last executing test programs: 51.163326487s ago: executing program 0 (id=2116): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000940)='/sys/kernel/fscaps', 0xa000, 0x0) socket$netlink(0x10, 0x3, 0xa) r0 = socket$packet(0x11, 0x3, 0x300) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x18a) syz_usb_connect$uac1(0x0, 0xa4, &(0x7f0000001200)=ANY=[@ANYBLOB="2a01000020000040b708000000000000030109029200030172e5000904000000010100000a24010000000201020c0d2405000005000000000000000c240000e9fffff5ffffffff092403f3", @ANYRES8=r1, @ANYRES64=r0], 0x0) 50.134419234s ago: executing program 0 (id=2118): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r1 = socket$inet6(0xa, 0x80003, 0x6) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) symlink(0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in=@private=0xa010105, 0x0, 0x0, 0x4e24, 0x0, 0xa}, {0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0xa78a}, 0xfffffffe, 0x0, 0x1, 0x0, 0x0, 0x3}, {{@in=@loopback, 0x4d6, 0x33}, 0x0, @in6=@local, 0x0, 0x3, 0x1, 0x7, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 33.015830962s ago: executing program 0 (id=2121): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000940)={0x2, 0x0, [{0x1, 0x26, &(0x7f0000000000)=""/38}, {0x0, 0x0, 0x0}]}) close(0x3) 32.315776041s ago: executing program 0 (id=2122): r0 = syz_open_procfs(0x0, &(0x7f0000000580)='stack\x00') timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)=0x0) timer_settime(r1, 0x0, &(0x7f0000000240)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) read$FUSE(r0, &(0x7f00000029c0)={0x2020}, 0x2020) 29.762256964s ago: executing program 0 (id=2124): r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/uts\x00') ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 29.231531444s ago: executing program 0 (id=2126): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000480)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x4000000}, 0x50) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x40000, 0x0, r3, 0xfff}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x15, 0x1c, &(0x7f0000000100)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000000}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x6}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x2}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x6, 0x1, 0xa, 0x9, 0x8}, {0x7, 0x0, 0x0, 0x8}, {0x7, 0x1, 0xb, 0x4, 0x8}, {}, {0x7, 0x0, 0xc}, {0x18, 0x6, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 4.061724393s ago: executing program 1 (id=2146): r0 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000000000)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) kcmp(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) socket(0x840000000002, 0x3, 0xff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000008, 0x8031, 0xffffffffffffffff, 0x28f43000) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 2.424016434s ago: executing program 1 (id=2147): setresuid(0x0, 0xee00, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x14, r1, 0x7}, 0x14}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) 2.004138527s ago: executing program 1 (id=2148): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x8000}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) sendto$packet(r0, &(0x7f00000002c0)="0503", 0x2, 0x88c4, &(0x7f0000000140)={0x11, 0x1a, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) 1.304485266s ago: executing program 1 (id=2149): r0 = syz_open_dev$usbfs(&(0x7f0000000140), 0x76, 0x1701) ioctl$USBDEVFS_RESET(r0, 0x5514) 824.904083ms ago: executing program 1 (id=2150): r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000b40)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x30, 0x0, "", {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='task\x00') fchdir(r1) r2 = syz_clone(0x2008400, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000080)='proc\x00', 0x189, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000100)='map_files\x00') fchdir(r3) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x4c842, 0x24) 0s ago: executing program 1 (id=2151): socket$inet6(0xa, 0x2, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r0 = syz_clone(0x2080, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r0, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) mremap(&(0x7f000031d000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffe000/0x1000)=nil) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x28011, r2, 0x0) unshare(0x22020600) connect$unix(r1, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) kernel console output (not intermixed with test programs): scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1031.837472][ T28] audit: type=1400 audit(1031.750:5710): avc: denied { ioctl } for pid=10209 comm="syz.1.1863" path="socket:[21409]" dev="sockfs" ino=21409 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1035.817161][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 1035.817771][ T28] audit: type=1400 audit(1035.730:5744): avc: denied { unmount } for pid=10218 comm="syz.1.1866" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1035.946401][ T28] audit: type=1400 audit(1035.860:5745): avc: denied { unmount } for pid=7793 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1036.054873][ T28] audit: type=1400 audit(1035.970:5746): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1036.070488][ T28] audit: type=1400 audit(1035.970:5747): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1036.072659][ T28] audit: type=1400 audit(1035.980:5748): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1036.200179][ T28] audit: type=1400 audit(1036.110:5749): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1036.248673][ T28] audit: type=1400 audit(1036.160:5750): avc: denied { create } for pid=10225 comm="syz.0.1868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1036.256194][ T28] audit: type=1400 audit(1036.170:5751): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1036.263510][ T28] audit: type=1400 audit(1036.180:5752): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1036.331340][ T28] audit: type=1400 audit(1036.250:5753): avc: denied { write } for pid=10225 comm="syz.0.1868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1040.865193][ T28] kauditd_printk_skb: 48 callbacks suppressed [ 1040.866194][ T28] audit: type=1400 audit(1040.780:5802): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1040.882359][ T28] audit: type=1400 audit(1040.800:5803): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1040.905042][ T28] audit: type=1400 audit(1040.820:5804): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1040.943310][ T28] audit: type=1400 audit(1040.860:5805): avc: denied { unmount } for pid=10236 comm="syz.0.1871" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1040.976877][ T28] audit: type=1400 audit(1040.890:5806): avc: denied { unmount } for pid=7302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1041.156798][ T28] audit: type=1400 audit(1041.070:5807): avc: denied { read } for pid=10250 comm="syz.1.1874" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1041.158373][ T28] audit: type=1400 audit(1041.070:5808): avc: denied { read open } for pid=10250 comm="syz.1.1874" path="/dev/sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1041.227434][ T28] audit: type=1400 audit(1041.140:5809): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1041.253924][ T28] audit: type=1400 audit(1041.170:5810): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1041.254991][ T28] audit: type=1400 audit(1041.170:5811): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1045.982745][ T28] kauditd_printk_skb: 53 callbacks suppressed [ 1045.983105][ T28] audit: type=1400 audit(1045.900:5865): avc: denied { create } for pid=10271 comm="syz.1.1882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1046.030157][ T28] audit: type=1400 audit(1045.930:5866): avc: denied { ioctl } for pid=10271 comm="syz.1.1882" path="socket:[21971]" dev="sockfs" ino=21971 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1046.030604][ T28] audit: type=1400 audit(1045.940:5867): avc: denied { bind } for pid=10271 comm="syz.1.1882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1046.030706][ T28] audit: type=1400 audit(1045.940:5868): avc: denied { write } for pid=10271 comm="syz.1.1882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1046.033544][ T28] audit: type=1400 audit(1045.950:5869): avc: denied { write } for pid=10271 comm="syz.1.1882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1046.313854][ T28] audit: type=1400 audit(1046.230:5870): avc: denied { create } for pid=10274 comm="syz.0.1883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1046.356701][ T28] audit: type=1400 audit(1046.270:5871): avc: denied { ioctl } for pid=10274 comm="syz.0.1883" path="socket:[21972]" dev="sockfs" ino=21972 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1046.545982][ T28] audit: type=1400 audit(1046.460:5872): avc: denied { bind } for pid=10274 comm="syz.0.1883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1046.633141][ T28] audit: type=1400 audit(1046.550:5873): avc: denied { write } for pid=10274 comm="syz.0.1883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1046.714466][ T28] audit: type=1400 audit(1046.630:5874): avc: denied { write } for pid=10274 comm="syz.0.1883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1051.157036][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 1051.157885][ T28] audit: type=1400 audit(1051.070:5907): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1051.161672][ T28] audit: type=1400 audit(1051.080:5908): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1051.174006][ T28] audit: type=1400 audit(1051.090:5909): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1051.320728][ T28] audit: type=1400 audit(1051.240:5910): avc: denied { create } for pid=10290 comm="syz.1.1890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1051.328247][ T28] audit: type=1400 audit(1051.240:5911): avc: denied { write } for pid=10290 comm="syz.1.1890" path="" dev="sockfs" ino=21997 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1051.335749][ T28] audit: type=1400 audit(1051.250:5912): avc: denied { write } for pid=10290 comm="syz.1.1890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1051.373682][ T28] audit: type=1400 audit(1051.290:5913): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1051.376893][ T28] audit: type=1400 audit(1051.290:5914): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1051.380295][ T28] audit: type=1400 audit(1051.300:5915): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1051.546339][ T28] audit: type=1400 audit(1051.460:5916): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1056.283240][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 1056.284349][ T28] audit: type=1400 audit(1056.200:5975): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1056.290418][ T28] audit: type=1400 audit(1056.210:5976): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1056.295917][ T28] audit: type=1400 audit(1056.210:5977): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1056.562488][ T28] audit: type=1400 audit(1056.480:5978): avc: denied { create } for pid=10314 comm="syz.1.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.570112][ T28] audit: type=1400 audit(1056.480:5979): avc: denied { create } for pid=10314 comm="syz.1.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.603275][ T28] audit: type=1400 audit(1056.520:5980): avc: denied { write } for pid=10314 comm="syz.1.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.606146][ T28] audit: type=1400 audit(1056.520:5981): avc: denied { read } for pid=10314 comm="syz.1.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.650992][ T28] audit: type=1400 audit(1056.570:5982): avc: denied { read } for pid=10314 comm="syz.1.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.791919][ T28] audit: type=1400 audit(1056.710:5983): avc: denied { write } for pid=10314 comm="syz.1.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1056.837121][ T28] audit: type=1400 audit(1056.750:5984): avc: denied { write } for pid=10314 comm="syz.1.1900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1061.516401][ T28] kauditd_printk_skb: 171 callbacks suppressed [ 1061.516912][ T28] audit: type=1400 audit(1061.430:6156): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1061.565499][ T28] audit: type=1400 audit(1061.480:6157): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1061.573256][ T28] audit: type=1400 audit(1061.490:6158): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1061.709676][ T28] audit: type=1400 audit(1061.620:6159): avc: denied { create } for pid=10339 comm="syz.0.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1061.754569][ T28] audit: type=1400 audit(1061.670:6160): avc: denied { ioctl } for pid=10339 comm="syz.0.1905" path="socket:[22049]" dev="sockfs" ino=22049 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1061.954896][ T28] audit: type=1400 audit(1061.870:6161): avc: denied { bind } for pid=10339 comm="syz.0.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1062.130468][ T28] audit: type=1400 audit(1062.050:6162): avc: denied { write } for pid=10339 comm="syz.0.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1062.159875][ T28] audit: type=1400 audit(1062.070:6163): avc: denied { read } for pid=10339 comm="syz.0.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1062.251312][ T28] audit: type=1400 audit(1062.170:6164): avc: denied { create } for pid=10341 comm="syz.1.1906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1062.343121][ T28] audit: type=1400 audit(1062.260:6165): avc: denied { write } for pid=10341 comm="syz.1.1906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1066.566292][ T28] kauditd_printk_skb: 56 callbacks suppressed [ 1066.567775][ T28] audit: type=1400 audit(1066.480:6222): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1066.593212][ T28] audit: type=1400 audit(1066.510:6223): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1066.603033][ T28] audit: type=1400 audit(1066.520:6224): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1067.015405][ T28] audit: type=1400 audit(1066.930:6225): avc: denied { read } for pid=10357 comm="syz.1.1912" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1067.038251][ T28] audit: type=1400 audit(1066.950:6226): avc: denied { read open } for pid=10357 comm="syz.1.1912" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1067.055443][ T28] audit: type=1400 audit(1066.970:6227): avc: denied { ioctl } for pid=10357 comm="syz.1.1912" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1067.377692][ T28] audit: type=1400 audit(1067.290:6228): avc: denied { execmem } for pid=10363 comm="syz.0.1913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1067.521768][ T28] audit: type=1400 audit(1067.440:6229): avc: denied { create } for pid=10363 comm="syz.0.1913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1067.661555][ T28] audit: type=1400 audit(1067.560:6230): avc: denied { write } for pid=10363 comm="syz.0.1913" name="comedi2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1067.662040][ T28] audit: type=1400 audit(1067.570:6231): avc: denied { write open } for pid=10363 comm="syz.0.1913" path="/dev/comedi2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1068.404738][T10367] fuse: Unknown parameter '' [ 1069.590058][T10032] usb 1-1: new low-speed USB device number 19 using dummy_hcd [ 1069.789913][T10032] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1069.807176][T10032] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 16, setting to 8 [ 1069.808021][T10032] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 is Bulk; changing to Interrupt [ 1069.808654][T10032] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 is Bulk; changing to Interrupt [ 1069.809579][T10032] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1072.087200][ T28] kauditd_printk_skb: 81 callbacks suppressed [ 1072.087714][ T28] audit: type=1400 audit(1072.000:6313): avc: denied { create } for pid=10376 comm="syz.1.1917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1072.099306][ T28] audit: type=1400 audit(1072.000:6314): avc: denied { write } for pid=10376 comm="syz.1.1917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1072.169361][ T28] audit: type=1400 audit(1072.050:6315): avc: denied { read } for pid=10376 comm="syz.1.1917" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1072.169796][ T28] audit: type=1400 audit(1072.070:6316): avc: denied { read open } for pid=10376 comm="syz.1.1917" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1072.203752][ T28] audit: type=1400 audit(1072.110:6317): avc: denied { read append } for pid=10376 comm="syz.1.1917" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1072.204297][ T28] audit: type=1400 audit(1072.110:6318): avc: denied { read open } for pid=10376 comm="syz.1.1917" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1072.323821][ T28] audit: type=1400 audit(1072.240:6319): avc: denied { ioctl } for pid=10376 comm="syz.1.1917" path="/dev/loop-control" dev="devtmpfs" ino=633 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1072.422621][ T28] audit: type=1400 audit(1072.340:6320): avc: denied { ioctl } for pid=10376 comm="syz.1.1917" path="/dev/loop-control" dev="devtmpfs" ino=633 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1072.587047][ T28] audit: type=1400 audit(1072.500:6321): avc: denied { create } for pid=10376 comm="syz.1.1917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1072.903013][ T28] audit: type=1400 audit(1072.820:6322): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1074.999726][T10032] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1075.001061][T10032] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1075.002357][T10032] usb 1-1: Product: 瀐旆酤ꋻ頶䭱峛啘 [ 1075.003156][T10032] usb 1-1: Manufacturer: ခ [ 1075.004362][T10032] usb 1-1: SerialNumber: 혩車뚭붭쑻쑒馽敱ﰸ玲ꇔ [ 1075.157351][T10372] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1075.430294][T10032] cdc_ncm 1-1:1.0: bind() failure [ 1075.436115][T10032] cdc_ncm 1-1:1.1: CDC Union missing and no IAD found [ 1075.448608][T10032] cdc_ncm 1-1:1.1: bind() failure [ 1075.454976][T10032] usb 1-1: USB disconnect, device number 19 [ 1077.093581][ T28] kauditd_printk_skb: 71 callbacks suppressed [ 1077.094253][ T28] audit: type=1400 audit(1077.010:6394): avc: denied { ioctl } for pid=10401 comm="syz.0.1921" path="socket:[22137]" dev="sockfs" ino=22137 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1077.163093][ T28] audit: type=1400 audit(1077.080:6395): avc: denied { write } for pid=10401 comm="syz.0.1921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1077.176934][ T28] audit: type=1400 audit(1077.090:6396): avc: denied { write } for pid=10401 comm="syz.0.1921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1077.396406][ T28] audit: type=1400 audit(1077.310:6397): avc: denied { create } for pid=10403 comm="syz.1.1922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1077.425666][ T28] audit: type=1400 audit(1077.340:6398): avc: denied { bind } for pid=10403 comm="syz.1.1922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1077.428363][ T28] audit: type=1400 audit(1077.340:6399): avc: denied { module_request } for pid=10403 comm="syz.1.1922" kmod="crypto-hmac(md5)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1077.532009][ T28] audit: type=1400 audit(1077.450:6400): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1077.534746][ T28] audit: type=1400 audit(1077.450:6401): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1077.633530][ T28] audit: type=1400 audit(1077.450:6402): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1077.663875][ T28] audit: type=1400 audit(1077.580:6403): avc: denied { module_request } for pid=10403 comm="syz.1.1922" kmod="crypto-hmac(md5)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1078.499735][ T43] usb 1-1: new low-speed USB device number 20 using dummy_hcd [ 1078.739914][ T43] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1078.788284][ T43] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 16, setting to 8 [ 1078.789312][ T43] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 is Bulk; changing to Interrupt [ 1078.789513][ T43] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 is Bulk; changing to Interrupt [ 1078.789685][ T43] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1083.923151][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 1083.927131][ T28] audit: type=1400 audit(1083.840:6446): avc: denied { ioctl } for pid=10410 comm="syz.0.1923" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1083.934298][ T28] audit: type=1400 audit(1083.850:6447): avc: denied { ioctl } for pid=10410 comm="syz.0.1923" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1084.031051][ T28] audit: type=1400 audit(1083.920:6448): avc: denied { ioctl } for pid=10410 comm="syz.0.1923" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1084.058005][ T28] audit: type=1400 audit(1083.970:6449): avc: denied { ioctl } for pid=10410 comm="syz.0.1923" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1084.146112][ T28] audit: type=1400 audit(1084.060:6450): avc: denied { ioctl } for pid=10410 comm="syz.0.1923" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1084.239611][ T28] audit: type=1400 audit(1084.150:6451): avc: denied { ioctl } for pid=10410 comm="syz.0.1923" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1088.324191][ T43] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1088.324518][ T43] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1088.324754][ T43] usb 1-1: Product: syz [ 1088.350916][ T43] usb 1-1: can't set config #1, error -71 [ 1088.361915][ T43] usb 1-1: USB disconnect, device number 20 [ 1088.489828][ T28] audit: type=1400 audit(1088.400:6452): avc: denied { create } for pid=10423 comm="syz.1.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1088.491679][ T28] audit: type=1400 audit(1088.400:6453): avc: denied { create } for pid=10423 comm="syz.1.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1088.504860][ T28] audit: type=1400 audit(1088.410:6454): avc: denied { write } for pid=10423 comm="syz.1.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1088.520546][ T28] audit: type=1400 audit(1088.430:6455): avc: denied { write } for pid=10423 comm="syz.1.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1089.053023][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 1089.063386][ T28] audit: type=1400 audit(1088.970:6459): avc: denied { write } for pid=10423 comm="syz.1.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1089.093581][ T28] audit: type=1400 audit(1089.010:6460): avc: denied { create } for pid=10425 comm="syz.0.1924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1089.147554][ T28] audit: type=1400 audit(1089.060:6461): avc: denied { ioctl } for pid=10425 comm="syz.0.1924" path="socket:[22749]" dev="sockfs" ino=22749 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1089.193884][ T28] audit: type=1400 audit(1089.110:6462): avc: denied { bind } for pid=10425 comm="syz.0.1924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1089.213722][ T28] audit: type=1400 audit(1089.130:6463): avc: denied { write } for pid=10425 comm="syz.0.1924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1089.239587][ T28] audit: type=1400 audit(1089.150:6464): avc: denied { read } for pid=10425 comm="syz.0.1924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1089.760816][ T28] audit: type=1400 audit(1089.680:6465): avc: denied { write } for pid=10425 comm="syz.0.1924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1090.994048][ T28] audit: type=1400 audit(1090.910:6466): avc: denied { create } for pid=10423 comm="syz.1.1925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1091.467336][ T28] audit: type=1400 audit(1091.380:6467): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1091.470870][ T28] audit: type=1400 audit(1091.380:6468): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1093.759669][ T41] usb 1-1: new low-speed USB device number 21 using dummy_hcd [ 1094.213308][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 1094.216671][ T28] audit: type=1400 audit(1094.130:6506): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1094.256551][ T28] audit: type=1400 audit(1094.170:6507): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1094.262198][ T28] audit: type=1400 audit(1094.180:6508): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1094.266185][ T28] audit: type=1400 audit(1094.180:6509): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1094.268452][ T41] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1094.270451][ T28] audit: type=1400 audit(1094.180:6510): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1094.304459][ T28] audit: type=1400 audit(1094.220:6511): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1094.308384][ T28] audit: type=1400 audit(1094.220:6512): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1094.343601][ T28] audit: type=1400 audit(1094.260:6513): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1094.358390][ T28] audit: type=1400 audit(1094.270:6514): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1094.359708][ T41] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 16, setting to 8 [ 1094.359960][ T41] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 is Bulk; changing to Interrupt [ 1094.360240][ T41] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 is Bulk; changing to Interrupt [ 1094.360397][ T41] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1094.384497][ T28] audit: type=1400 audit(1094.300:6515): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1099.444389][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 1099.444752][ T28] audit: type=1400 audit(1099.360:6530): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1099.499451][ T28] audit: type=1400 audit(1099.410:6531): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1099.499896][ T28] audit: type=1400 audit(1099.410:6532): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1099.584025][ T28] audit: type=1400 audit(1099.500:6533): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1099.650939][ T28] audit: type=1400 audit(1099.560:6534): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1099.768343][ T28] audit: type=1400 audit(1099.670:6535): avc: denied { ioctl } for pid=10436 comm="syz.0.1928" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1099.832076][ T28] audit: type=1400 audit(1099.750:6536): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1099.834846][ T28] audit: type=1400 audit(1099.750:6537): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1099.847691][ T28] audit: type=1400 audit(1099.760:6538): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1100.607023][ T28] audit: type=1400 audit(1100.520:6539): avc: denied { create } for pid=10444 comm="syz.1.1930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1103.562341][ T41] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1103.562665][ T41] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1103.562958][ T41] usb 1-1: Product: syz [ 1103.600819][ T41] usb 1-1: can't set config #1, error -71 [ 1103.610654][ T41] usb 1-1: USB disconnect, device number 21 [ 1104.534373][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 1104.534634][ T28] audit: type=1400 audit(1104.450:6569): avc: denied { read } for pid=10458 comm="syz.1.1933" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1104.536002][ T28] audit: type=1400 audit(1104.450:6570): avc: denied { read open } for pid=10458 comm="syz.1.1933" path="net:[4026532800]" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1104.542123][ T28] audit: type=1400 audit(1104.460:6571): avc: denied { create } for pid=10458 comm="syz.1.1933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1104.712228][ T28] audit: type=1400 audit(1104.630:6572): avc: denied { write } for pid=10458 comm="syz.1.1933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1104.732046][ T28] audit: type=1400 audit(1104.650:6573): avc: denied { read } for pid=10458 comm="syz.1.1933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1104.751427][ T28] audit: type=1400 audit(1104.670:6574): avc: denied { read } for pid=10458 comm="syz.1.1933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1104.783752][ T28] audit: type=1400 audit(1104.700:6575): avc: denied { read } for pid=10458 comm="syz.1.1933" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1104.794537][ T28] audit: type=1400 audit(1104.710:6576): avc: denied { read open } for pid=10458 comm="syz.1.1933" path="net:[4026532800]" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1104.798402][ T28] audit: type=1400 audit(1104.710:6577): avc: denied { create } for pid=10458 comm="syz.1.1933" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1104.833061][ T28] audit: type=1400 audit(1104.750:6578): avc: denied { create } for pid=10460 comm="syz.0.1934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1108.319697][T10032] usb 1-1: new low-speed USB device number 22 using dummy_hcd [ 1108.603255][T10032] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1108.735721][T10032] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 16, setting to 8 [ 1108.736136][T10032] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 is Bulk; changing to Interrupt [ 1108.736242][T10032] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 is Bulk; changing to Interrupt [ 1108.736312][T10032] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1109.686771][ T28] kauditd_printk_skb: 83 callbacks suppressed [ 1109.687152][ T28] audit: type=1400 audit(1109.600:6662): avc: denied { execmem } for pid=10482 comm="syz.1.1937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1109.916858][ T28] audit: type=1400 audit(1109.830:6663): avc: denied { create } for pid=10482 comm="syz.1.1937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1110.155085][ T28] audit: type=1400 audit(1110.070:6664): avc: denied { write } for pid=10482 comm="syz.1.1937" name="comedi2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1110.181981][ T28] audit: type=1400 audit(1110.100:6665): avc: denied { write open } for pid=10482 comm="syz.1.1937" path="/dev/comedi2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1110.356383][ T28] audit: type=1400 audit(1110.270:6666): avc: denied { read } for pid=10482 comm="syz.1.1937" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1110.434693][ T28] audit: type=1400 audit(1110.350:6667): avc: denied { read open } for pid=10482 comm="syz.1.1937" path="net:[4026532800]" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1110.537111][ T28] audit: type=1400 audit(1110.450:6668): avc: denied { create } for pid=10482 comm="syz.1.1937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1110.617729][ T28] audit: type=1400 audit(1110.530:6669): avc: denied { ioctl } for pid=10482 comm="syz.1.1937" path="/dev/comedi2" dev="devtmpfs" ino=713 ioctlcmd=0x5430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1111.179946][ T28] audit: type=1400 audit(1111.090:6670): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1111.185483][ T28] audit: type=1400 audit(1111.100:6671): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1114.815743][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 1114.817530][ T28] audit: type=1400 audit(1114.730:6705): avc: denied { write } for pid=10488 comm="syz.1.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1114.868570][ T28] audit: type=1400 audit(1114.780:6706): avc: denied { write } for pid=10488 comm="syz.1.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1115.454324][ T28] audit: type=1400 audit(1115.370:6707): avc: denied { write } for pid=10488 comm="syz.1.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1117.022705][ T28] audit: type=1400 audit(1116.940:6708): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1117.029783][ T28] audit: type=1400 audit(1116.940:6709): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1117.087046][ T28] audit: type=1400 audit(1117.000:6710): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1117.956065][T10032] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1117.956426][T10032] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1117.956755][T10032] usb 1-1: Product: syz [ 1117.980577][T10032] usb 1-1: can't set config #1, error -71 [ 1117.987830][T10032] usb 1-1: USB disconnect, device number 22 [ 1118.056259][ T28] audit: type=1400 audit(1117.970:6711): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1118.058409][ T28] audit: type=1400 audit(1117.970:6712): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1118.065442][ T28] audit: type=1400 audit(1117.980:6713): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1118.202298][ T28] audit: type=1400 audit(1118.120:6714): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1119.834391][ T28] kauditd_printk_skb: 44 callbacks suppressed [ 1119.835102][ T28] audit: type=1400 audit(1119.750:6759): avc: denied { write } for pid=10507 comm="syz.0.1945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1119.953572][ T28] audit: type=1400 audit(1119.870:6760): avc: denied { execmem } for pid=10507 comm="syz.0.1945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1119.981669][ T28] audit: type=1400 audit(1119.900:6761): avc: denied { execute } for pid=10507 comm="syz.0.1945" path="/sys/kernel/debug/binder/failed_transaction_log" dev="debugfs" ino=444 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=file permissive=1 [ 1120.012592][ T28] audit: type=1400 audit(1119.930:6762): avc: denied { ioctl } for pid=10507 comm="syz.0.1945" path="socket:[22856]" dev="sockfs" ino=22856 ioctlcmd=0x942a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1120.104092][ T28] audit: type=1400 audit(1120.020:6763): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1120.105547][ T28] audit: type=1400 audit(1120.020:6764): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1120.113059][ T28] audit: type=1400 audit(1120.020:6765): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1120.319709][ T28] audit: type=1400 audit(1120.230:6766): avc: denied { create } for pid=10511 comm="syz.1.1947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1120.383543][ T28] audit: type=1400 audit(1120.300:6767): avc: denied { ioctl } for pid=10511 comm="syz.1.1947" path="socket:[22866]" dev="sockfs" ino=22866 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1120.491689][ T28] audit: type=1400 audit(1120.410:6768): avc: denied { associate } for pid=10511 comm="syz.1.1947" name="pfkey" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1124.918399][ T28] kauditd_printk_skb: 59 callbacks suppressed [ 1124.918665][ T28] audit: type=1400 audit(1124.830:6828): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1124.930214][ T28] audit: type=1400 audit(1124.840:6829): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1124.933021][ T28] audit: type=1400 audit(1124.850:6830): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1125.068127][ T28] audit: type=1400 audit(1124.960:6831): avc: denied { read } for pid=10531 comm="syz.1.1956" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1125.068535][ T28] audit: type=1400 audit(1124.970:6832): avc: denied { read open } for pid=10531 comm="syz.1.1956" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1125.335115][ T28] audit: type=1400 audit(1125.250:6833): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1125.336602][ T28] audit: type=1400 audit(1125.250:6834): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1125.340008][ T28] audit: type=1400 audit(1125.250:6835): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1125.469840][ T28] audit: type=1400 audit(1125.380:6836): avc: denied { create } for pid=10534 comm="syz.1.1958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1125.510417][ T28] audit: type=1400 audit(1125.420:6837): avc: denied { ioctl } for pid=10534 comm="syz.1.1958" path="socket:[22257]" dev="sockfs" ino=22257 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1129.955800][ T28] kauditd_printk_skb: 69 callbacks suppressed [ 1129.963749][ T28] audit: type=1400 audit(1129.870:6907): avc: denied { read } for pid=10551 comm="syz.1.1965" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1130.013778][ T28] audit: type=1400 audit(1129.930:6908): avc: denied { read open } for pid=10551 comm="syz.1.1965" path="net:[4026532800]" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1130.060565][ T28] audit: type=1400 audit(1129.970:6909): avc: denied { create } for pid=10551 comm="syz.1.1965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1130.079734][ T28] audit: type=1400 audit(1129.990:6910): avc: denied { write } for pid=10549 comm="syz.0.1966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1130.464253][ T28] audit: type=1400 audit(1130.380:6911): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1130.466860][ T28] audit: type=1400 audit(1130.380:6912): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1130.477251][ T28] audit: type=1400 audit(1130.390:6913): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1130.645046][ T28] audit: type=1400 audit(1130.560:6914): avc: denied { read } for pid=10553 comm="syz.1.1967" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1130.646749][ T28] audit: type=1400 audit(1130.560:6915): avc: denied { read open } for pid=10553 comm="syz.1.1967" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1130.769400][ T28] audit: type=1400 audit(1130.680:6916): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1135.495157][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 1135.495931][ T28] audit: type=1400 audit(1135.410:6962): avc: denied { read } for pid=10569 