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7680.639673][ T31] audit: type=1400 audit(7936.442:125795): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7685.193572][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 7685.193683][ T31] audit: type=1400 audit(7941.112:125856): avc: denied { prog_load } for pid=29405 comm="syz.0.38324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7685.194705][ T31] audit: type=1400 audit(7941.112:125857): avc: denied { bpf } for pid=29405 comm="syz.0.38324" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7685.195406][ T31] audit: type=1400 audit(7941.112:125858): avc: denied { perfmon } for pid=29405 comm="syz.0.38324" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7685.207065][ T31] audit: type=1400 audit(7941.122:125859): avc: denied { prog_run } for pid=29405 comm="syz.0.38324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7685.232916][ T31] audit: type=1400 audit(7941.152:125860): avc: denied { map_create } for pid=29405 comm="syz.0.38324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7685.233780][ T31] audit: type=1400 audit(7941.152:125861): avc: denied { map_read map_write } for pid=29405 comm="syz.0.38324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7685.324653][ T31] audit: type=1400 audit(7941.212:125862): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7685.325606][ T31] audit: type=1400 audit(7941.242:125863): avc: denied { open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7685.326384][ T31] audit: type=1400 audit(7941.242:125864): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7685.442537][ T31] audit: type=1400 audit(7941.362:125865): avc: denied { prog_load } for pid=29409 comm="syz.0.38327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7689.110299][T29444] netlink: 'syz.0.38341': attribute type 4 has an invalid length. [ 7690.526454][ T31] kauditd_printk_skb: 112 callbacks suppressed [ 7690.526609][ T31] audit: type=1400 audit(7946.442:125978): avc: denied { module_request } for pid=29449 comm="syz.0.38344" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7690.665515][ T31] audit: type=1400 audit(7946.582:125979): avc: denied { create } for pid=29449 comm="syz.0.38344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7690.692914][ T31] audit: type=1400 audit(7946.602:125980): avc: denied { create } for pid=29449 comm="syz.0.38344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7690.693871][ T31] audit: type=1400 audit(7946.602:125981): avc: denied { write } for pid=29449 comm="syz.0.38344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7690.694495][ T31] audit: type=1400 audit(7946.602:125982): avc: denied { prog_load } for pid=29449 comm="syz.0.38344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7690.695128][ T31] audit: type=1400 audit(7946.612:125983): avc: denied { bpf } for pid=29449 comm="syz.0.38344" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7690.695824][ T31] audit: type=1400 audit(7946.612:125984): avc: denied { perfmon } for pid=29449 comm="syz.0.38344" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7690.696543][ T31] audit: type=1400 audit(7946.612:125985): avc: denied { bpf } for pid=29449 comm="syz.0.38344" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7690.719701][ T31] audit: type=1400 audit(7946.622:125986): avc: denied { create } for pid=29449 comm="syz.0.38344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 7690.735911][ T31] audit: type=1400 audit(7946.652:125987): avc: denied { create } for pid=29449 comm="syz.0.38344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 7696.631281][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 7696.631410][ T31] audit: type=1400 audit(7952.552:126035): avc: denied { map_create } for pid=29475 comm="syz.0.38350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7696.640182][ T31] audit: type=1400 audit(7952.552:126036): avc: denied { bpf } for pid=29475 comm="syz.0.38350" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7696.641076][ T31] audit: type=1400 audit(7952.552:126037): avc: denied { map_read map_write } for pid=29475 comm="syz.0.38350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7696.644186][ T31] audit: type=1400 audit(7952.562:126038): avc: