last executing test programs: 2m8.739790057s ago: executing program 1 (id=10718): socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000002240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = dup(r1) r3 = open(&(0x7f0000000040)='./file1\x00', 0x1870c2, 0x14c) ftruncate(r3, 0x200004) sendfile(r2, r3, 0x0, 0x80001d00c0d1) 2m6.078575791s ago: executing program 1 (id=10719): unshare(0x24020400) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x23, 0x0, &(0x7f00000001c0)) 2m5.91987446s ago: executing program 1 (id=10720): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x0, 0x0) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x9fe, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) 1m56.266160643s ago: executing program 1 (id=10729): syz_open_dev$usbmon(&(0x7f0000001980), 0x1, 0x10280) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f00000000c0)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, r1, 0xc2354000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x7, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r5, 0xfffffffd, 0x0, 0x30, 0x0, @in6={0x1b, 0x0, 0x40000007, @loopback={0x700}}, @ib={0x1b, 0x0, 0x0, {"7d0300"}, 0x0, 0x0, 0x2}}}, 0x118) write$RDMA_USER_CM_CMD_LISTEN(r4, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {r5, 0x9}}, 0x10) close(r4) setuid(0xee01) syz_io_uring_setup(0x109, 0x0, 0x0, &(0x7f0000000080)) chdir(0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x33, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) 1m52.097697589s ago: executing program 1 (id=10730): gettid() sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x14}}, 0x10) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x8) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) 1m51.319362692s ago: executing program 1 (id=10731): io_setup(0x23, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x75, 0x10b701) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0x1) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) open(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) close(r0) 1m5.26319971s ago: executing program 32 (id=10731): io_setup(0x23, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x75, 0x10b701) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0x1) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) open(0x0, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) signalfd(0xffffffffffffffff, &(0x7f0000000180), 0x8) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) close(r0) 45.033670687s ago: executing program 0 (id=10756): syz_usb_connect$cdc_ncm(0x0, 0x72, &(0x7f0000000080)=ANY=[@ANYBLOB="1201000002000040257d15a4400001040001090260004201000000090400000102090000052406000105240000000d240f01000004eaffffff1e0006031a00000804800200090581", @ANYBLOB="f7", @ANYRESOCT], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$DMA_HEAP_IOCTL_ALLOC(0xffffffffffffffff, 0xc0184800, &(0x7f0000000100)={0x4}) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) 43.770942186s ago: executing program 0 (id=10757): r0 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi1\x00', 0x2180, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000300)={'adq12b\x00', [0x2f00, 0x5, 0xd09a, 0xfff7ffff, 0x3, 0xfffffffe, 0x20000004, 0x6, 0xffe, 0x9, 0xc, 0x1001, 0x9, 0x4, 0xffff, 0x6, 0x5, 0x40000009, 0x830, 0x30000, 0x10003, 0x2, 0x800, 0xe2df, 0x2, 0xd, 0x7, 0x3, 0x4, 0x5, 0x70f]}) ioctl$COMEDI_INSN(r0, 0x8028640c, &(0x7f0000000000)={0x4000000, 0x92, 0x0, 0x0, 0x4}) 43.366860758s ago: executing program 0 (id=10758): r0 = openat$comedi(0xffffffffffffff9c, 0x0, 0x181001, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) mincore(&(0x7f0000184000/0x2000)=nil, 0x2000, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r5 = accept4(r4, 0x0, 0x0, 0x800) sendmmsg$alg(r5, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be", 0x9}, {&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba1282", 0x12}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da988456d30026b433186f53cdcdb9", 0x41}], 0x3}], 0x1, 0x40800) recvmsg(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x51}], 0x1}, 0x0) mount(0x0, 0x0, 0x0, 0x8c, &(0x7f0000000300)='trans=rdma,') ioctl$COMEDI_INSN(r0, 0x8028640c, &(0x7f0000000080)={0xc000003, 0xf, &(0x7f0000000580)=[0x7d6, 0x8004, 0x1, 0xffff, 0x9, 0x1ed, 0x2, 0x2, 0xbb, 0xc58f, 0x2060, 0xfec, 0xfffffffa, 0x1ac, 0xfffffff8], 0x0, 0x4}) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, 0x0) prlimit64(0x0, 0x4, &(0x7f0000000540)={0x80000001, 0x101}, &(0x7f0000000600)) 25.847859858s ago: executing program 0 (id=10759): bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback, 0x7}, 0x1c) openat$vnet(0xffffffffffffff9c, &(0x7f0000000780), 0x2, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec85000000750000000400000007"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="b700000081000000bfa30000000000000703000000feffff720a00fef8ffffff71a400fe0000000071101000000000001d300200000000004704000001ed030407030000020000001d440000000000006b0a20fe0000000072030000000a0000e500f9ff000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fe51bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616276fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a26048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00e10000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d490cba8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e16e1461173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdec86f9b1eb93d491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b583cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f806694d461b76a58d88cf0f520310a1e80dc18cde9ad662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a090f3b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c00000000000000f59dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ed1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67cf0216e2d81e6127bd9d7fab28800eaab2355992f8ce4cd38add4b272c0bee4076ca4847ffa691cf78fb7ec212bad3bef29f577ea7159b7f3025b3d977ff7c91024cf71126233cb8791c3c"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) 10.930686927s ago: executing program 0 (id=10763): socket$igmp6(0xa, 0x3, 0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000001fee)='R\x10suse\x00\x00\x00\x00\x00\x00\x00dn\x00\x00\x00', 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000280), 0x3, 0x389001) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r3, 0x400455c8, 0x4) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000180)) ioctl$USBDEVFS_CONTROL(r4, 0xc0105500, &(0x7f0000000500)={0x40, 0xf, 0x5, 0x1ff, 0x0, 0x5, 0x0}) openat$fb0(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 8.737007816s ago: executing program 2 (id=10764): syz_usb_connect(0x0, 0x24, &(0x7f0000000280)={{0x12, 0x1, 0x141, 0xf2, 0xc5, 0x96, 0x20, 0x16d0, 0x10b8, 0xde8e, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x0, 0x2, 0x0, 0x0, 0x83, 0xec}}]}}]}}, 0x0) syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x0) r0 = syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0x79a8, 0x8, 0x1, 0x5000032f}, &(0x7f00000006c0)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r0, 0x847ba, 0x0, 0xe, 0x0, 0x0) ioctl$SNDCTL_SEQ_PANIC(0xffffffffffffffff, 0x5100) 8.389151775s ago: executing program 2 (id=10765): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x4000000000000200, 0x4) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000280)=ANY=[@ANYRES32], 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'erspan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x4, 0x6, @remote}, 0x14) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r2, 0x0) sendto$inet6(r0, &(0x7f0000000280)="050350038f0b48030102", 0xa, 0x800, 0x0, 0x0) 8.090550332s ago: executing program 2 (id=10766): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3}, 0x18) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, 0x0, 0x40840) syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e27, 0xffffffff, @mcast2, 0x7}, 0x1c) mount(&(0x7f0000000080)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000000)='./cgroup\x00', &(0x7f0000000180)='efs\x00', 0x200000, 0x0) 541.139551ms ago: executing program 0 (id=10767): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000002800), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x1, 0x0, 0x0, &(0x7f00000003c0)=""/80, 0x0, 0xeeef0000}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000140)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000001740)=""/192, 0x0}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)=0x1) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x1}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r1, &(0x7f0000001500)={0x28, 0x0, 0x0, @my=0x1}, 0x10) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003100)=""/4102, 0xeeef0000}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0x1) 340.988262ms ago: executing program 2 (id=10768): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)={{0x54}, [@NFT_MSG_DELFLOWTABLE={0x2c, 0x18, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x5}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) 197.89274ms ago: executing program 2 (id=10769): syz_usb_connect(0x0, 0x24, &(0x7f0000000280)={{0x12, 0x1, 0x141, 0xf2, 0xc5, 0x96, 0x20, 0x16d0, 0x10b8, 0xde8e, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x0, 0x2, 0x0, 0x0, 0x83, 0xec}}]}}]}}, 0x0) syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x0) syz_io_uring_setup(0xbdc, &(0x7f0000000640)={0x0, 0x79a8, 0x8, 0x1, 0x5000032f}, &(0x7f00000006c0)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r0, r1, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, 0x0, 0x1}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) ioctl$SNDCTL_SEQ_PANIC(r2, 0x5100) 0s ago: executing program 2 (id=10770): r0 = userfaultfd(0x80001) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x5412, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x19) r1 = socket$xdp(0x2c, 0x3, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, r2) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b07080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf5af51d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa16509945ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a0000000000000000000000000000cf7b6c4ba9bec153d6834bfef080df374703a8ff56a63ec1fe5f2e05a79e3cace7283dd68d41e94420c325fe4dae144fde5ec25a87d625cab20753a77b323fa3783c8b675859b9012647885a242adfee2fe812ecbe5191e0a15142f7349e7627cc39d724e2e34e7a24154f26ae3125b36d0504965295d0453902ac7079b11a3a1e655e482331e3dc35b2e7e4e3ea99064fe5b9c8ae0ca3e5fd653f3286a99d81ce4eba765c38d097391ad4babac38ce5b4344e24a361cd54e5"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r3}, 0x58) openat$ptmx(0xffffffffffffff9c, 0x0, 0x800, 0x0) syz_open_dev$ndb(&(0x7f00000001c0), 0x0, 0x3a1a80) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1) capset(&(0x7f0000000080)={0x20071026}, 0x0) timer_settime(0x0, 0x1, 0x0, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/59, 0x304000, 0x800, 0x0, 0x3}, 0x20) ioctl$UFFDIO_COPY(r0, 0xc028aa05, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000/0x3000)=nil, 0x3000}) kernel console output (not intermixed with test programs): pfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6702.613597][T16897] syzkaller0: entered promiscuous mode [ 6702.614945][T16897] syzkaller0: entered allmulticast mode [ 6703.272726][T26406] usb 1-1: new high-speed USB device number 71 using dummy_hcd [ 6703.452756][T26406] usb 1-1: Using ep0 maxpacket: 32 [ 6703.513606][T26406] usb 1-1: config 0 has an invalid interface number: 125 but max is 0 [ 6703.514232][T26406] usb 1-1: config 0 has no interface number 0 [ 6703.514778][T26406] usb 1-1: config 0 interface 125 has no altsetting 0 [ 6703.583212][T26406] usb 1-1: New USB device found, idVendor=1039, idProduct=2120, bcdDevice= 2.a7 [ 6703.583884][T26406] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6703.584415][T26406] usb 1-1: Product: syz [ 6703.584791][T26406] usb 1-1: Manufacturer: syz [ 6703.585216][T26406] usb 1-1: SerialNumber: syz [ 6703.608520][T26406] usb 1-1: config 0 descriptor?? [ 6703.876468][T26406] usb 1-1: USB disconnect, device number 71 [ 6703.906567][ T31] kauditd_printk_skb: 350 callbacks suppressed [ 6703.906853][ T31] audit: type=1400 audit(6703.810:52480): avc: denied { write open } for pid=16912 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6703.924439][ T31] audit: type=1400 audit(6703.830:52481): avc: denied { search } for pid=16912 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6703.924756][ T31] audit: type=1400 audit(6703.830:52482): avc: denied { search } for pid=16912 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6703.924846][ T31] audit: type=1400 audit(6703.830:52483): avc: denied { search } for pid=16912 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6703.924902][ T31] audit: type=1400 audit(6703.830:52484): avc: denied { search } for pid=16912 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6704.014319][ T31] audit: type=1400 audit(6703.920:52485): avc: denied { sys_module } for pid=16503 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6704.017238][ T31] audit: type=1400 audit(6703.920:52486): avc: denied { module_request } for pid=16503 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6704.021172][ T31] audit: type=1400 audit(6703.920:52487): avc: denied { search } for pid=16923 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6704.024053][ T31] audit: type=1400 audit(6703.920:52488): avc: denied { search } for pid=16923 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6704.024709][ T31] audit: type=1400 audit(6703.930:52489): avc: denied { search } for pid=16923 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6704.342299][T26406] usb 1-1: new high-speed USB device number 72 using dummy_hcd [ 6704.512240][T26406] usb 1-1: Using ep0 maxpacket: 8 [ 6704.533823][T26406] usb 1-1: unable to get BOS descriptor or descriptor too short [ 6704.536838][T26406] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 6704.537380][T26406] usb 1-1: can't read configurations, error -71 [ 6709.132777][ T31] kauditd_printk_skb: 416 callbacks suppressed [ 6709.133083][ T31] audit: type=1400 audit(6709.030:52906): avc: denied { sys_module } for pid=16503 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6709.142287][ T31] audit: type=1400 audit(6709.040:52907): avc: denied { module_request } for pid=16503 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6709.429999][ T31] audit: type=1400 audit(6709.330:52908): avc: denied { search } for pid=16960 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.441170][ T31] audit: type=1400 audit(6709.340:52909): avc: denied { search } for pid=16960 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.444793][ T31] audit: type=1400 audit(6709.340:52910): avc: denied { search } for pid=16960 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.556429][ T31] audit: type=1400 audit(6709.460:52911): avc: denied { search } for pid=16949 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6709.782522][ T31] audit: type=1400 audit(6709.680:52912): avc: denied { module_request } for pid=16503 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6710.075189][ T31] audit: type=1400 audit(6709.980:52913): avc: denied { write } for pid=16962 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6710.081386][ T31] audit: type=1400 audit(6709.980:52914): avc: denied { write open } for pid=16962 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6710.112887][ T31] audit: type=1400 audit(6710.020:52915): avc: denied { search } for pid=16962 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6710.964127][T16503] veth0_vlan: entered promiscuous mode [ 6711.123248][T16503] veth1_vlan: entered promiscuous mode [ 6711.398199][T16503] veth0_macvtap: entered promiscuous mode [ 6711.424586][T16503] veth1_macvtap: entered promiscuous mode [ 6711.584241][T16437] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6711.584739][T16437] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6711.584855][T16437] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6711.584942][T16437] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6712.474162][ C0] Illegal XDP return value 16128 on prog (id 47) dev veth1, expect packet loss! [ 6712.479599][T16970] A link change request failed with some changes committed already. Interface bond_slave_0 may have been left with an inconsistent configuration, please check. [ 6714.175865][ T31] kauditd_printk_skb: 369 callbacks suppressed [ 6714.176188][ T31] audit: type=1400 audit(6714.080:53285): avc: denied { search } for pid=16973 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6714.181227][ T31] audit: type=1400 audit(6714.080:53286): avc: denied { read write } for pid=16981 comm="syz.1.10647" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6714.182736][ T31] audit: type=1400 audit(6714.090:53287): avc: denied { search } for pid=16973 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6714.183074][ T31] audit: type=1400 audit(6714.090:53288): avc: denied { search } for pid=16973 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6714.186112][ T31] audit: type=1400 audit(6714.090:53289): avc: denied { append } for pid=16973 comm="dhcpcd-run-hook" name="resolv.conf.eth1.dhcp" dev="tmpfs" ino=220 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6714.194142][ T31] audit: type=1400 audit(6714.100:53290): avc: denied { read write open } for pid=16981 comm="syz.1.10647" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6714.197789][ T31] audit: type=1400 audit(6714.100:53291): avc: denied { append open } for pid=16973 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.dhcp" dev="tmpfs" ino=220 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6714.198047][ T31] audit: type=1400 audit(6714.100:53292): avc: denied { ioctl } for pid=16981 comm="syz.1.10647" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6714.210332][ T31] audit: type=1400 audit(6714.110:53293): avc: denied { search } for pid=16973 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6714.215535][ T31] audit: type=1400 audit(6714.120:53294): avc: denied { ioctl } for pid=16981 comm="syz.1.10647" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6714.462193][T26406] usb 2-1: new high-speed USB device number 70 using dummy_hcd [ 6714.643365][T26406] usb 2-1: Using ep0 maxpacket: 8 [ 6714.760949][T26406] usb 2-1: config index 0 descriptor too short (expected 301, got 45) [ 6714.761644][T26406] usb 2-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 6714.763175][T26406] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 6714.764267][T26406] usb 2-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 6714.765247][T26406] usb 2-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 6714.766411][T26406] usb 2-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 6714.767318][T26406] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6715.059781][T26406] usb 2-1: usb_control_msg returned -32 [ 6715.060347][T26406] usbtmc 2-1:16.0: can't read capabilities [ 6722.558928][ T31] kauditd_printk_skb: 251 callbacks suppressed [ 6722.559242][ T31] audit: type=1400 audit(6722.460:53546): avc: denied { write } for pid=17004 comm="syz.0.10649" name="arp" dev="proc" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 6722.570316][ T31] audit: type=1400 audit(6722.470:53547): avc: denied { write } for pid=17004 comm="syz.0.10649" path="/proc/1374/net/arp" dev="proc" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 6722.727742][ T31] audit: type=1400 audit(6722.630:53548): avc: denied { create } for pid=17006 comm="syz.0.10650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 6722.733757][ T31] audit: type=1400 audit(6722.640:53549): avc: denied { module_request } for pid=17006 comm="syz.0.10650" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6723.032606][ T31] audit: type=1400 audit(6722.940:53550): avc: denied { name_bind } for pid=17009 comm="syz.0.10651" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 6723.035226][ T31] audit: type=1400 audit(6722.940:53551): avc: denied { node_bind } for pid=17009 comm="syz.0.10651" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 6723.258472][ T31] audit: type=1400 audit(6723.160:53552): avc: denied { read write } for pid=17011 comm="syz.0.10652" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6723.261656][ T31] audit: type=1400 audit(6723.160:53553): avc: denied { read write open } for pid=17011 comm="syz.0.10652" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6723.266310][ T31] audit: type=1400 audit(6723.170:53554): avc: denied { ioctl } for pid=17011 comm="syz.0.10652" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6723.266584][ T31] audit: type=1400 audit(6723.170:53555): avc: denied { ioctl } for pid=17011 comm="syz.0.10652" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6723.502567][T11750] usb 1-1: new high-speed USB device number 74 using dummy_hcd [ 6723.700577][T11750] usb 1-1: unable to get BOS descriptor or descriptor too short [ 6723.724401][T11750] usb 1-1: config 7 has an invalid interface number: 16 but max is 0 [ 6723.724827][T11750] usb 1-1: config 7 has no interface number 0 [ 6723.725035][T11750] usb 1-1: config 7 interface 16 altsetting 59 endpoint 0xC has invalid wMaxPacketSize 0 [ 6723.725215][T11750] usb 1-1: config 7 interface 16 altsetting 59 bulk endpoint 0xF has invalid maxpacket 1024 [ 6723.725384][T11750] usb 1-1: config 7 interface 16 has no altsetting 0 [ 6723.773783][T11750] usb 1-1: New USB device found, idVendor=1608, idProduct=0207, bcdDevice=47.21 [ 6723.774896][T11750] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6723.775802][T11750] usb 1-1: Product: syz [ 6723.783092][T11750] usb 1-1: Manufacturer: syz [ 6723.784108][T11750] usb 1-1: SerialNumber: syz [ 6723.841547][T17012] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 6724.070105][T11750] io_ti 1-1:7.16: required endpoints missing [ 6724.091253][T11750] usb 1-1: USB disconnect, device number 74 [ 6728.598305][T11750] usb 2-1: USB disconnect, device number 70 [ 6728.784940][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 6728.785132][ T31] audit: type=1400 audit(6728.690:53614): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6728.799753][ T31] audit: type=1400 audit(6728.700:53615): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6728.838393][ T31] audit: type=1400 audit(6728.740:53616): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6729.117264][ T31] audit: type=1400 audit(6729.020:53617): avc: denied { read } for pid=17037 comm="syz.1.10654" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6729.205794][ T31] audit: type=1400 audit(6729.100:53618): avc: denied { read open } for pid=17037 comm="syz.1.10654" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6729.796000][ T31] audit: type=1400 audit(6729.700:53619): avc: denied { ioctl } for pid=17037 comm="syz.1.10654" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6729.822626][ T31] audit: type=1400 audit(6729.710:53620): avc: denied { ioctl } for pid=17037 comm="syz.1.10654" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6729.968644][ T31] audit: type=1400 audit(6729.870:53621): avc: denied { allowed } for pid=17037 comm="syz.1.10654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6730.009363][ T31] audit: type=1400 audit(6729.910:53622): avc: denied { create } for pid=17037 comm="syz.1.10654" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6730.018511][ T31] audit: type=1400 audit(6729.920:53623): avc: denied { map } for pid=17037 comm="syz.1.10654" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=116852 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6736.801076][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 6736.807037][ T31] audit: type=1400 audit(6736.700:53650): avc: denied { create } for pid=17042 comm="syz.0.10655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6736.816993][ T31] audit: type=1400 audit(6736.720:53651): avc: denied { bind } for pid=17042 comm="syz.0.10655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6737.054150][ T31] audit: type=1400 audit(6736.960:53652): avc: denied { execmem } for pid=17044 comm="syz.0.10656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6738.036087][ T31] audit: type=1400 audit(6737.930:53653): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6738.038373][ T31] audit: type=1400 audit(6737.930:53654): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6738.040593][ T31] audit: type=1400 audit(6737.940:53655): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6738.206283][ T31] audit: type=1400 audit(6738.110:53656): avc: denied { create } for pid=17046 comm="syz.1.10657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6738.237828][ T31] audit: type=1400 audit(6738.140:53657): avc: denied { write } for pid=17046 comm="syz.1.10657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6738.385533][ T31] audit: type=1400 audit(6738.290:53658): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6738.389292][ T31] audit: type=1400 audit(6738.290:53659): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6743.003592][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 6743.003850][ T31] audit: type=1400 audit(6742.910:53687): avc: denied { create } for pid=17048 comm="syz.1.10658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6754.056512][ T31] audit: type=1400 audit(6753.960:53688): avc: denied { create } for pid=17056 comm="syz.0.10660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6754.066764][ T31] audit: type=1400 audit(6753.970:53689): avc: denied { ioctl } for pid=17056 comm="syz.0.10660" path="socket:[116868]" dev="sockfs" ino=116868 ioctlcmd=0x8b1a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6754.076462][ T31] audit: type=1400 audit(6753.980:53690): avc: denied { ioctl } for pid=17056 comm="syz.0.10660" path="socket:[116868]" dev="sockfs" ino=116868 ioctlcmd=0x8b14 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6754.276254][ T31] audit: type=1400 audit(6754.180:53691): avc: denied { create } for pid=17058 comm="syz.0.10661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6754.290744][ T31] audit: type=1400 audit(6754.190:53692): avc: denied { create } for pid=17058 comm="syz.0.10661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6754.294197][ T31] audit: type=1400 audit(6754.190:53693): avc: denied { write } for pid=17058 comm="syz.0.10661" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6754.297311][ T31] audit: type=1400 audit(6754.200:53694): avc: denied { module_request } for pid=17058 comm="syz.0.10661" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6754.325633][ T31] audit: type=1400 audit(6754.230:53695): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6754.327200][ T31] audit: type=1400 audit(6754.230:53696): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6754.334126][ T31] audit: type=1400 audit(6754.240:53697): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6756.936315][T17084] netlink: 36 bytes leftover after parsing attributes in process `syz.1.10669'. [ 6756.936619][T17084] netlink: 16 bytes leftover after parsing attributes in process `syz.1.10669'. [ 6756.936925][T17084] netlink: 36 bytes leftover after parsing attributes in process `syz.1.10669'. [ 6756.937225][T17084] netlink: 36 bytes leftover after parsing attributes in process `syz.1.10669'. [ 6761.009556][ T31] kauditd_printk_skb: 806 callbacks suppressed [ 6761.010467][ T31] audit: type=1400 audit(6760.910:54504): avc: denied { write } for pid=17087 comm="syz.0.10671" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 6761.024434][ T31] audit: type=1400 audit(6760.930:54505): avc: denied { write } for pid=17087 comm="syz.0.10671" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 6761.158254][ T31] audit: type=1400 audit(6761.060:54506): avc: denied { create } for pid=17087 comm="syz.0.10671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6761.170648][ T31] audit: type=1400 audit(6761.070:54507): avc: denied { write } for pid=17087 comm="syz.0.10671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6761.171491][T17090] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10671'. [ 6761.205894][ T31] audit: type=1400 audit(6761.110:54508): avc: denied { read } for pid=17087 comm="syz.0.10671" dev="nsfs" ino=4026532640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6761.208394][ T31] audit: type=1400 audit(6761.110:54509): avc: denied { read open } for pid=17087 comm="syz.0.10671" path="net:[4026532640]" dev="nsfs" ino=4026532640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6761.219801][ T31] audit: type=1400 audit(6761.120:54510): avc: denied { create } for pid=17087 comm="syz.0.10671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6761.247591][ T31] audit: type=1400 audit(6761.150:54511): avc: denied { write } for pid=17087 comm="syz.0.10671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6766.994433][ T31] audit: type=1400 audit(6766.900:54512): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6766.997663][ T31] audit: type=1400 audit(6766.900:54513): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6767.004512][ T31] audit: type=1400 audit(6766.910:54514): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6767.068208][ T31] audit: type=1400 audit(6766.970:54515): avc: denied { create } for pid=17094 comm="syz.1.10673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6767.077109][ T31] audit: type=1400 audit(6766.980:54516): avc: denied { write } for pid=17094 comm="syz.1.10673" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6767.132969][ T31] audit: type=1400 audit(6767.040:54517): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6767.136843][ T31] audit: type=1400 audit(6767.040:54518): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6767.140697][ T31] audit: type=1400 audit(6767.040:54519): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6767.242521][ T31] audit: type=1400 audit(6767.140:54520): avc: denied { read write } for pid=17096 comm="syz.1.10674" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6767.248006][ T31] audit: type=1400 audit(6767.150:54521): avc: denied { read write open } for pid=17096 comm="syz.1.10674" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6767.532823][T26406] usb 2-1: new low-speed USB device number 71 using dummy_hcd [ 6767.766646][T26406] usb 2-1: unable to get BOS descriptor or descriptor too short [ 6767.767774][T26406] usb 2-1: no configurations [ 6767.768621][T26406] usb 2-1: can't read configurations, error -22 [ 6767.803111][T16448] usb 1-1: new high-speed USB device number 75 using dummy_hcd [ 6768.022815][T16448] usb 1-1: Using ep0 maxpacket: 8 [ 6768.087576][T16448] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 6768.087837][T16448] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 6768.088189][T16448] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 100, changing to 10 [ 6768.088257][T16448] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 24936, setting to 1024 [ 6768.088380][T16448] usb 1-1: New USB device found, idVendor=0225, idProduct=0000, bcdDevice= 0.00 [ 6768.088427][T16448] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6768.136213][T16448] hub 1-1:1.0: bad descriptor, ignoring hub [ 6768.136685][T16448] hub 1-1:1.0: probe with driver hub failed with error -5 [ 6768.144933][T16448] cdc_wdm 1-1:1.0: skipping garbage [ 6768.145258][T16448] cdc_wdm 1-1:1.0: skipping garbage [ 6768.163079][T16448] cdc_wdm 1-1:1.0: cdc-wdm0: USB WDM device [ 6768.357498][T17104] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6768.358215][T17104] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6768.511143][T17131] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 6768.515202][T16448] usb 1-1: USB disconnect, device number 75 [ 6772.586071][ T31] kauditd_printk_skb: 74 callbacks suppressed [ 6772.586423][ T31] audit: type=1400 audit(6772.490:54596): avc: denied { prog_load } for pid=17153 comm="syz.0.10681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6772.624505][ T31] audit: type=1400 audit(6772.530:54597): avc: denied { bpf } for pid=17153 comm="syz.0.10681" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6772.649162][ T31] audit: type=1400 audit(6772.550:54598): avc: denied { prog_load } for pid=17153 comm="syz.0.10681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6772.665288][ T31] audit: type=1400 audit(6772.560:54599): avc: denied { bpf } for pid=17153 comm="syz.0.10681" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6772.676945][ T31] audit: type=1400 audit(6772.580:54600): avc: denied { prog_load } for pid=17153 comm="syz.0.10681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6772.682914][ T31] audit: type=1400 audit(6772.590:54601): avc: denied { bpf } for pid=17153 comm="syz.0.10681" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6772.685680][ T31] audit: type=1400 audit(6772.590:54602): avc: denied { perfmon } for pid=17153 comm="syz.0.10681" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6772.688967][ T31] audit: type=1400 audit(6772.590:54603): avc: denied { perfmon } for pid=17153 comm="syz.0.10681" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6772.698114][ T31] audit: type=1400 audit(6772.600:54604): avc: denied { perfmon } for pid=17153 comm="syz.0.10681" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6772.703644][ T31] audit: type=1400 audit(6772.610:54605): avc: denied { perfmon } for pid=17153 comm="syz.0.10681" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6773.257093][T16469] usb 1-1: new high-speed USB device number 76 using dummy_hcd [ 6773.432834][T16469] usb 1-1: Using ep0 maxpacket: 8 [ 6773.491355][T16469] usb 1-1: too many endpoints for config 0 interface 0 altsetting 250: 255, using maximum allowed: 30 [ 6773.492099][T16469] usb 1-1: config 0 interface 0 altsetting 250 has 1 endpoint descriptor, different from the interface descriptor's value: 255 [ 6773.492302][T16469] usb 1-1: config 0 interface 0 has no altsetting 0 [ 6773.492501][T16469] usb 1-1: New USB device found, idVendor=1770, idProduct=ff00, bcdDevice= 0.00 [ 6773.492661][T16469] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6773.515654][T16469] usb 1-1: config 0 descriptor?? [ 6774.160754][T16469] gt683r_led 0003:1770:FF00.000B: collection stack underflow [ 6774.172529][T16469] gt683r_led 0003:1770:FF00.000B: item 0 4 0 12 parsing failed [ 6774.175178][T16469] gt683r_led 0003:1770:FF00.000B: hid parsing failed [ 6774.175902][T16469] gt683r_led 0003:1770:FF00.000B: probe with driver gt683r_led failed with error -22 [ 6774.378838][T16469] usb 1-1: USB disconnect, device number 76 [ 6775.364593][T16469] usb 1-1: new high-speed USB device number 77 using dummy_hcd [ 6775.692668][T16469] usb 1-1: New USB device found, idVendor=046d, idProduct=0870, bcdDevice=61.47 [ 6775.693979][T16469] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6775.769106][T16469] usb 1-1: config 0 descriptor?? [ 6779.605706][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 6779.606018][ T31] audit: type=1400 audit(6779.510:54660): avc: denied { ioctl } for pid=17176 comm="syz.0.10684" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6783.054779][ T31] audit: type=1400 audit(6782.960:54661): avc: denied { ioctl } for pid=17176 comm="syz.0.10684" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.026319][ T31] audit: type=1400 audit(6783.930:54662): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6784.030163][ T31] audit: type=1400 audit(6783.930:54663): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6784.039049][ T31] audit: type=1400 audit(6783.940:54664): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6784.089522][ T31] audit: type=1400 audit(6783.990:54665): avc: denied { read write } for pid=17187 comm="syz.1.10685" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.102541][ T31] audit: type=1400 audit(6784.000:54666): avc: denied { read write open } for pid=17187 comm="syz.1.10685" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.102903][ T31] audit: type=1400 audit(6784.000:54667): avc: denied { ioctl } for pid=17187 comm="syz.1.10685" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.103200][ T31] audit: type=1400 audit(6784.000:54668): avc: denied { ioctl } for pid=17187 comm="syz.1.10685" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.110205][ T31] audit: type=1400 audit(6784.010:54669): avc: denied { ioctl } for pid=17187 comm="syz.1.10685" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.353231][T16469] usb 2-1: new high-speed USB device number 73 using dummy_hcd [ 6784.512601][T16469] usb 2-1: Using ep0 maxpacket: 8 [ 6784.560045][T16469] usb 2-1: config index 0 descriptor too short (expected 30, got 18) [ 6784.592835][T16469] usb 2-1: New USB device found, idVendor=1660, idProduct=0932, bcdDevice=80.ea [ 6784.594433][T16469] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6784.596212][T16469] usb 2-1: Product: syz [ 6784.597310][T16469] usb 2-1: Manufacturer: syz [ 6784.598106][T16469] usb 2-1: SerialNumber: syz [ 6784.616903][T16469] usb 2-1: config 0 descriptor?? [ 6784.626290][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 6784.626579][ T31] audit: type=1400 audit(6784.530:54691): avc: denied { ioctl } for pid=17187 comm="syz.1.10685" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.636827][ T31] audit: type=1400 audit(6784.540:54692): avc: denied { ioctl } for pid=17187 comm="syz.1.10685" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.640031][ T31] audit: type=1400 audit(6784.540:54693): avc: denied { ioctl } for pid=17187 comm="syz.1.10685" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.851149][ T31] audit: type=1400 audit(6784.750:54694): avc: denied { read append } for pid=17187 comm="syz.1.10685" name="i2c-1" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.857799][ T31] audit: type=1400 audit(6784.760:54695): avc: denied { read append open } for pid=17187 comm="syz.1.10685" path="/dev/i2c-1" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6784.865545][ T31] audit: type=1400 audit(6784.770:54696): avc: denied { ioctl } for pid=17187 comm="syz.1.10685" path="/dev/i2c-1" dev="devtmpfs" ino=699 ioctlcmd=0x707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6786.063671][T26406] usb 1-1: USB disconnect, device number 77 [ 6786.189167][ T31] audit: type=1400 audit(6786.090:54697): avc: denied { create } for pid=17201 comm="syz.0.10686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6786.198115][ T31] audit: type=1400 audit(6786.100:54698): avc: denied { write } for pid=17201 comm="syz.0.10686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6786.198303][ T31] audit: type=1400 audit(6786.100:54699): avc: denied { read } for pid=17201 comm="syz.0.10686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6786.206790][ T31] audit: type=1400 audit(6786.110:54700): avc: denied { read } for pid=17201 comm="syz.0.10686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6786.602708][T16448] usb 1-1: new high-speed USB device number 78 using dummy_hcd [ 6786.832449][T16448] usb 1-1: Using ep0 maxpacket: 16 [ 6786.920452][T16448] usb 1-1: config 0 