comm="syz.0.1974" name="mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1135.587199][ T28] audit: type=1400 audit(1135.500:6963): avc: denied { read open } for pid=10569 comm="syz.0.1974" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1135.643893][ T28] audit: type=1400 audit(1135.560:6964): avc: denied { ioctl } for pid=10569 comm="syz.0.1974" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1135.719759][ T28] audit: type=1400 audit(1135.630:6965): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1135.720379][ T28] audit: type=1400 audit(1135.630:6966): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1135.730297][ T28] audit: type=1400 audit(1135.640:6967): avc: denied { setattr } for pid=10569 comm="syz.0.1974" path="/dev/mixer" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1135.730731][ T28] audit: type=1400 audit(1135.640:6968): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1135.761970][ T28] audit: type=1400 audit(1135.680:6969): avc: denied { ioctl } for pid=10569 comm="syz.0.1974" path="/dev/mixer" dev="devtmpfs" ino=728 ioctlcmd=0x7211 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:sulogin_exec_t:s0" [ 1135.919863][ T28] audit: type=1400 audit(1135.830:6970): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1135.944659][ T28] audit: type=1400 audit(1135.860:6971): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1139.259901][ T5653] usb 2-1: new low-speed USB device number 14 using dummy_hcd [ 1139.777280][ T5653] usb 2-1: unable to get BOS descriptor or descriptor too short [ 1139.790693][ T5653] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 16, setting to 8 [ 1139.792046][ T5653] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x82 is Bulk; changing to Interrupt [ 1139.793092][ T5653] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x3 is Bulk; changing to Interrupt [ 1139.794143][ T5653] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1139.877392][ T5653] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1139.878575][ T5653] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1139.880202][ T5653] usb 2-1: Product: 瀐旆酤ꋻ頶䭱峛啘 [ 1139.881335][ T5653] usb 2-1: Manufacturer: ခ [ 1139.931038][T10582] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 1140.150219][ T5653] cdc_ncm 2-1:1.0: bind() failure [ 1140.154134][ T5653] cdc_ncm 2-1:1.1: CDC Union missing and no IAD found [ 1140.154931][ T5653] cdc_ncm 2-1:1.1: bind() failure [ 1140.162866][ T5653] usb 2-1: USB disconnect, device number 14 [ 1140.590787][ T28] kauditd_printk_skb: 83 callbacks suppressed [ 1140.600008][ T28] audit: type=1400 audit(1140.510:7055): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1140.602101][ T28] audit: type=1400 audit(1140.510:7056): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1140.609984][ T28] audit: type=1400 audit(1140.510:7057): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1140.749988][ T28] audit: type=1400 audit(1140.660:7058): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1140.750482][ T28] audit: type=1400 audit(1140.660:7059): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1140.750928][ T28] audit: type=1400 audit(1140.660:7060): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1140.802533][ T28] audit: type=1400 audit(1140.720:7061): avc: denied { read } for pid=10602 comm="syz.1.1982" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1140.814229][ T28] audit: type=1400 audit(1140.730:7062): avc: denied { read open } for pid=10602 comm="syz.1.1982" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1140.828353][ T28] audit: type=1400 audit(1140.740:7063): avc: denied { ioctl } for pid=10602 comm="syz.1.1982" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1140.859547][ T28] audit: type=1400 audit(1140.770:7064): avc: denied { read } for pid=10602 comm="syz.1.1982" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1140.913112][T10603] syzkaller0: entered promiscuous mode [ 1140.914629][T10603] syzkaller0: entered allmulticast mode [ 1144.814555][T10620] fuse: Bad value for 'group_id' [ 1144.840224][T10620] fuse: Bad value for 'group_id' [ 1146.041041][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 1146.041435][ T28] audit: type=1400 audit(1145.960:7110): avc: denied { read } for pid=10623 comm="syz.1.1989" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1146.092697][ T28] audit: type=1400 audit(1146.010:7111): avc: denied { read open } for pid=10623 comm="syz.1.1989" path="net:[4026532800]" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1146.152369][ T28] audit: type=1400 audit(1146.070:7112): avc: denied { create } for pid=10623 comm="syz.1.1989" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1146.236427][ T28] audit: type=1400 audit(1146.150:7113): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1146.246956][ T28] audit: type=1400 audit(1146.160:7114): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1146.311106][ T28] audit: type=1400 audit(1146.230:7115): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1146.604115][ T28] audit: type=1400 audit(1146.520:7116): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1146.621151][ T28] audit: type=1400 audit(1146.540:7117): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1146.627562][ T28] audit: type=1400 audit(1146.540:7118): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1146.996538][ T28] audit: type=1400 audit(1146.910:7119): avc: denied { read write } for pid=10625 comm="syz.0.1991" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1151.074711][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 1151.084508][ T28] audit: type=1400 audit(1150.990:7162): avc: denied { write } for pid=10640 comm="syz.1.1996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1151.105139][ T28] audit: type=1400 audit(1151.020:7163): avc: denied { write } for pid=10640 comm="syz.1.1996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1151.282588][ T28] audit: type=1400 audit(1151.190:7164): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1151.292084][ T28] audit: type=1400 audit(1151.210:7165): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1151.294379][ T28] audit: type=1400 audit(1151.210:7166): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1151.675108][ T28] audit: type=1400 audit(1151.590:7167): avc: denied { read write } for pid=10642 comm="syz.1.1997" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1151.701778][ T28] audit: type=1400 audit(1151.620:7168): avc: denied { read write open } for pid=10642 comm="syz.1.1997" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1151.722264][ T28] audit: type=1400 audit(1151.640:7169): avc: denied { mounton } for pid=10642 comm="syz.1.1997" path="/393/file0" dev="tmpfs" ino=2076 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1151.755782][ T28] audit: type=1400 audit(1151.670:7170): avc: denied { mount } for pid=10642 comm="syz.1.1997" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1151.782452][ T28] audit: type=1400 audit(1151.700:7171): avc: denied { execmem } for pid=10642 comm="syz.1.1997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1156.134926][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 1156.135537][ T28] audit: type=1400 audit(1156.050:7209): avc: denied { write } for pid=10650 comm="syz.0.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1157.415243][ T28] audit: type=1400 audit(1157.330:7210): avc: denied { read } for pid=10650 comm="syz.0.2000" dev="nsfs" ino=4026532818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1157.459603][ T28] audit: type=1400 audit(1157.370:7211): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1157.460350][ T28] audit: type=1400 audit(1157.380:7212): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1157.466332][ T28] audit: type=1400 audit(1157.380:7213): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1157.500096][ T28] audit: type=1400 audit(1157.410:7214): avc: denied { read open } for pid=10650 comm="syz.0.2000" path="net:[4026532818]" dev="nsfs" ino=4026532818 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1157.609606][ T28] audit: type=1400 audit(1157.520:7215): avc: denied { create } for pid=10659 comm="syz.1.2003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1157.611864][ T28] audit: type=1400 audit(1157.530:7216): avc: denied { bind } for pid=10659 comm="syz.1.2003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1157.618620][ T28] audit: type=1400 audit(1157.530:7217): avc: denied { module_request } for pid=10659 comm="syz.1.2003" kmod="crypto-hmac(md5)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1157.926772][ T28] audit: type=1400 audit(1157.840:7218): avc: denied { create } for pid=10650 comm="syz.0.