denied { prog_load } for pid=29475 comm="syz.0.38350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7696.730906][ T31] audit: type=1400 audit(7952.652:126039): avc: denied { create } for pid=29475 comm="syz.0.38350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7696.749713][ T31] audit: type=1400 audit(7952.662:126040): avc: denied { write } for pid=29475 comm="syz.0.38350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7696.750891][ T31] audit: type=1400 audit(7952.662:126041): avc: denied { read } for pid=29475 comm="syz.0.38350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 7696.756686][ T31] audit: type=1400 audit(7952.672:126042): avc: denied { perfmon } for pid=29475 comm="syz.0.38350" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7696.757610][ T31] audit: type=1400 audit(7952.672:126043): avc: denied { prog_run } for pid=29475 comm="syz.0.38350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7708.780255][ T31] audit: type=1400 audit(7964.692:126044): avc: denied { prog_load } for pid=29479 comm="syz.1.38351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7708.781573][ T31] audit: type=1400 audit(7964.692:126045): avc: denied { bpf } for pid=29479 comm="syz.1.38351" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7708.810664][ T31] audit: type=1400 audit(7964.692:126046): avc: denied { perfmon } for pid=29479 comm="syz.1.38351" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7708.813148][ T31] audit: type=1400 audit(7964.722:126047): avc: denied { prog_run } for pid=29479 comm="syz.1.38351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7708.853711][ T31] audit: type=1400 audit(7964.772:126048): avc: denied { write } for pid=29479 comm="syz.1.38351" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 7709.311858][ T31] audit: type=1400 audit(7965.232:126049): avc: denied { create } for pid=29481 comm="syz.1.38352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7709.345467][ T31] audit: type=1400 audit(7965.262:126050): avc: denied { getopt } for pid=29481 comm="syz.1.38352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 7709.989711][ T31] audit: type=1400 audit(7965.892:126051): avc: denied { create } for pid=29483 comm="syz.1.38353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7709.990317][ T31] audit: type=1400 audit(7965.892:126052): avc: denied { connect } for pid=29483 comm="syz.1.38353" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 7710.039772][ T31] audit: type=1400 audit(7965.952:126053): avc: denied { create } for pid=29483 comm="syz.1.38353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 7713.841288][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 7713.841403][ T31] audit: type=1400 audit(7969.722:126116): avc: denied { ioctl } for pid=29502 comm="syz.1.38362" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7713.971051][ T9018] usb 2-1: new high-speed USB device number 51 using dummy_hcd [ 7714.062508][ T31] audit: type=1400 audit(7969.982:126117): avc: denied { ioctl } for pid=29502 comm="syz.1.38362" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7714.199720][ T9018] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 7714.239625][ T9018] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 7714.242266][ T9018] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 7714.242970][ T9018] usb 2-1: Product: syz [ 7714.243191][ T9018] usb 2-1: Manufacturer: syz [ 7714.243683][ T9018] usb 2-1: SerialNumber: syz [ 7714.280201][ T31] audit: type=1400 audit(7970.182:126118): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7714.290373][ T31] audit: type=1400 audit(7970.202:126119): avc: denied { ioctl } for pid=29502 comm="syz.1.38362" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7714.294224][ T31] audit: type=1400 audit(7970.212:126120): avc: denied { read write open } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7714.296647][ T31] audit: type=1400 audit(7970.212:126121): avc: denied { ioctl } for pid=27382 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=897 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7714.511738][ T31] audit: type=1400 audit(7970.402:126122): avc: denied { read } for pid=29511 comm="syz.0.38364" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7714.513673][ T31] audit: type=1400 audit(7970.402:126123): avc: denied { open } for pid=29511 comm="syz.0.38364" path="/dev/ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7714.514629][ T31] audit: type=1400 audit(7970.432:126124): avc: denied { ioctl } for pid=29502 comm="syz.1.38362" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7714.659775][ T31] audit: type=1400 audit(7970.572:126125): avc: denied { read write } for pid=27382 comm="syz-executor" name="loop0" dev="devtmpfs" ino=897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 7715.575382][ T9018] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 7715.576129][ T9018] cdc_ncm 2-1:1.0: setting rx_max = 16384 [ 7715.792467][ T9018] cdc_ncm 2-1:1.0: setting tx_max = 16384 [ 7715.815136][ T9018] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 7715.863840][ T9018] usb 2-1: USB disconnect, device number 51 [ 7715.866468][ T9018] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 7715.995020][T29528] netlink: 48 bytes leftover after parsing attributes in process `syz.0.38367'. [ 7716.062378][ T9018] ------------[ cut here ]------------ [ 7716.063159][ T9018] WARNING: CPU: 0 PID: 9018 at lib/debugobjects.c:514 debug_print_object+0xc4/0xd8 [ 7716.063835][ T9018] ODEBUG: free active (active state 0) object: 84767fac object type: work_struct hint: usbnet_deferred_kevent+0x0/0x388 [ 7716.064278][ T9018] Modules linked in: [ 7716.065035][ T9018] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 7716.065786][ T9018] CPU: 0 PID: 9018 Comm: kworker/0:1 Not tainted 6.10.0-syzkaller #0 [ 7716.066161][ T9018] Hardware name: ARM-Versatile Express [ 7716.066711][ T9018] Workqueue: usb_hub_wq hub_event [ 7716.067640][ T9018] Call trace: [ 7716.067992][ T9018] [<818d6238>] (dump_backtrace) from [<818d6334>] (show_stack+0x18/0x1c) [ 7716.068781][ T9018] r7:00000000 r6:82622d44 r5:00000000 r4:81fe205c [ 7716.069496][ T9018] [<818d631c>] (show_stack) from [<818f399c>] (dump_stack_lvl+0x54/0x7c) [ 7716.070027][ T9018] [<818f3948>] (dump_stack_lvl) from [<818f39dc>] (dump_stack+0x18/0x1c) [ 7716.070482][ T9018] r5:00000000 r4:8285fd18 [ 7716.070711][ T9018] [<818f39c4>] (dump_stack) from [<818d6ddc>] (panic+0x120/0x358) [ 7716.071222][ T9018] [<818d6cbc>] (panic) from [<80243dcc>] (print_tainted+0x0/0xa0) [ 7716.071618][ T9018] r3:8260c5c4 r2:00000001 r1:81fcaccc r0:81fd2924 [ 7716.071915][ T9018] r7:80828664 [ 7716.072110][ T9018] [<80243d58>] (check_panic_on_warn) from [<80243fc0>] (__warn+0x7c/0x180) [ 7716.072585][ T9018] [<80243f44>] (__warn) from [<802442ac>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 7716.073067][ T9018] r8:00000009 r7:82031308 r6:ec65da7c r5:8473e000 r4:00000000 [ 7716.073392][ T9018] [<802440c8>] (warn_slowpath_fmt) from [<80828664>] (debug_print_object+0xc4/0xd8) [ 7716.073839][ T9018] r10:00000005 r9:84767800 r8:81a02b44 r7:8205a408 r6:828c3454 r5:ec65db24 [ 7716.074212][ T9018] r4:8260cda8 [ 7716.074393][ T9018] [<808285a0>] (debug_print_object) from [<80829f04>] (debug_check_no_obj_freed+0x254/0x2a0) [ 7716.074825][ T9018] r8:84768000 r7:84767fac r6:00000100 r5:00000003 r4:00000000 [ 7716.075128][ T9018] [<80829cb0>] (debug_check_no_obj_freed) from [<804bb428>] (kfree+0x1a0/0x340) [ 7716.075555][ T9018] r10:82778808 r9:8522d880 r8:84767800 r7:80461560 r6:82c023c0 r5:dde99980 [ 7716.075897][ T9018] r4:84767800 [ 7716.076075][ T9018] [<804bb288>] (kfree) from [<80461560>] (kvfree+0x2c/0x30) [ 7716.076446][ T9018] r10:82778808 r9:8522d880 r8:84767800 r7:00000000 r6:856b3100 r5:85120880 [ 7716.076760][ T9018] r4:84767800 [ 7716.077008][ T9018] [<80461534>] (kvfree) from [<8140bd68>] (netdev_freemem+0x1c/0x20) [ 7716.077369][ T9018] r5:85120880 r4:84767800 [ 7716.077579][ T9018] [<8140bd4c>] (netdev_freemem) from [<81447748>] (netdev_release+0x2c/0x34) [ 7716.078026][ T9018] [<8144771c>] (netdev_release) from [<80a61544>] (device_release+0x38/0xa8) [ 7716.078453][ T9018] r5:85120880 r4:84767bb8 [ 7716.078694][ T9018] [<80a6150c>] (device_release) from [<818b00b4>] (kobject_put+0xc8/0x1f8) [ 7716.080184][ T9018] r5:81b49adc r4:84767bb8 [ 7716.080490][ T9018] [<818affec>] (kobject_put) from [<80a61770>] (put_device+0x18/0x1c) [ 7716.081090][ T9018] r7:8522fc00 r6:8476790c r5:84767800 r4:00000000 [ 7716.081585][ T9018] [<80a61758>] (put_device) from [<813fcefc>] (free_netdev+0x10c/0x18c) [ 7716.082243][ T9018] [<813fcdf0>] (free_netdev) from [<80d35940>] (usbnet_disconnect+0xac/0xf0) [ 7716.083276][ T9018] r6:84767f74 r5:84767e60 r4:00000000 [ 7716.083583][ T9018] [<80d35894>] (usbnet_disconnect) from [<80d94a20>] (usb_unbind_interface+0x84/0x2c4) [ 7716.084213][ T9018] r8:00000044 r7:8522fc30 r6:82778808 r5:00000000 r4:8522fc00 [ 7716.085045][ T9018] [<80d9499c>] (usb_unbind_interface) from [<80a6964c>] (device_remove+0x64/0x6c) [ 7716.085482][ T9018] r10:00000000 r9:8522d880 r8:00000044 r7:8522fc74 r6:82778808 r5:00000000 [ 7716.085762][ T9018] r4:8522fc30 [ 7716.085920][ T9018] [<80a695e8>] (device_remove) from [<80a6ab64>] (device_release_driver_internal+0x18c/0x200) [ 7716.086367][ T9018] r5:00000000 r4:8522fc30 [ 7716.086575][ T9018] [<80a6a9d8>] (device_release_driver_internal) from [<80a6abf0>] (device_release_driver+0x18/0x1c) [ 7716.087250][ T9018] r9:8522d880 r8:82ed1f40 r7:82ed1f38 r6:82ed1f0c r5:8522fc30 r4:82ed1f30 [ 7716.087591][ T9018] [<80a6abd8>] (device_release_driver) from [<80a68cd4>] (bus_remove_device+0xcc/0x120) [ 7716.087971][ T9018] [<80a68c08>] (bus_remove_device) from [<80a62dec>] (device_del+0x148/0x38c) [ 7716.088324][ T9018] r9:8522d880 r8:8473e000 r7:04208060 r6:00000000 r5:8522fc30 r4:8522fc74 [ 7716.088652][ T9018] [<80a62ca4>] (device_del) from [<80d92478>] (usb_disable_device+0xdc/0x1f0) [ 7716.089604][ T9018] r10:00000000 r9:00000000 r8:8522fc00 r7:8522d800 r6:852977c8 r5:00000001 [ 7716.090151][ T9018] r4:00000038 [ 7716.090330][ T9018] [<80d9239c>] (usb_disable_device) from [<80d872d8>] (usb_disconnect+0xec/0x29c) [ 7716.090786][ T9018] r10:00000001 r9:84a8f000 r8:8522d8c4 r7:8357a000 r6:8522d880 r5:8522d800 [ 7716.091202][ T9018] r4:60000013 [ 7716.091396][ T9018] [<80d871ec>] (usb_disconnect) from [<80d89f88>] (hub_event+0xe78/0x194c) [ 7716.091763][ T9018] r10:00000001 r9:00000100 r8:83d4b500 r7:8522d800 r6:83579800 r5:8357a210 [ 7716.092074][ T9018] r4:00000001 [ 7716.092247][ T9018] [<80d89110>] (hub_event) from [<80267258>] (process_one_work+0x1b4/0x4f4) [ 7716.092660][ T9018] r10:82fd0205 r9:8473e000 r8:00800000 r7:dddd00c0 r6:82fd0200 r5:83d4b500 [ 7716.093051][ T9018] r4:8449fa00 [ 7716.093266][ T9018] [<802670a4>] (process_one_work) from [<80267e80>] (worker_thread+0x1ec/0x404) [ 7716.093646][ T9018] r10:8473e000 r9:8449fa2c r8:61c88647 r7:dddd00e0 r6:82604d40 r5:dddd00c0 [ 7716.094058][ T9018] r4:8449fa00 [ 7716.094234][ T9018] [<80267c94>] (worker_thread) from [<802712c0>] (kthread+0x104/0x134) [ 7716.094686][ T9018] r10:00000000 r9:df839e78 r8:84ad5580 r7:8449fa00 r6:80267c94 r5:8473e000 [ 7716.095043][ T9018] r4:84ad5400 [ 7716.095219][ T9018] [<802711bc>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 7716.095879][ T9018] Exception stack(0xec65dfb0 to 0xec65dff8) [ 7716.096142][ T9018] dfa0: 00000000 00000000 00000000 00000000 [ 7716.096479][ T9018] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 7716.096797][ T9018] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 7716.097108][ T9018] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802711bc r4:84ad5400 [ 7716.099005][ T9018] Rebooting in 86400 seconds.. VM DIAGNOSIS: 14:24:09 Registers: info registers vcpu 0 CPU#0 R00=000025b3 R01=800025b3 R02=000025b3 R03=80000093 R04=ec65d868 R05=00000046 R06=dddc5595 R07=00000000 R08=00000000 R09=00000000 R10=82629f78 R11=ec65d810 R12=00000000 R13=ec65d7fc R14=0000000c R15=802c0fb0 PSR=60000093 -ZC- A S svc32 s00=40000000 s01=404fe937 d00=404fe93740000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=7fefffff d06=7fefffffffffffff s14=40000000 s15=404fe937 d07=404fe93740000000 s16=00000003 s17=004b8d4f d08=004b8d4f00000003 s18=004b8d3e s19=00000000 d09=00000000004b8d3e s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 80000010 info registers vcpu 1 CPU#1 R00=827b0a70 R01=82175324 R02=5b92f000 R03=818f572c R04=828a3480 R05=001789ce R06=001789ce R07=49d59e00 R08=dfc39eb8 R09=00000000 R10=84a24800 R11=df805e24 R12=df805e28 R13=df805e18 R14=811ae764 R15=818f573c PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000003 s17=7ef08af0 d08=7ef08af000000003 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000