interface 0 altsetting 9 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6786.922152][T16448] usb 1-1: config 0 interface 0 has no altsetting 0 [ 6786.925413][T16448] usb 1-1: New USB device found, idVendor=1e71, idProduct=2009, bcdDevice= 0.00 [ 6786.925731][T16448] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6786.954406][T16448] usb 1-1: config 0 descriptor?? [ 6787.495519][T16448] nzxt-smart2 0003:1E71:2009.000C: hidraw0: USB HID v0.05 Device [HID 1e71:2009] on usb-dummy_hcd.0-1/input0 [ 6787.903048][T16448] usb 2-1: USB disconnect, device number 73 [ 6787.962497][T17204] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6787.963540][T17204] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6787.967015][T17181] usb 1-1: USB disconnect, device number 78 [ 6788.462382][T16448] usb 2-1: new high-speed USB device number 74 using dummy_hcd [ 6788.700637][T16448] usb 2-1: New USB device found, idVendor=0af0, idProduct=7a05, bcdDevice= 0.00 [ 6788.701402][T16448] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6788.702682][T16448] usb 2-1: Product: syz [ 6788.703131][T16448] usb 2-1: Manufacturer: syz [ 6788.703594][T16448] usb 2-1: SerialNumber: syz [ 6788.725248][T16448] usb 2-1: config 0 descriptor?? [ 6788.984583][T16448] usb-storage 2-1:0.0: USB Mass Storage device detected [ 6788.995252][T16448] usb-storage 2-1:0.0: USB Mass Storage not supported on this host controller [ 6789.049325][T16448] usb-storage 2-1:0.0: probe with driver usb-storage failed with error -22 [ 6789.185286][T16448] usb 2-1: USB disconnect, device number 74 [ 6790.362457][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 6790.362856][ T31] audit: type=1400 audit(6790.260:54776): avc: denied { map_create } for pid=17240 comm="syz.0.10689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6790.378514][ T31] audit: type=1400 audit(6790.280:54777): avc: denied { bpf } for pid=17240 comm="syz.0.10689" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6790.986958][ T31] audit: type=1400 audit(6790.890:54778): avc: denied { map_read map_write } for pid=17240 comm="syz.0.10689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6792.137963][ T31] audit: type=1400 audit(6792.040:54779): avc: denied { create } for pid=17256 comm="syz.1.10690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6792.161553][ T31] audit: type=1400 audit(6792.060:54780): avc: denied { connect } for pid=17256 comm="syz.1.10690" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6792.185899][ T31] audit: type=1400 audit(6792.090:54781): avc: denied { write } for pid=17256 comm="syz.1.10690" path="socket:[116980]" dev="sockfs" ino=116980 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6792.197043][ T31] audit: type=1400 audit(6792.100:54782): avc: denied { write } for pid=17256 comm="syz.1.10690" laddr=172.20.20.10 lport=1 faddr=172.20.20.187 fport=32 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6792.221125][ T31] audit: type=1400 audit(6792.120:54783): avc: denied { write } for pid=17256 comm="syz.1.10690" laddr=172.20.20.10 lport=1 faddr=172.20.20.187 fport=32 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6792.221453][ T31] audit: type=1400 audit(6792.120:54784): avc: denied { write } for pid=17256 comm="syz.1.10690" laddr=172.20.20.10 lport=1 faddr=172.20.20.187 fport=32 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6792.241215][ T31] audit: type=1400 audit(6792.140:54785): avc: denied { write } for pid=17256 comm="syz.1.10690" laddr=172.20.20.10 lport=1 faddr=172.20.20.187 fport=32 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6796.626979][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 6796.627298][ T31] audit: type=1400 audit(6796.530:54788): avc: denied { read } for pid=17261 comm="syz.0.10691" name="adsp1" dev="devtmpfs" ino=736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6796.632709][ T31] audit: type=1400 audit(6796.540:54789): avc: denied { read open } for pid=17261 comm="syz.0.10691" path="/dev/adsp1" dev="devtmpfs" ino=736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6796.644484][ T31] audit: type=1400 audit(6796.550:54790): avc: denied { read } for pid=17261 comm="syz.0.10691" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6796.648276][ T31] audit: type=1400 audit(6796.550:54791): avc: denied { read open } for pid=17261 comm="syz.0.10691" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6796.656936][ T31] audit: type=1400 audit(6796.560:54792): avc: denied { ioctl } for pid=17261 comm="syz.0.10691" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6796.667227][ T31] audit: type=1400 audit(6796.570:54793): avc: denied { ioctl } for pid=17261 comm="syz.0.10691" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6796.678545][ T31] audit: type=1400 audit(6796.580:54794): avc: denied { read } for pid=17261 comm="syz.0.10691" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6796.686367][ T31] audit: type=1400 audit(6796.590:54795): avc: denied { read open } for pid=17261 comm="syz.0.10691" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6796.697002][ T31] audit: type=1400 audit(6796.600:54796): avc: denied { ioctl } for pid=17261 comm="syz.0.10691" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6796.718453][ T31] audit: type=1400 audit(6796.620:54797): avc: denied { ioctl } for pid=17261 comm="syz.0.10691" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6800.595563][T17181] usb 1-1: new high-speed USB device number 79 using dummy_hcd [ 6801.020547][T17181] usb 1-1: Using ep0 maxpacket: 16 [ 6801.093180][T17181] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6801.093447][T17181] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6801.093759][T17181] usb 1-1: New USB device found, idVendor=0458, idProduct=5012, bcdDevice= 0.00 [ 6801.093829][T17181] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6801.160942][T17181] usb 1-1: config 0 descriptor?? [ 6801.719002][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 6801.719304][ T31] audit: type=1400 audit(6801.620:54869): avc: denied { ioctl } for pid=17273 comm="syz.0.10695" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6801.719505][ T31] audit: type=1400 audit(6801.620:54871): avc: denied { ioctl } for pid=17273 comm="syz.0.10695" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6801.719614][ T31] audit: type=1400 audit(6801.620:54870): avc: denied { execmem } for pid=17280 comm="syz.1.10696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6801.942606][T17181] input: HID 0458:5012 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0458:5012.000D/input/input20 [ 6801.973439][T17181] input: HID 0458:5012 as /devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/0003:0458:5012.000D/input/input21 [ 6802.164122][T17181] kye 0003:0458:5012.000D: input,hiddev0,hidraw0: USB HID v0.09 Device [HID 0458:5012] on usb-dummy_hcd.0-1/input0 [ 6802.205463][T17181] usb 1-1: USB disconnect, device number 79 [ 6802.582616][ T31] audit: type=1400 audit(6802.480:54872): avc: denied { allowed } for pid=17299 comm="syz.0.10697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6802.600935][ T31] audit: type=1400 audit(6802.490:54873): avc: denied { create } for pid=17299 comm="syz.0.10697" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6802.601307][ T31] audit: type=1400 audit(6802.500:54874): avc: denied { map } for pid=17299 comm="syz.0.10697" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=116628 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6802.617152][ T31] audit: type=1400 audit(6802.510:54875): avc: denied { read write } for pid=17299 comm="syz.0.10697" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=116628 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6802.617502][ T31] audit: type=1400 audit(6802.520:54876): avc: denied { map } for pid=17299 comm="syz.0.10697" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=116628 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6802.621182][ T31] audit: type=1400 audit(6802.520:54877): avc: denied { read write } for pid=17299 comm="syz.0.10697" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=116628 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6803.459760][ T31] audit: type=1400 audit(6803.360:54878): avc: denied { create } for pid=17313 comm="syz.0.10698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6808.426308][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 6808.426643][ T31] audit: type=1400 audit(6808.330:54901): avc: denied { create } for pid=17321 comm="syz.0.10700" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6808.490251][ T31] audit: type=1400 audit(6808.390:54902): avc: denied { connect } for pid=17321 comm="syz.0.10700" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6808.529045][ T31] audit: type=1400 audit(6808.430:54903): avc: denied { write } for pid=17321 comm="syz.0.10700" path="socket:[117031]" dev="sockfs" ino=117031 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6808.584376][ T31] audit: type=1400 audit(6808.450:54904): avc: denied { write } for pid=17321 comm="syz.0.10700" laddr=172.20.20.10 lport=1 faddr=172.20.20.187 fport=32 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6808.584700][ T31] audit: type=1400 audit(6808.480:54905): avc: denied { write } for pid=17321 comm="syz.0.10700" laddr=172.20.20.10 lport=1 faddr=172.20.20.187 fport=32 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6808.584949][ T31] audit: type=1400 audit(6808.480:54906): avc: denied { write } for pid=17321 comm="syz.0.10700" laddr=172.20.20.10 lport=1 faddr=172.20.20.187 fport=32 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6808.633308][ T31] audit: type=1400 audit(6808.530:54907): avc: denied { write } for pid=17321 comm="syz.0.10700" laddr=172.20.20.10 lport=1 faddr=172.20.20.187 fport=32 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6808.643617][ T31] audit: type=1400 audit(6808.540:54908): avc: denied { write } for pid=17321 comm="syz.0.10700" laddr=172.20.20.10 lport=1 faddr=172.20.20.187 fport=32 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6808.697357][ T31] audit: type=1400 audit(6808.600:54909): avc: denied { write } for pid=17321 comm="syz.0.10700" laddr=172.20.20.10 lport=1 faddr=172.20.20.187 fport=32 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6816.490855][ T31] audit: type=1400 audit(6816.390:54910): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6816.506005][ T31] audit: type=1400 audit(6816.410:54911): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6816.520592][ T31] audit: type=1400 audit(6816.420:54912): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6816.628043][ T31] audit: type=1400 audit(6816.530:54913): avc: denied { read write } for pid=17327 comm="syz.1.10701" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6816.642459][ T31] audit: type=1400 audit(6816.540:54914): avc: denied { read write open } for pid=17327 comm="syz.1.10701" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6816.642822][ T31] audit: type=1400 audit(6816.540:54915): avc: denied { ioctl } for pid=17327 comm="syz.1.10701" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6816.655582][ T31] audit: type=1400 audit(6816.560:54916): avc: denied { ioctl } for pid=17327 comm="syz.1.10701" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6816.696446][ T31] audit: type=1400 audit(6816.600:54917): avc: denied { ioctl } for pid=17327 comm="syz.1.10701" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6816.700619][ T31] audit: type=1400 audit(6816.600:54918): avc: denied { ioctl } for pid=17327 comm="syz.1.10701" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6816.767789][ T31] audit: type=1400 audit(6816.670:54919): avc: denied { ioctl } for pid=17327 comm="syz.1.10701" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6816.892912][T17181] usb 2-1: new high-speed USB device number 75 using dummy_hcd [ 6817.142667][T17181] usb 2-1: Using ep0 maxpacket: 16 [ 6817.236246][T17181] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6817.236551][T17181] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6817.236961][T17181] usb 2-1: New USB device found, idVendor=0458, idProduct=5012, bcdDevice= 0.00 [ 6817.237031][T17181] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6817.264230][T17181] usb 2-1: config 0 descriptor?? [ 6817.908982][T17181] input: HID 0458:5012 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0458:5012.000E/input/input22 [ 6817.927348][T17181] input: HID 0458:5012 as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:0458:5012.000E/input/input23 [ 6818.020440][T17181] kye 0003:0458:5012.000E: input,hiddev0,hidraw0: USB HID v0.09 Device [HID 0458:5012] on usb-dummy_hcd.1-1/input0 [ 6818.943617][ C1] kye 0003:0458:5012.000E: usb_submit_urb(ctrl) failed: -1 [ 6819.752435][T16469] usb 2-1: USB disconnect, device number 75 [ 6821.843364][ T31] kauditd_printk_skb: 38 callbacks suppressed [ 6821.843694][ T31] audit: type=1400 audit(6821.740:54958): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6821.843950][ T31] audit: type=1400 