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1161.272878][ T28] kauditd_printk_skb: 41 callbacks suppressed [ 1161.275155][ T28] audit: type=1400 audit(1161.190:7260): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1161.295532][ T28] audit: type=1400 audit(1161.210:7261): avc: denied { read write open } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1161.307714][ T28] audit: type=1400 audit(1161.220:7262): avc: denied { ioctl } for pid=7793 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1161.473720][ T28] audit: type=1400 audit(1161.390:7263): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1161.498349][ T28] audit: type=1400 audit(1161.410:7264): avc: denied { read write open } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1161.535014][ T28] audit: type=1400 audit(1161.450:7265): avc: denied { ioctl } for pid=7302 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1161.718129][ T28] audit: type=1400 audit(1161.630:7266): avc: denied { create } for pid=10676 comm="syz.1.2008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1161.738499][ T28] audit: type=1400 audit(1161.650:7267): avc: denied { setopt } for pid=10676 comm="syz.1.2008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1161.754405][ T28] audit: type=1400 audit(1161.670:7268): avc: denied { setopt } for pid=10676 comm="syz.1.2008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1162.175391][ T28] audit: type=1400 audit(1162.090:7269): avc: denied { create } for pid=10678 comm="syz.0.2009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1163.750320][ T5653] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 1164.140685][ T5653] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1164.141128][ T5653] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1164.141317][ T5653] usb 2-1: New USB device found, idVendor=054c, idProduct=0df2, bcdDevice=d6.af [ 1164.141370][ T5653] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1164.191199][ T5653] usb 2-1: config 0 descriptor?? [ 1164.728514][ T5653] playstation 0003:054C:0DF2.0002: unknown main item tag 0x0 [ 1164.734898][ T5653] playstation 0003:054C:0DF2.0002: unknown main item tag 0x0 [ 1164.735599][ T5653] playstation 0003:054C:0DF2.0002: unknown main item tag 0x0 [ 1164.735723][ T5653] playstation 0003:054C:0DF2.0002: unknown main item tag 0x0 [ 1164.735827][ T5653] playstation 0003:054C:0DF2.0002: unknown main item tag 0x0 [ 1164.757691][ T5653] playstation 0003:054C:0DF2.0002: hidraw0: USB HID v1.01 Device [HID 054c:0df2] on usb-dummy_hcd.1-1/input0 [ 1164.953022][ T5653] playstation 0003:054C:0DF2.0002: Invalid reportID received, expected 9 got 10 [ 1164.953514][ T5653] playstation 0003:054C:0DF2.0002: Failed to retrieve DualSense pairing info: -22 [ 1164.953627][ T5653] playstation 0003:054C:0DF2.0002: Failed to get MAC address from DualSense [ 1164.953704][ T5653] playstation 0003:054C:0DF2.0002: Failed to create dualsense. [ 1164.995530][ T5653] playstation 0003:054C:0DF2.0002: probe with driver playstation failed with error -22 [ 1165.162605][ T43] usb 2-1: USB disconnect, device number 15 [ 1166.476960][ T28] kauditd_printk_skb: 41 callbacks suppressed [ 1166.477582][ T28] audit: type=1400 audit(1166.390:7311): avc: denied { read write } for pid=10705 comm="syz.1.2013" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.500224][ T28] audit: type=1400 audit(1166.420:7312): avc: denied { read write open } for pid=10705 comm="syz.1.2013" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.513658][ T28] audit: type=1400 audit(1166.430:7313): avc: denied { ioctl } for pid=10705 comm="syz.1.2013" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.574645][ T28] audit: type=1400 audit(1166.490:7314): avc: denied { ioctl } for pid=10705 comm="syz.1.2013" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.597003][ T28] audit: type=1400 audit(1166.510:7315): avc: denied { ioctl } for pid=10705 comm="syz.1.2013" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.600952][ T28] audit: type=1400 audit(1166.520:7316): avc: denied { ioctl } for pid=10705 comm="syz.1.2013" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.649448][ T28] audit: type=1400 audit(1166.560:7317): avc: denied { ioctl } for pid=10705 comm="syz.1.2013" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf61 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.672478][ T28] audit: type=1400 audit(1166.590:7318): avc: denied { ioctl } for pid=10705 comm="syz.1.2013" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf60 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1166.705368][ T28] audit: type=1400 audit(1166.620:7319): avc: denied { create } for pid=10705 comm="syz.1.2013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1166.776187][ T28] audit: type=1400 audit(1166.690:7320): avc: denied { connect } for pid=10705 comm="syz.1.2013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1171.537842][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 1171.538316][ T28] audit: type=1400 audit(1171.450:7340): avc: denied { bpf } for pid=10715 comm="syz.1.2016" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 1171.953968][ T28] audit: type=1400 audit(1171.870:7341): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1172.438327][ T28] audit: type=1400 audit(1172.350:7342): avc: denied { listen } for pid=10717 comm="syz.1.2017" path=000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=0 [ 1172.554161][ T28] audit: type=1400 audit(1172.470:7343): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1173.162793][ T28] audit: type=1400 audit(1173.080:7344): avc: denied { prog_load } for pid=10719 comm="syz.1.2018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1174.086880][ T28] audit: type=1400 audit(1174.000:7345): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1174.269303][ T28] audit: type=1400 audit(1174.170:7346): avc: denied { create } for pid=10743 comm="syz.1.2019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1174.368088][ T28] audit: type=1400 audit(1174.280:7347): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1174.532343][ T28] audit: type=1400 audit(1174.450:7348): avc: denied { create } for pid=10745 comm="syz.1.2020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1174.548413][ T28] audit: type=1400 audit(1174.460:7349): avc: denied { execmem } for pid=10745 comm="syz.1.2020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1177.149389][ T28] audit: type=1400 audit(1177.050:7350): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1177.724227][ T28] audit: type=1400 audit(1177.640:7351): avc: denied { read write } for pid=10748 comm="syz.1.2021" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1177.884677][ T28] audit: type=1400 audit(1177.800:7352): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1178.344156][ T28] audit: type=1400 audit(1178.260:7353): avc: denied { read write } for pid=10750 comm="syz.1.2022" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1178.664958][ T28] audit: type=1400 audit(1178.580:7354): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1179.171487][ T28] audit: type=1400 audit(1179.090:7355): avc: denied { map_create } for pid=10752 comm="syz.1.2023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1179.536435][ T28] audit: type=1400 audit(1179.450:7356): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1179.719998][ T28] audit: type=1400 audit(1179.630:7357): avc: denied { read } for pid=10754 comm="syz.1.2024" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1179.919380][ T28] audit: type=1400 audit(1179.830:7358): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1180.192040][ T28] audit: type=1400 audit(1180.110:7359): avc: denied { create } for pid=10756 comm="syz.1.2025" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 1182.287227][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 1182.289891][ T28] audit: type=1400 audit(1182.200:7367): avc: denied { read write } for pid=10764 comm="syz.1.2029" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1182.332539][ T28] audit: type=1400 audit(1182.250:7368): avc: denied { create } for pid=10764 comm="syz.1.2029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1182.643517][ T28] audit: type=1400 audit(1182.560:7369): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1183.442126][ T28] audit: type=1400 audit(1183.360:7370): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1184.472354][ T28] audit: type=1400 audit(1184.390:7371): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1185.528669][ T28] audit: type=1400 audit(1185.440:7372): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1186.972665][ T28] audit: type=1400 audit(1186.890:7373): avc: denied { read write } for pid=10774 comm="syz.1.2033" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1187.294596][ T28] audit: type=1400 audit(1187.210:7374): avc: denied { create } for pid=10774 comm="syz.1.2033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 1187.533304][ T28] audit: type=1400 audit(1187.450:7375): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1188.906312][ T28] audit: type=1400 audit(1188.820:7376): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1189.459761][ T28] audit: type=1400 audit(1189.360:7377): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1190.529527][ T28] audit: type=1400 audit(1190.440:7378): avc: denied { map_create } for pid=10778 comm="syz.0.2035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1190.762598][ T28] audit: type=1400 audit(1190.680:7379): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1190.956243][ T28] audit: type=1400 audit(1190.870:7380): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1191.414729][ T28] audit: type=1400 audit(1191.330:7381): avc: denied { create } for pid=10784 comm="syz.0.2038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1191.423560][ T28] audit: type=1400 audit(1191.340:7382): avc: denied { read } for pid=10784 comm="syz.0.2038" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1191.446113][ T28] audit: type=1400 audit(1191.360:7383): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1192.421848][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 1192.422234][ T28] audit: type=1400 audit(1192.340:7390): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1193.102534][ T28] audit: type=1400 audit(1193.020:7391): avc: denied { create } for pid=10790 comm="syz.1.2041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 1193.237408][ T28] audit: type=1400 audit(1193.150:7392): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1193.654549][ T28] audit: type=1400 audit(1193.570:7393): avc: denied { prog_load } for pid=10793 comm="syz.1.2042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1194.010751][ T28] audit: type=1400 audit(1193.930:7394): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1194.451801][ T28] audit: type=1400 audit(1194.370:7395): avc: denied { create } for pid=10795 comm="syz.1.