audit(6821.740:54959): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6821.844146][ T31] audit: type=1400 audit(6821.740:54960): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6822.512012][ T31] audit: type=1400 audit(6822.410:54961): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6822.515221][ T31] audit: type=1400 audit(6822.420:54962): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6822.518716][ T31] audit: type=1400 audit(6822.420:54963): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6822.806079][ T31] audit: type=1400 audit(6822.710:54964): avc: denied { read write } for pid=17370 comm="syz.1.10705" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6822.823604][ T31] audit: type=1400 audit(6822.730:54965): avc: denied { read write open } for pid=17370 comm="syz.1.10705" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6822.828379][ T31] audit: type=1400 audit(6822.730:54966): avc: denied { mounton } for pid=17370 comm="syz.1.10705" path="/28/file0" dev="tmpfs" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6822.846509][ T31] audit: type=1400 audit(6822.740:54967): avc: denied { mount } for pid=17370 comm="syz.1.10705" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6827.944787][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 6827.945150][ T31] audit: type=1400 audit(6827.850:54976): avc: denied { prog_load } for pid=17378 comm="syz.1.10707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6827.972543][ T31] audit: type=1400 audit(6827.870:54977): avc: denied { bpf } for pid=17378 comm="syz.1.10707" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6827.973009][ T31] audit: type=1400 audit(6827.870:54978): avc: denied { perfmon } for pid=17378 comm="syz.1.10707" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6827.989660][ T31] audit: type=1400 audit(6827.890:54979): avc: denied { read write } for pid=17378 comm="syz.1.10707" name="uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6828.005239][ T31] audit: type=1400 audit(6827.910:54980): avc: denied { read write open } for pid=17378 comm="syz.1.10707" path="/dev/uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6828.030731][ T31] audit: type=1400 audit(6827.930:54981): avc: denied { ioctl } for pid=17378 comm="syz.1.10707" path="/dev/uinput" dev="devtmpfs" ino=697 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6829.232297][ T31] audit: type=1400 audit(6829.130:54982): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6829.232636][ T31] audit: type=1400 audit(6829.130:54983): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6829.232900][ T31] audit: type=1400 audit(6829.130:54984): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6829.347906][ T31] audit: type=1400 audit(6829.250:54985): avc: denied { read write } for pid=17381 comm="syz.1.10708" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6829.637567][T17382] syzkaller0: entered promiscuous mode [ 6829.638247][T17382] syzkaller0: entered allmulticast mode [ 6831.032683][T17181] usb 2-1: new high-speed USB device number 76 using dummy_hcd [ 6831.192601][T17181] usb 2-1: Using ep0 maxpacket: 32 [ 6831.258553][T17181] usb 2-1: config 0 interface 0 has no altsetting 0 [ 6831.392420][T17181] usb 2-1: New USB device found, idVendor=16d0, idProduct=10b8, bcdDevice=de.8e [ 6831.392761][T17181] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6831.402425][T17181] usb 2-1: Product: syz [ 6831.402661][T17181] usb 2-1: Manufacturer: syz [ 6831.402829][T17181] usb 2-1: SerialNumber: syz [ 6831.418187][T17181] usb 2-1: config 0 descriptor?? [ 6831.520518][T17181] gs_usb 2-1:0.0: Required endpoints not found [ 6833.379849][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 6833.380266][ T31] audit: type=1400 audit(6833.280:55061): avc: denied { create } for pid=17396 comm="syz.0.10712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6833.406724][ T31] audit: type=1400 audit(6833.310:55062): avc: denied { read } for pid=17396 comm="syz.0.10712" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6833.416384][ T31] audit: type=1400 audit(6833.320:55063): avc: denied { read open } for pid=17396 comm="syz.0.10712" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6833.435984][ T31] audit: type=1400 audit(6833.340:55064): avc: denied { ioctl } for pid=17396 comm="syz.0.10712" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6833.452336][ T31] audit: type=1400 audit(6833.350:55065): avc: denied { ioctl } for pid=17396 comm="syz.0.10712" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6833.476793][ T31] audit: type=1400 audit(6833.380:55066): avc: denied { ioctl } for pid=17396 comm="syz.0.10712" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5406 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6834.596658][T16469] usb 2-1: USB disconnect, device number 76 [ 6834.698392][ T31] audit: type=1400 audit(6834.600:55067): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6834.700585][ T31] audit: type=1400 audit(6834.600:55068): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6834.707757][ T31] audit: type=1400 audit(6834.610:55069): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6834.773889][ T31] audit: type=1400 audit(6834.680:55070): avc: denied { prog_load } for pid=17414 comm="syz.1.10713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6835.742773][T16469] usb 2-1: new full-speed USB device number 77 using dummy_hcd [ 6836.038764][T16469] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 6836.039300][T16469] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6836.039501][T16469] usb 2-1: New USB device found, idVendor=046d, idProduct=c532, bcdDevice= 0.00 [ 6836.039571][T16469] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6836.076859][T16469] usb 2-1: config 0 descriptor?? [ 6836.814349][T16448] usb 2-1: USB disconnect, device number 77 [ 6838.394456][ T31] kauditd_printk_skb: 147 callbacks suppressed [ 6838.402614][ T31] audit: type=1400 audit(6838.290:55218): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6838.403045][ T31] audit: type=1400 audit(6838.290:55219): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6838.403283][ T31] audit: type=1400 audit(6838.290:55220): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6838.403529][ T31] audit: type=1400 audit(6838.290:55221): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6838.403759][ T31] audit: type=1400 audit(6838.300:55222): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6838.403961][ T31] audit: type=1400 audit(6838.300:55223): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6838.428154][ T31] audit: type=1400 audit(6838.320:55224): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6838.430981][ T31] audit: type=1400 audit(6838.330:55225): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6838.447151][ T31] audit: type=1400 audit(6838.350:55226): avc: denied { setopt } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6838.449685][ T31] audit: type=1400 audit(6838.350:55227): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6843.402986][ T31] kauditd_printk_skb: 784 callbacks suppressed [ 6843.403309][ T31] audit: type=1400 audit(6843.310:56012): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6843.418533][ T31] audit: type=1400 audit(6843.320:56013): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6843.426147][ T31] audit: type=1400 audit(6843.330:56014): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6843.436227][ T31] audit: type=1400 audit(6843.340:56015): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6843.455970][ T31] audit: type=1400 audit(6843.360:56016): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6843.469828][ T31] audit: type=1400 audit(6843.370:56017): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6843.492285][ T31] audit: type=1400 audit(6843.390:56018): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6843.492549][ T31] audit: type=1400 audit(6843.390:56019): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6843.496556][ T31] audit: type=1400 audit(6843.400:56020): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6843.506723][ T31] audit: type=1400 audit(6843.410:56021): avc: denied { write } for pid=17434 comm="syz.1.10715" laddr=::1 lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6851.350092][ T31] kauditd_printk_skb: 151 callbacks suppressed [ 6851.350627][ T31] audit: type=1400 audit(6851.250:56173): avc: denied { prog_load } for pid=17465 comm="syz.0.10722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6851.898910][ T31] audit: type=1400 audit(6851.800:56174): avc: denied { read write } for pid=17471 comm="syz.0.10723" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6851.911485][ T31] audit: type=1400 audit(6851.810:56175): avc: denied { read write open } for pid=17471 comm="syz.0.10723" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6851.932325][ T31] audit: type=1400 audit(6851.830:56176): avc: denied { mounton } for pid=17471 comm="syz.0.10723" path="/480/file0" dev="tmpfs" ino=2483 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6851.956389][ T31] audit: type=1400 audit(6851.860:56177): avc: denied { mount } for pid=17471 comm="syz.0.10723" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6852.504070][ T31] audit: type=1400 audit(6852.410:56178): avc: denied { unmount } for pid=12832 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6853.210193][ T31] audit: type=1400 audit(6853.110:56179): avc: denied { create } for pid=17478 comm="syz.0.10725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6853.222796][ T31] audit: type=1400 audit(6853.120:56180): avc: denied { bind } for pid=17478 comm="syz.0.10725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6853.223186][ T31] audit: type=1400 audit(6853.120:56181): avc: denied { module_request } for pid=17478 comm="syz.0.10725" kmod="crypto-ecb(camellia)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6853.507254][ T31] audit: type=1400 audit(6853.410:56182): avc: denied { module_request } for pid=17478 comm="syz.0.10725" kmod="crypto-ecb(camellia)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6856.354177][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 6856.354543][ T31] audit: type=1400 audit(6856.260:56222): avc: denied { perfmon } for pid=17489 comm="syz.0.10727" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6856.360063][ T31] audit: type=1400 audit(6856.260:56223): avc: denied { bpf } for pid=17489 comm="syz.0.10727" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6856.360600][ T31] audit: type=1400 audit(6856.260:56224): avc: denied { perfmon } for pid=17489 comm="syz.0.10727" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6856.367241][ T31] audit: type=1400 audit(6856.270:56225): avc: denied { bpf } for pid=17489 comm="syz.0.10727" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6856.369677][ T31] audit: type=1400 audit(6856.270:56226): avc: denied { perfmon } for pid=17489 comm="syz.0.10727" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6856.379025][ T31] audit: type=1400 audit(6856.280:56227): avc: denied { bpf } for pid=17489 comm="syz.0.10727" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6856.382280][ T31] audit: type=1400 audit(6856.280:56228): avc: denied { perfmon } for pid=17489 comm="syz.0.10727" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6856.384912][ T31] audit: type=1400 audit(6856.290:56229): avc: denied { bpf } for pid=17489 comm="syz.0.10727" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6856.395275][ T31] audit: type=1400 audit(6856.290:56230): avc: denied { prog_run } for pid=17489 comm="syz.0.10727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6856.896371][ T31] audit: type=1400 audit(6856.800:56231): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6861.886376][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 6861.886721][ T31] audit: type=1400 audit(6861.790:56258): avc: denied { read write } for pid=16503 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6861.893263][ T31] audit: type=1400 audit(6861.800:56259): avc: denied { read write open } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6861.898536][ T31] audit: type=1400 audit(6861.800:56260): avc: denied { ioctl } for pid=16503 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6862.263935][ T31] audit: type=1400 audit(6862.170:56261): avc: denied { execmem } for pid=17500 comm="syz.1.10731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6865.958507][ T31] audit: type=1400 audit(6865.860:56262): avc: denied { prog_load } for pid=17500 comm="syz.1.10731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6865.984253][ T31] audit: type=1400 audit(6865.890:56263): avc: denied { bpf } for pid=17500 comm="syz.1.10731" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6865.999829][ T31] audit: type=1400 audit(6865.900:56264): avc: denied { perfmon } for pid=17500 comm="syz.1.10731" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6872.344741][ T31] audit: type=1400 audit(6872.250:56265): avc: denied { read write } for pid=17504 