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1194.656707][ T28] audit: type=1400 audit(1194.570:7396): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1195.147328][ T28] audit: type=1400 audit(1195.060:7397): avc: denied { create } for pid=10797 comm="syz.1.2044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1195.189905][ T28] audit: type=1400 audit(1195.080:7398): avc: denied { write } for pid=10797 comm="syz.1.2044" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1195.440163][ T28] audit: type=1400 audit(1195.350:7399): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1197.501960][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 1197.507322][ T28] audit: type=1400 audit(1197.420:7404): avc: denied { sys_module } for pid=10803 comm="syz.1.2047" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1197.538099][ T28] audit: type=1400 audit(1197.450:7405): avc: denied { map_create } for pid=10803 comm="syz.1.2047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1197.781854][ T28] audit: type=1400 audit(1197.700:7406): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1198.014278][ T28] audit: type=1400 audit(1197.930:7407): avc: denied { read write } for pid=10805 comm="syz.1.2048" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1198.204432][ T28] audit: type=1400 audit(1198.120:7408): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1198.794381][ T28] audit: type=1400 audit(1198.710:7409): avc: denied { read write } for pid=10807 comm="syz.1.2049" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1198.833581][ T28] audit: type=1400 audit(1198.750:7410): avc: denied { create } for pid=10807 comm="syz.1.2049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1198.842351][ T28] audit: type=1400 audit(1198.760:7411): avc: denied { read write } for pid=10807 comm="syz.1.2049" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1198.909425][ T28] audit: type=1400 audit(1198.820:7412): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1199.112287][ T28] audit: type=1400 audit(1199.030:7413): avc: denied { read append } for pid=10809 comm="syz.1.2050" name="001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1202.552940][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 1202.556746][ T28] audit: type=1400 audit(1202.470:7420): avc: denied { read } for pid=10819 comm="syz.1.2055" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1202.591717][ T28] audit: type=1400 audit(1202.510:7421): avc: denied { module_request } for pid=10819 comm="syz.1.2055" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1202.606962][ T28] audit: type=1400 audit(1202.520:7422): avc: denied { sys_module } for pid=10819 comm="syz.1.2055" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1202.815973][ T28] audit: type=1400 audit(1202.730:7423): avc: denied { module_request } for pid=10819 comm="syz.1.2055" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1202.819694][ T28] audit: type=1400 audit(1202.730:7424): avc: denied { sys_module } for pid=10819 comm="syz.1.2055" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1202.900930][ T28] audit: type=1400 audit(1202.820:7425): avc: denied { module_request } for pid=10819 comm="syz.1.2055" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1202.905321][ T28] audit: type=1400 audit(1202.820:7426): avc: denied { sys_module } for pid=10819 comm="syz.1.2055" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1203.049627][ T28] audit: type=1400 audit(1202.950:7427): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1203.329700][ T28] audit: type=1400 audit(1203.240:7428): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1203.434485][T10822] binfmt_misc: register: failed to install interpreter file ./file0 [ 1203.434600][ T28] audit: type=1400 audit(1203.350:7429): avc: denied { execute } for pid=10821 comm="syz.1.2056" name="file0" dev="tmpfs" ino=2340 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 1207.571565][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 1207.572059][ T28] audit: type=1400 audit(1207.490:7446): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1207.625298][ T28] audit: type=1400 audit(1207.540:7447): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1208.043134][ T28] audit: type=1400 audit(1207.960:7448): avc: denied { read write } for pid=10844 comm="syz.0.2068" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1208.142527][ T28] audit: type=1400 audit(1208.060:7449): avc: denied { create } for pid=10846 comm="syz.1.2067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1208.173202][ T28] audit: type=1400 audit(1208.090:7450): avc: denied { read } for pid=10846 comm="syz.1.2067" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1208.250487][ T28] audit: type=1400 audit(1208.160:7451): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1208.347599][ T28] audit: type=1400 audit(1208.260:7452): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1208.459515][ T28] audit: type=1400 audit(1208.370:7453): avc: denied { read } for pid=10848 comm="syz.1.2070" dev="nsfs" ino=4026532800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1208.466892][ T28] audit: type=1400 audit(1208.380:7454): avc: denied { create } for pid=10848 comm="syz.1.2070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1208.557279][ T28] audit: type=1400 audit(1208.450:7455): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1208.848054][T10851] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2071'. [ 1208.873778][T10851] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2071'. [ 1213.653663][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 1213.654179][ T28] audit: type=1400 audit(1213.570:7473): avc: denied { map_create } for pid=10868 comm="syz.1.2078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1213.697446][ T28] audit: type=1400 audit(1213.610:7474): avc: denied { map_create } for pid=10868 comm="syz.1.2078" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1214.693817][ T28] audit: type=1400 audit(1214.610:7475): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1215.900516][ T28] audit: type=1400 audit(1215.810:7476): avc: denied { mounton } for pid=10870 comm="syz.1.2079" path="/459/file0" dev="tmpfs" ino=2413 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1216.279477][ T28] audit: type=1400 audit(1216.190:7477): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1217.622316][T10873] futex_wake_op: syz.1.2080 tries to shift op by 144; fix this program [ 1217.905112][ T28] audit: type=1400 audit(1217.820:7478): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1218.094050][ T28] audit: type=1400 audit(1218.010:7479): avc: denied { read write } for pid=10874 comm="syz.1.2081" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1218.173959][ T28] audit: type=1400 audit(1218.090:7480): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1218.331804][ T28] audit: type=1400 audit(1218.250:7481): avc: denied { read write } for pid=10876 comm="syz.1.2082" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1218.390934][ T28] audit: type=1400 audit(1218.310:7482): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1218.715470][ T28] audit: type=1326 audit(1218.630:7483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10878 comm="syz.1.2083" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 1218.717195][ T28] audit: type=1326 audit(1218.630:7484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10878 comm="syz.1.2083" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 1218.730444][ T28] audit: type=1326 audit(1218.640:7485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10878 comm="syz.1.2083" exe="/syz-executor" sig=0 arch=40000028 syscall=182 compat=0 ip=0x130300 code=0x7ffc0000 [ 1218.755431][ T28] audit: type=1326 audit(1218.670:7486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10878 comm="syz.1.2083" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 1218.761295][ T28] audit: type=1326 audit(1218.670:7487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10878 comm="syz.1.2083" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x130300 code=0x7ffc0000 [ 1219.039635][ T28] audit: type=1400 audit(1218.950:7488): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1219.852924][ T28] audit: type=1400 audit(1219.770:7489): avc: denied { execmem } for pid=10880 comm="syz.1.2084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1234.860568][ T28] audit: type=1400 audit(1234.770:7490): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1235.426567][ T28] audit: type=1400 audit(1235.340:7491): avc: denied { create } for pid=10883 comm="syz.1.2085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1235.457278][ T28] audit: type=1400 audit(1235.370:7492): avc: denied { create } for pid=10883 comm="syz.1.2085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1235.504441][ T28] audit: type=1400 audit(1235.420:7493): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1235.654397][ T28] audit: type=1400 audit(1235.570:7494): avc: denied { read } for pid=10885 comm="syz.1.2086" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 1235.713165][ T28] audit: type=1400 audit(1235.630:7495): avc: denied { read } for pid=10885 comm="syz.1.2086" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 1235.785171][ T28] audit: type=1400 audit(1235.700:7496): avc: denied { read write } for pid=10885 comm="syz.1.2086" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 1236.067297][ T28] audit: type=1400 audit(1235.980:7497): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1236.607135][ T28] audit: type=1400 audit(1236.520:7498): avc: denied { prog_load } for pid=10887 comm="syz.1.2087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1236.627727][ T28] audit: type=1400 audit(1236.540:7499): avc: denied { map_create } for pid=10887 comm="syz.1.2087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1240.285960][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 1240.286449][ T28] audit: type=1400 audit(1240.200:7501): avc: denied { prog_load } for pid=10889 comm="syz.1.