comm="syz.0.10732" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6872.348504][ T31] audit: type=1400 audit(6872.250:56266): avc: denied { read write open } for pid=17504 comm="syz.0.10732" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6872.355245][ T31] audit: type=1400 audit(6872.260:56267): avc: denied { ioctl } for pid=17504 comm="syz.0.10732" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6872.372612][ T31] audit: type=1400 audit(6872.270:56268): avc: denied { ioctl } for pid=17504 comm="syz.0.10732" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf07 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6872.373033][ T31] audit: type=1400 audit(6872.270:56269): avc: denied { ioctl } for pid=17504 comm="syz.0.10732" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf20 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6872.373119][ T31] audit: type=1400 audit(6872.270:56270): avc: denied { ioctl } for pid=17504 comm="syz.0.10732" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6872.379034][ T31] audit: type=1400 audit(6872.280:56271): avc: denied { ioctl } for pid=17504 comm="syz.0.10732" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6872.384454][ T31] audit: type=1400 audit(6872.290:56272): avc: denied { ioctl } for pid=17504 comm="syz.0.10732" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6872.388518][ T31] audit: type=1400 audit(6872.290:56273): avc: denied { ioctl } for pid=17504 comm="syz.0.10732" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf61 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6872.691513][ T31] audit: type=1400 audit(6872.590:56274): avc: denied { create } for pid=17509 comm="syz.0.10734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6872.701181][T17510] netlink: 4 bytes leftover after parsing attributes in process `syz.0.10734'. [ 6875.025711][T10689] usb 1-1: new high-speed USB device number 80 using dummy_hcd [ 6875.285501][T10689] usb 1-1: Using ep0 maxpacket: 32 [ 6875.359363][T10689] usb 1-1: config 4 has an invalid interface number: 128 but max is 0 [ 6875.359706][T10689] usb 1-1: config 4 has no interface number 0 [ 6875.359999][T10689] usb 1-1: config 4 interface 128 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 6875.360183][T10689] usb 1-1: config 4 interface 128 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 6875.360306][T10689] usb 1-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 6875.360353][T10689] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6875.573163][T10689] hub 1-1:4.128: USB hub found [ 6875.867101][T10689] hub 1-1:4.128: 6 ports detected [ 6875.867616][T10689] hub 1-1:4.128: Using single TT (err -22) [ 6875.875256][T10689] hub 1-1:4.128: insufficient power available to use all downstream ports [ 6876.097334][T10689] hub 1-1:4.128: hub_hub_status failed (err = -71) [ 6876.098251][T10689] hub 1-1:4.128: config failed, can't get hub status (err -71) [ 6876.173023][T10689] usb 1-1: USB disconnect, device number 80 [ 6880.558804][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 6880.559113][ T31] audit: type=1400 audit(6880.460:56311): avc: denied { create } for pid=17531 comm="syz.0.10738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6880.570445][ T31] audit: type=1400 audit(6880.470:56312): avc: denied { write } for pid=17531 comm="syz.0.10738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6880.582775][ T31] audit: type=1400 audit(6880.480:56313): avc: denied { read } for pid=17531 comm="syz.0.10738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6880.586604][ T31] audit: type=1400 audit(6880.490:56314): avc: denied { read } for pid=17531 comm="syz.0.10738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6880.592987][ T31] audit: type=1400 audit(6880.490:56315): avc: denied { write } for pid=17531 comm="syz.0.10738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6887.904577][ T31] audit: type=1400 audit(6887.810:56316): avc: denied { prog_load } for pid=17535 comm="syz.0.10739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6887.908089][ T31] audit: type=1400 audit(6887.810:56317): avc: denied { bpf } for pid=17535 comm="syz.0.10739" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6887.920848][ T31] audit: type=1400 audit(6887.820:56318): avc: denied { perfmon } for pid=17535 comm="syz.0.10739" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6887.927723][ T31] audit: type=1400 audit(6887.830:56319): avc: denied { perfmon } for pid=17535 comm="syz.0.10739" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6887.938952][ T31] audit: type=1400 audit(6887.840:56320): avc: denied { perfmon } for pid=17535 comm="syz.0.10739" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6887.949406][ T31] audit: type=1400 audit(6887.850:56321): avc: denied { perfmon } for pid=17535 comm="syz.0.10739" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6887.949754][ T31] audit: type=1400 audit(6887.850:56322): avc: denied { perfmon } for pid=17535 comm="syz.0.10739" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6887.949842][ T31] audit: type=1400 audit(6887.850:56323): avc: denied { bpf } for pid=17535 comm="syz.0.10739" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6887.985998][ T31] audit: type=1400 audit(6887.880:56324): avc: denied { read append } for pid=17535 comm="syz.0.10739" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6887.992293][ T31] audit: type=1400 audit(6887.890:56325): avc: denied { read open } for pid=17535 comm="syz.0.10739" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6893.934460][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 6893.937165][ T31] audit: type=1400 audit(6893.840:56334): avc: denied { read write } for pid=17539 comm="syz.0.10740" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6893.943105][ T31] audit: type=1400 audit(6893.850:56335): avc: denied { read write open } for pid=17539 comm="syz.0.10740" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6894.059990][ T31] audit: type=1400 audit(6893.960:56336): avc: denied { read write } for pid=17541 comm="syz.0.10741" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6894.074306][ T31] audit: type=1400 audit(6893.980:56337): avc: denied { read write open } for pid=17541 comm="syz.0.10741" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6894.088682][ T31] audit: type=1400 audit(6893.980:56338): avc: denied { ioctl } for pid=17541 comm="syz.0.10741" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6894.090919][ T31] audit: type=1400 audit(6893.990:56339): avc: denied { ioctl } for pid=17541 comm="syz.0.10741" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6894.109050][ T31] audit: type=1400 audit(6894.010:56340): avc: denied { ioctl } for pid=17541 comm="syz.0.10741" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6894.115810][ T31] audit: type=1400 audit(6894.020:56341): avc: denied { ioctl } for pid=17541 comm="syz.0.10741" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6894.197187][ T31] audit: type=1400 audit(6894.100:56342): avc: denied { ioctl } for pid=17541 comm="syz.0.10741" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6894.268252][ T31] audit: type=1400 audit(6894.170:56343): avc: denied { ioctl } for pid=17541 comm="syz.0.10741" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6894.323523][T16469] usb 1-1: new high-speed USB device number 81 using dummy_hcd [ 6894.532485][T16469] usb 1-1: Using ep0 maxpacket: 32 [ 6894.596804][T16469] usb 1-1: config 0 interface 0 has no altsetting 0 [ 6894.704739][T16469] usb 1-1: New USB device found, idVendor=16d0, idProduct=10b8, bcdDevice=de.8e [ 6894.705463][T16469] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6894.709816][T16469] usb 1-1: Product: syz [ 6894.710760][T16469] usb 1-1: Manufacturer: syz [ 6894.711240][T16469] usb 1-1: SerialNumber: syz [ 6894.726179][T16469] usb 1-1: config 0 descriptor?? [ 6894.787345][T16469] gs_usb 1-1:0.0: Required endpoints not found [ 6895.125651][T16469] usb 1-1: USB disconnect, device number 81 [ 6897.359298][T17558] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10742'. [ 6903.240573][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 6903.241121][ T31] audit: type=1326 audit(6903.140:56381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17559 comm="syz.0.10743" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6903.241520][ T31] audit: type=1326 audit(6903.140:56382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17559 comm="syz.0.10743" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6903.242393][ T31] audit: type=1326 audit(6903.140:56383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17559 comm="syz.0.10743" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6903.242617][ T31] audit: type=1326 audit(6903.140:56384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17559 comm="syz.0.10743" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6903.242847][ T31] audit: type=1326 audit(6903.140:56385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17559 comm="syz.0.10743" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6903.243642][ T31] audit: type=1326 audit(6903.140:56386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17559 comm="syz.0.10743" exe="/syz-executor" sig=0 arch=40000028 syscall=3 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6903.243911][ T31] audit: type=1326 audit(6903.150:56387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17559 comm="syz.0.10743" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 6908.003154][ T31] audit: type=1400 audit(6907.890:56388): avc: denied { execute } for pid=17567 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6908.003655][ T31] audit: type=1400 audit(6907.910:56389): avc: denied { execute_no_trans } for pid=17567 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6908.040699][ T31] audit: type=1400 audit(6907.940:56390): avc: denied { execute } for pid=17567 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 6908.244494][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 6908.244769][ T31] audit: type=1400 audit(6908.150:56394): avc: denied { mounton } for pid=17568 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 6908.336966][ T31] audit: type=1400 audit(6908.240:56395): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6908.988240][ T31] audit: type=1400 audit(6908.890:56396): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6908.993932][ T31] audit: type=1400 audit(6908.900:56397): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6909.903895][ T31] audit: type=1400 audit(6909.810:56398): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6910.559451][ T31] audit: type=1400 audit(6910.460:56399): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6910.575792][ T31] audit: type=1400 audit(6910.480:56400): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6911.014135][ T31] audit: type=1400 audit(6910.920:56401): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6911.536155][ T31] audit: type=1400 audit(6911.440:56402): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6911.536488][ T31] audit: type=1400 audit(6911.440:56403): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6913.603517][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 6913.603931][ T31] audit: type=1400 audit(6913.510:56411): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="rtnl-link-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6914.205288][ T31] audit: type=1400 audit(6914.110:56412): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6914.636915][ T31] audit: type=1400 audit(6914.540:56413): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6914.935235][ T31] audit: type=1400 audit(6914.840:56414): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6915.827466][ T31] audit: type=1400 audit(6915.730:56415): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6916.219562][ T31] audit: type=1400 audit(6916.110:56416): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6916.219952][ T31] audit: type=1400 audit(6916.120:56417): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6916.603345][ T31] audit: type=1400 audit(6916.490:56418): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6916.958145][ T31] audit: type=1400 audit(6916.860:56419): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6916.964932][ T31] audit: type=1400 audit(6916.870:56420): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6917.637097][T17568] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6917.664004][T17568] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6918.829016][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 6918.829322][ T31] audit: type=1400 audit(6918.730:56430): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6918.914047][ T31] audit: type=1400 audit(6918.820:56431): avc: denied { read } for pid=17748 comm="syz.0.10747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6918.938180][ T31] audit: type=1400 audit(6918.820:56432): avc: denied { ioctl } for pid=17748 comm="syz.0.10747" path="socket:[117914]" dev="sockfs" ino=117914 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6918.938519][ T31] audit: type=1400 audit(6918.840:56433): avc: denied { module_request } for pid=17748 comm="syz.0.10747" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6919.290488][ T31] audit: type=1400 audit(6919.190:56434): avc: denied { sys_module } for pid=17748 comm="syz.0.10747" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6919.297618][ T31] audit: type=1400 audit(6919.200:56435): avc: denied { module_request } for pid=17748 comm="syz.0.10747" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6919.395658][ T31] audit: type=1400 audit(6919.300:56436): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6919.399345][ T31] audit: type=1400 audit(6919.300:56437): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6919.448944][ T31] audit: type=1400 audit(6919.350:56438): avc: denied { write } for pid=17748 comm="syz.0.10747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6919.830909][ T31] audit: type=1400 audit(6919.730:56439): avc: denied { prog_load } for pid=17756 comm="syz.0.10748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6922.808252][T17568] hsr_slave_0: entered promiscuous mode [ 6922.809800][T17568] hsr_slave_1: entered promiscuous mode [ 6922.810957][T17568] debugfs: 'hsr0' already exists in 'hsr' [ 6922.811146][T17568] Cannot create hsr debugfs directory [ 6923.834085][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 6923.834394][ T31] audit: type=1400 audit(6923.740:56500): avc: denied { bpf } for pid=17832 comm="syz.0.10751" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6923.837969][ T31] audit: type=1400 audit(6923.740:56501): avc: denied { perfmon } for pid=17832 comm="syz.0.10751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6923.842990][ T31] audit: type=1400 audit(6923.750:56502): avc: denied { perfmon } for pid=17832 comm="syz.0.10751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6923.849179][ T31] audit: type=1400 audit(6923.750:56503): avc: denied { perfmon } for pid=17832 comm="syz.0.10751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6923.864821][ T31] audit: type=1400 audit(6923.770:56504): avc: denied { perfmon } for pid=17832 comm="syz.0.10751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6923.868545][ T31] audit: type=1400 audit(6923.770:56505): avc: denied { perfmon } for pid=17832 comm="syz.0.10751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6923.895580][ T31] audit: type=1400 audit(6923.780:56506): avc: denied { bpf } for pid=17832 comm="syz.0.10751" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6924.008242][ T31] audit: type=1400 audit(6923.890:56507): avc: denied { bpf } for pid=17832 comm="syz.0.10751" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6924.008585][ T31] audit: type=1400 audit(6923.900:56508): avc: denied { perfmon } for pid=17832 comm="syz.0.10751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6924.112617][ T31] audit: type=1400 audit(6924.010:56509): avc: denied { bpf } for pid=17832 comm="syz.0.10751" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6925.465513][T17568] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 6925.505940][T17568] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 6925.530035][T17568] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 6925.615729][T17568] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 6928.433336][T10689] usb 1-1: new high-speed USB device number 82 using dummy_hcd [ 6928.727162][T10689] usb 1-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 6928.728238][T10689] usb 1-1: config 1 has an invalid descriptor of length 55, skipping remainder of the config [ 6928.729395][T10689] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 6928.730446][T10689] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 55, changing to 9 [ 6928.731981][T10689] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 8496, setting to 1024 [ 6928.812088][T10689] usb 1-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 6928.812271][T10689] usb 1-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 6928.812398][T10689] usb 1-1: Product: syz [ 6928.812489][T10689] usb 1-1: Manufacturer: syz [ 6928.857352][ T31] kauditd_printk_skb: 75 callbacks suppressed [ 6928.857870][ T31] audit: type=1400 audit(6928.760:56585): avc: denied { ioctl } for pid=17906 comm="syz.0.10756" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6928.902701][ T31] audit: type=1400 audit(6928.800:56586): avc: denied { ioctl } for pid=17906 comm="syz.0.10756" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6928.905768][T10689] cdc_wdm 1-1:1.0: skipping garbage [ 6928.906255][T10689] cdc_wdm 1-1:1.0: skipping garbage [ 6928.993817][T10689] cdc_wdm 1-1:1.0: cdc-wdm0: USB WDM device [ 6929.069272][ T31] audit: type=1400 audit(6928.970:56587): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6929.117539][ T31] audit: type=1400 audit(6928.990:56588): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6929.673881][ T31] audit: type=1400 audit(6929.580:56589): avc: denied { read } for pid=17922 comm="syz.0.10757" name="comedi1" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6929.677045][ T31] audit: type=1400 audit(6929.580:56590): avc: denied { read open } for pid=17922 comm="syz.0.10757" path="/dev/comedi1" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6929.684862][ T31] audit: type=1400 audit(6929.590:56591): avc: denied { ioctl } for pid=17922 comm="syz.0.10757" path="/dev/comedi1" dev="devtmpfs" ino=711 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6929.687867][T17923] comedi: valid board names for 8255 driver are: [ 6929.688551][T17923] 8255 [ 6929.689223][T17923] comedi: valid board names for vmk80xx driver are: [ 6929.689737][T17923] vmk80xx [ 6929.690072][T17923] comedi: valid board names for usbduxsigma driver are: [ 6929.690529][T17923] usbduxsigma [ 6929.690845][T17923] comedi: valid board names for usbduxfast driver are: [ 6929.691265][T17923] usbduxfast [ 6929.692458][T17923] comedi: valid board names for usbdux driver are: [ 6929.692920][T17923] usbdux [ 6929.693217][T17923] comedi: valid board names for ni6501 driver are: [ 6929.693607][T17923] ni6501 [ 6929.693889][T17923] comedi: valid board names for dt9812 driver are: [ 6929.694281][T17923] dt9812 [ 6929.694557][T17923] comedi: valid board names for ni_labpc_cs driver are: [ 6929.696421][T17923] ni_labpc_cs [ 6929.697096][T17923] comedi: valid board names for ni_daq_700 driver are: [ 6929.697610][T17923] ni_daq_700 [ 6929.697817][ T31] audit: type=1400 audit(6929.600:56592): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6929.698583][T17923] comedi: valid board names for labpc_pci driver are: [ 6929.700428][T17923] labpc_pci [ 6929.702095][T17923] comedi: valid board names for adl_pci9118 driver are: [ 6929.703277][T17923] pci9118dg [ 6929.703714][T17923] pci9118hg [ 6929.704032][T17923] pci9118hr [ 6929.704392][T17923] comedi: valid board names for 8255_pci driver are: [ 6929.704951][T17923] 8255_pci [ 6929.705341][T17923] comedi: valid board names for comedi_parport driver are: [ 6929.705868][T17923] comedi_parport [ 6929.706225][T17923] comedi: valid board names for comedi_test driver are: [ 6929.712145][T17923] comedi_test [ 6929.712279][T17923] comedi: valid board names for comedi_bond driver are: [ 6929.712364][T17923] comedi_bond [ 6929.730761][ T31] audit: type=1400 audit(6929.620:56593): avc: denied { ioctl } for pid=17922 comm="syz.0.10757" path="/dev/comedi1" dev="devtmpfs" ino=711 ioctlcmd=0x640c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6929.813640][T16468] usb 1-1: USB disconnect, device number 82 [ 6930.074702][ T31] audit: type=1400 audit(6929.980:56594): avc: denied { execmem } for pid=17925 comm="syz.0.10758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6931.144620][T17568] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6934.159369][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 6934.159753][ T31] audit: type=1400 audit(6934.060:56604): avc: denied { create } for pid=17925 comm="syz.0.10758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6934.188170][ T31] audit: type=1400 audit(6934.090:56605): avc: denied { bind } for pid=17925 comm="syz.0.10758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6934.226587][ T31] audit: type=1400 audit(6934.130:56606): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6934.235154][ T31] audit: type=1400 audit(6934.140:56607): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6934.366734][ T31] audit: type=1400 audit(6934.270:56608): avc: denied { setopt } for pid=17925 comm="syz.0.10758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6934.404442][ T31] audit: type=1400 audit(6934.310:56609): avc: denied { accept } for pid=17925 comm="syz.0.10758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6934.428321][ T31] audit: type=1400 audit(6934.330:56610): avc: denied { write } for pid=17925 comm="syz.0.10758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6934.436252][ T31] audit: type=1400 audit(6934.340:56611): avc: denied { read } for pid=17925 comm="syz.0.10758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6935.919570][ T31] audit: type=1400 audit(6935.820:56612): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6936.194120][ T31] audit: type=1400 audit(6936.100:56613): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6939.259824][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 6939.260067][ T31] audit: type=1400 audit(6939.160:56627): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6939.773801][ T31] audit: type=1400 audit(6939.680:56628): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6939.777655][ T31] audit: type=1400 audit(6939.680:56629): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6940.109832][ T31] audit: type=1400 audit(6940.010:56630): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6940.360832][T17933] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6940.451304][ T31] audit: type=1400 audit(6940.350:56631): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6940.459894][ T31] audit: type=1400 audit(6940.360:56632): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6940.505810][T17933] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6940.591347][T17933] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6940.690820][T17933] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6940.804974][ T31] audit: type=1400 audit(6940.710:56633): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6940.992797][T17933] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6940.996571][T17933] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6940.998774][T17933] bond0 (unregistering): Released all slaves [ 6941.064080][T17933] hsr_slave_0: left promiscuous mode [ 6941.067170][T17933] hsr_slave_1: left promiscuous mode [ 6941.072164][T17933] veth1_macvtap: left promiscuous mode [ 6941.072714][T17933] veth0_macvtap: left promiscuous mode [ 6941.073248][T17933] veth1_vlan: left promiscuous mode [ 6941.073702][T17933] veth0_vlan: left promiscuous mode [ 6941.394645][ T31] audit: type=1400 audit(6941.300:56634): avc: denied { sys_module } for pid=17568 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6941.397913][ T31] audit: type=1400 audit(6941.300:56635): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6942.188276][ T31] audit: type=1400 audit(6942.080:56636): avc: denied { module_request } for pid=17568 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6944.263014][ T31] kauditd_printk_skb: 118 callbacks suppressed [ 6944.263191][ T31] audit: type=1400 audit(6944.170:56755): avc: denied { search } for pid=17976 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6944.272365][ T31] audit: type=1400 audit(6944.170:56756): avc: denied { search } for pid=17976 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6944.272614][ T31] audit: type=1400 audit(6944.170:56757): avc: denied { search } for pid=17976 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6944.272727][ T31] audit: type=1400 audit(6944.170:56758): avc: denied { search } for pid=17976 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6944.272894][ T31] audit: type=1400 audit(6944.170:56759): avc: denied { search } for pid=17976 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6944.272995][ T31] audit: type=1400 audit(6944.170:56760): avc: denied { search } for pid=17976 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6944.273091][ T31] audit: type=1400 audit(6944.170:56761): avc: denied { getattr } for pid=17976 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6944.284377][ T31] audit: type=1400 audit(6944.190:56762): avc: denied { search } for pid=17976 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6944.302441][ T31] audit: type=1400 audit(6944.200:56763): avc: denied { search } for pid=17976 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6944.302721][ T31] audit: type=1400 audit(6944.200:56764): avc: denied { search } for pid=17976 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6949.067973][T17568] veth0_vlan: entered promiscuous mode [ 6949.371503][T17568] veth1_vlan: entered promiscuous mode [ 6949.964263][T17568] veth0_macvtap: entered promiscuous mode [ 6950.044168][T17568] veth1_macvtap: entered promiscuous mode [ 6950.453460][ T31] kauditd_printk_skb: 74 callbacks suppressed [ 6950.453851][ T31] audit: type=1400 audit(6950.340:56839): avc: denied { write } for pid=17990 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6950.459304][ T31] audit: type=1400 audit(6950.360:56840): avc: denied { write open } for pid=17990 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6950.467321][T17933] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6950.467769][T17933] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6950.468091][T17933] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6950.468204][T17933] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6950.513310][ T31] audit: type=1400 audit(6950.410:56841): avc: denied { search } for pid=17990 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6950.513737][ T31] audit: type=1400 audit(6950.410:56842): avc: denied { search } for pid=17990 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6950.523952][ T31] audit: type=1400 audit(6950.410:56843): avc: denied { search } for pid=17990 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6950.524600][ T31] audit: type=1400 audit(6950.430:56844): avc: denied { search } for pid=17990 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6950.903500][ T31] audit: type=1400 audit(6950.810:56845): avc: denied { mounton } for pid=17568 comm="syz-executor" path="/syzkaller.izXLc2/syz-tmp" dev="vda" ino=833 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 6950.910355][ T31] audit: type=1400 audit(6950.810:56846): avc: denied { mount } for pid=17568 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 6950.960901][ T31] audit: type=1400 audit(6950.860:56847): avc: denied { mounton } for pid=17568 comm="syz-executor" path="/syzkaller.izXLc2/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6950.975334][ T31] audit: type=1400 audit(6950.880:56848): avc: denied { search } for pid=17992 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6951.915090][T17996] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6951.921488][T17996] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6952.782511][T18004] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6952.782977][T18004] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6955.470343][ T31] kauditd_printk_skb: 273 callbacks suppressed [ 6955.470761][ T31] audit: type=1400 audit(6955.370:57122): avc: denied { search } for pid=18014 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6955.482445][ T31] audit: type=1400 audit(6955.380:57123): avc: denied { search } for pid=18014 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6955.482832][ T31] audit: type=1400 audit(6955.380:57124): avc: denied { search } for pid=18014 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6955.483025][ T31] audit: type=1400 audit(6955.380:57125): avc: denied { search } for pid=18014 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6955.492586][ T31] audit: type=1400 audit(6955.400:57126): avc: denied { search } for pid=18014 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6955.492980][ T31] audit: type=1400 audit(6955.400:57127): avc: denied { search } for pid=18014 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6955.493217][ T31] audit: type=1400 audit(6955.400:57128): avc: denied { search } for pid=18014 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6955.495587][ T31] audit: type=1400 audit(6955.400:57129): avc: denied { read open } for pid=18014 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6955.499739][ T31] audit: type=1400 audit(6955.400:57130): avc: denied { getattr } for pid=18014 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6955.522261][ T31] audit: type=1400 audit(6955.420:57131): avc: denied { search } for pid=18014 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6960.474112][ T31] kauditd_printk_skb: 335 callbacks suppressed [ 6960.474537][ T31] audit: type=1400 audit(6960.380:57467): avc: denied { search } for pid=18024 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6960.474831][ T31] audit: type=1400 audit(6960.380:57468): avc: denied { search } for pid=18024 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6960.474923][ T31] audit: type=1400 audit(6960.380:57469): avc: denied { search } for pid=18024 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6960.479361][ T31] audit: type=1400 audit(6960.380:57470): avc: denied { getattr } for pid=18024 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth4.link" dev="tmpfs" ino=225 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6960.485540][ T31] audit: type=1400 audit(6960.390:57471): avc: denied { search } for pid=18024 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6960.485844][ T31] audit: type=1400 audit(6960.390:57472): avc: denied { search } for pid=18024 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6960.485943][ T31] audit: type=1400 audit(6960.390:57473): avc: denied { search } for pid=18024 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6960.489244][ T31] audit: type=1400 audit(6960.390:57474): avc: denied { search } for pid=18024 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6960.494692][ T31] audit: type=1400 audit(6960.400:57475): avc: denied { remove_name search } for pid=18024 comm="rm" name="resolv.conf.eth4.link" dev="tmpfs" ino=225 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6960.494973][ T31] audit: type=1400 audit(6960.400:57476): avc: denied { unlink } for pid=18024 comm="rm" name="resolv.conf.eth4.link" dev="tmpfs" ino=225 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6964.492315][T18038] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6964.493388][T18038] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6965.858397][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 6965.858782][ T31] audit: type=1400 audit(6965.760:57513): avc: denied { ioctl } for pid=18029 comm="syz.0.10763" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x55c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6965.880100][ T31] audit: type=1400 audit(6965.780:57514): avc: denied { ioctl } for pid=18029 comm="syz.0.10763" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6965.959614][ T31] audit: type=1400 audit(6965.860:57515): avc: denied { create } for pid=18029 comm="syz.0.10763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6966.012586][ T31] audit: type=1400 audit(6965.900:57516): avc: denied { bpf } for pid=18029 comm="syz.0.10763" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6966.224482][ T31] audit: type=1400 audit(6966.130:57517): avc: denied { prog_load } for pid=18043 comm="syz.2.10766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6966.227585][ T31] audit: type=1400 audit(6966.130:57518): avc: denied { bpf } for pid=18043 comm="syz.2.10766" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6966.250140][ T31] audit: type=1400 audit(6966.150:57519): avc: denied { perfmon } for pid=18043 comm="syz.2.10766" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6966.299835][ T31] audit: type=1400 audit(6966.190:57520): avc: denied { read } for pid=18043 comm="syz.2.10766" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6966.302486][ T31] audit: type=1400 audit(6966.200:57521): avc: denied { read open } for pid=18043 comm="syz.2.10766" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6972.579876][ T31] audit: type=1400 audit(6972.480:57522): avc: denied { read write } for pid=18054 comm="syz.0.10767" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6972.582226][ T31] audit: type=1400 audit(6972.480:57523): avc: denied { read write open } for pid=18054 comm="syz.0.10767" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6972.588706][ T31] audit: type=1400 audit(6972.490:57524): avc: denied { ioctl } for pid=18054 comm="syz.0.10767" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6972.606203][ T31] audit: type=1400 audit(6972.510:57525): avc: denied { ioctl } for pid=18054 comm="syz.0.10767" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6972.613733][ T31] audit: type=1400 audit(6972.520:57526): avc: denied { ioctl } for pid=18054 comm="syz.0.10767" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6972.619770][ T31] audit: type=1400 audit(6972.520:57527): avc: denied { ioctl } for pid=18054 comm="syz.0.10767" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6972.625036][ T31] audit: type=1400 audit(6972.530:57528): avc: denied { ioctl } for pid=18054 comm="syz.0.10767" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf61 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6972.637658][ T31] audit: type=1400 audit(6972.540:57529): avc: denied { ioctl } for pid=18054 comm="syz.0.10767" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf60 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6972.645806][ T31] audit: type=1400 audit(6972.540:57530): avc: denied { create } for pid=18054 comm="syz.0.10767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6972.668882][ C1] vkms_vblank_simulate: vblank timer overrun [ 6972.701003][ T31] audit: type=1400 audit(6972.600:57531): avc: denied { connect } for pid=18054 comm="syz.0.10767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6972.978575][T18060] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6972.979854][T18060] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6973.438222][T18064] ------------[ cut here ]------------ [ 6973.438691][T18064] WARNING: CPU: 1 PID ** replaying previous printk message ** [ 6973.438691][T18064] WARNING: CPU: 1 PID: 18064 at mm/highmem.c:622 kunmap_local_indexed+0x20c/0x224 [ 6973.440926][T18064] Modules linked in: [ 6973.441647][T18064] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 6973.442411][T18064] CPU: 1 UID: 0 PID: 18064 Comm: syz.2.10770 Not tainted syzkaller #0 PREEMPT [ 6973.443690][T18064] Hardware name: ARM-Versatile Express [ 6973.444749][T18064] Call trace: [ 6973.444942][T18064] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 6973.445728][T18064] r7:00000000 r6:8281f77c r5:00000000 r4:8226023c [ 6973.446076][T18064] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 6973.446467][T18064] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 6973.447033][T18064] r5:00000000 r4:82a77d18 [ 6973.447294][T18064] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 6973.447732][T18064] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 6973.448113][T18064] r7:804bed28 [ 6973.448286][T18064] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 6973.448638][T18064] r3:8280c684 r2:00000001 r1:82246c58 r0:8224e6d4 [ 6973.448936][T18064] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 6973.449393][T18064] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 6973.449791][T18064] r8:00000009 r7:8227aa80 r6:dfab5d14 r5:83316000 r4:00000000 [ 6973.450107][T18064] [<80254bd0>] (warn_slowpath_fmt) from [<804bed28>] (kunmap_local_indexed+0x20c/0x224) [ 6973.450551][T18064] r10:00000000 r9:ded11edc r8:deb60f78 r7:00a00000 r6:00000003 r5:83316000 [ 6973.450986][T18064] r4:ffedc000 [ 6973.451159][T18064] [<804beb1c>] (kunmap_local_indexed) from [<8053b480>] (move_pages+0xb1c/0x1a00) [ 6973.451680][T18064] r7:00a00000 r6:fffffff0 r5:878903d4 r4:ffeda000 [ 6973.452173][T18064] [<8053a964>] (move_pages) from [<805c4ab4>] (userfaultfd_ioctl+0x1254/0x2408) [ 6973.452906][T18064] r10:84e9b0c0 r9:dfab5e98 r8:00000001 r7:21000000 r6:00000000 r5:20000040 [ 6973.453279][T18064] r4:85828100 [ 6973.453457][T18064] [<805c3860>] (userfaultfd_ioctl) from [<8056cd60>] (sys_ioctl+0x130/0xba0) [ 6973.453886][T18064] r10:83316000 r9:00000003 r8:857f0600 r7:20000040 r6:857f0601 r5:00000000 [ 6973.454244][T18064] r4:c028aa05 [ 6973.454425][T18064] [<8056cc30>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6973.454826][T18064] Exception stack(0xdfab5fa8 to 0xdfab5ff0) [ 6973.455116][T18064] 5fa0: 00000000 00000000 00000003 c028aa05 20000040 00000000 [ 6973.455511][T18064] 5fc0: 00000000 00000000 002f6308 00000036 002e0000 00000000 00006364 76f220bc [ 6973.456017][T18064] 5fe0: 76f21ec0 76f21eb0 0001948c 001322c0 [ 6973.456599][T18064] r10:00000036 r9:83316000 r8:8020029c r7:00000036 r6:002f6308 r5:00000000 [ 6973.457275][T18064] r4:00000000 [ 6973.459603][T18064] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:40:58 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00010001 R03=84141800 R04=8280cce4 R05=df80a000 R06=826c0348 R07=df80a00c R08=00000000 R09=84141800 R10=82959154 R11=df801fd4 R12=df801f68 R13=df801fb8 R14=81a45ef8 R15=802012c8 PSR=20070193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00003a76 R01=80003a76 R02=00003a76 R03=80000093 R04=dfab5af0 R05=00000046 R06=dddd83d5 R07=00000000 R08=00000000 R09=00000000 R10=82826ed8 R11=dfab5a98 R12=00000000 R13=dfab5a84 R14=0000000c R15=802e56e4 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000