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1240.384013][ T28] audit: type=1400 audit(1240.300:7502): avc: denied { create } for pid=10889 comm="syz.1.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1240.446860][ T28] audit: type=1400 audit(1240.350:7503): avc: denied { create } for pid=10889 comm="syz.1.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=0 [ 1240.571867][ T28] audit: type=1400 audit(1240.490:7504): avc: denied { create } for pid=10889 comm="syz.1.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1240.698574][ T28] audit: type=1400 audit(1240.610:7505): avc: denied { create } for pid=10889 comm="syz.1.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1240.922734][ T28] audit: type=1400 audit(1240.840:7506): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1241.443011][ T28] audit: type=1400 audit(1241.360:7507): avc: denied { create } for pid=10893 comm="syz.0.2089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1241.473787][ T28] audit: type=1400 audit(1241.390:7508): avc: denied { create } for pid=10893 comm="syz.0.2089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1241.909910][ T28] audit: type=1400 audit(1241.820:7509): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1242.231638][ T28] audit: type=1400 audit(1242.140:7510): avc: denied { read write } for pid=10895 comm="syz.0.2090" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1246.487091][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 1246.487757][ T28] audit: type=1400 audit(1246.400:7515): avc: denied { mount } for pid=10899 comm="syz.0.2092" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 1247.364255][ T28] audit: type=1400 audit(1247.280:7516): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1247.958567][ T28] audit: type=1400 audit(1247.870:7517): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1248.482453][ T28] audit: type=1400 audit(1248.400:7518): avc: denied { create } for pid=10904 comm="syz.0.2094" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 1248.696753][ T28] audit: type=1400 audit(1248.610:7519): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1250.273260][ T28] audit: type=1400 audit(1250.190:7520): avc: denied { write } for pid=10906 comm="syz.0.2095" name="ptype" dev="proc" ino=4026532838 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 1250.501109][ T28] audit: type=1400 audit(1250.420:7521): avc: denied { map_create } for pid=10906 comm="syz.0.2095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1250.564396][ T28] audit: type=1400 audit(1250.480:7522): avc: denied { prog_load } for pid=10906 comm="syz.0.2095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1250.609608][ T28] audit: type=1400 audit(1250.520:7523): avc: denied { map_create } for pid=10906 comm="syz.0.2095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1250.652014][ T28] audit: type=1400 audit(1250.570:7524): avc: denied { prog_load } for pid=10906 comm="syz.0.2095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1250.783941][T10909] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2095'. [ 1252.028321][ T9751] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1252.031038][ T9751] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1252.033093][ T9751] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1252.039605][ T9751] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1253.712317][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 1253.717670][ T28] audit: type=1400 audit(1253.630:7526): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1253.970480][ T28] audit: type=1400 audit(1253.890:7527): avc: denied { read } for pid=10910 comm="syz.1.2096" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1254.277116][ T28] audit: type=1400 audit(1254.190:7528): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1254.645123][ T28] audit: type=1400 audit(1254.560:7529): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1255.072072][ T28] audit: type=1400 audit(1254.990:7530): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1255.303893][ T28] audit: type=1400 audit(1255.220:7531): avc: denied { execmem } for pid=10916 comm="syz.1.2099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1256.103001][T10918] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 1256.109885][T10918] syz.1.2099: vmalloc error: size 536870912, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 1256.180633][T10918] CPU: 1 UID: 0 PID: 10918 Comm: syz.1.2099 Tainted: G L syzkaller #0 PREEMPT [ 1256.180789][T10918] Tainted: [L]=SOFTLOCKUP [ 1256.180816][T10918] Hardware name: ARM-Versatile Express [ 1256.180844][T10918] Call trace: [ 1256.180892][T10918] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1256.181010][T10918] r7:600c0013 r6:600c0013 r5:8231bf50 r4:00000000 [ 1256.181033][T10918] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 1256.181096][T10918] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 1256.181196][T10918] r7:00000000 r6:8233801c r5:84d53d40 r4:00000000 [ 1256.181222][T10918] [<8021e334>] (dump_stack) from [<8051dbbc>] (warn_alloc+0xe0/0x188) [ 1256.181284][T10918] [<8051dadc>] (warn_alloc) from [<8050b2ac>] (__vmalloc_node_range_noprof+0xc8/0x6a4) [ 1256.181341][T10918] r3:20000000 r2:8233801c [ 1256.181370][T10918] r7:82338054 r6:00000001 r5:df800000 r4:20000000 [ 1256.181439][T10918] [<8050b1e4>] (__vmalloc_node_range_noprof) from [<8052dbd0>] (__kvmalloc_node_noprof+0x328/0x57c) [ 1256.181523][T10918] r10:000029c0 r9:817b8554 r8:ffffffff r7:84d53d40 r6:dfb79d50 r5:00000400 [ 1256.181578][T10918] r4:20000000 [ 1256.181603][T10918] [<8052d8a8>] (__kvmalloc_node_noprof) from [<817b8554>] (xt_alloc_entry_offsets+0x28/0x34) [ 1256.181685][T10918] r10:85d87c00 r9:dfb79d58 r8:85e49000 r7:00000000 r6:dfb79d50 r5:85d87c40 [ 1256.181717][T10918] r4:08000000 [ 1256.181737][T10918] [<817b852c>] (xt_alloc_entry_offsets) from [<81948510>] (translate_table+0x74/0x764) [ 1256.181845][T10918] [<8194849c>] (translate_table) from [<819496d8>] (do_replace+0xf4/0x5f0) [ 1256.181949][T10918] r10:00000000 r9:20000520 r8:85e49000 r7:85d87c40 r6:dfb79d50 r5:00000350 [ 1256.181986][T10918] r4:85d87c00 [ 1256.182005][T10918] [<819495e4>] (do_replace) from [<81949d08>] (do_ip6t_set_ctl+0x134/0x29c) [ 1256.182070][T10918] r10:00000126 r9:84d53d40 r8:000003b0 r7:8353c040 r6:dfb79e00 r5:00000040 [ 1256.182097][T10918] r4:84d2ce40 [ 1256.182114][T10918] [<81949bd4>] (do_ip6t_set_ctl) from [<8173fb6c>] (nf_setsockopt+0x54/0x70) [ 1256.182195][T10918] r10:00000126 r9:84d53d40 r8:000003b0 r7:8353c040 r6:00000040 r5:81949bd4 [ 1256.182273][T10918] r4:82bf2ffc [ 1256.182296][T10918] [<8173fb1c>] (nf_setsockopt) from [<819001dc>] (ipv6_setsockopt+0x9c/0xbc) [ 1256.182386][T10918] r6:000003b0 r5:84d2ce40 r4:00000040 [ 1256.182414][T10918] [<81900144>] (ipv6_setsockopt) from [<8190605c>] (udpv6_setsockopt+0x30/0x5c) [ 1256.182477][T10918] r6:00000040 r5:00000029 r4:8190602c [ 1256.182499][T10918] [<81906030>] (udpv6_setsockopt) from [<815e1548>] (sock_common_setsockopt+0x38/0x40) [ 1256.182560][T10918] [<815e1514>] (sock_common_setsockopt) from [<815dca38>] (do_sock_setsockopt+0x70/0xc8) [ 1256.182718][T10918] r4:815e1510 [ 1256.182741][T10918] [<815dc9c8>] (do_sock_setsockopt) from [<815e0800>] (__sys_setsockopt+0x7c/0xc4) [ 1256.182816][T10918] r8:00000000 r7:862c3c80 r6:862c3c81 r5:00000040 r4:00000029 [ 1256.182841][T10918] [<815e0784>] (__sys_setsockopt) from [<815e0864>] (sys_setsockopt+0x1c/0x24) [ 1256.182919][T10918] r8:8020029c r7:00000126 r6:003463b8 r5:00000000 r4:000003b0 [ 1256.182949][T10918] [<815e0848>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1256.183044][T10918] Exception stack(0xdfb79fa8 to 0xdfb79ff0) [ 1256.183092][T10918] 9fa0: 000003b0 00000000 00000006 00000029 00000040 200004c0 [ 1256.183135][T10918] 9fc0: 000003b0 00000000 003463b8 00000126 00346378 00000000 00000001 76f370dc [ 1256.183172][T10918] 9fe0: 76f36e88 76f36e78 00018bc4 00130300 [ 1256.197289][T10918] Mem-Info: [ 1256.197733][T10918] active_anon:2236 inactive_anon:0 isolated_anon:0 [ 1256.197733][T10918] active_file:6126 inactive_file:35767 isolated_file:0 [ 1256.197733][T10918] unevictable:768 dirty:7 writeback:0 [ 1256.197733][T10918] slab_reclaimable:1240 slab_unreclaimable:7143 [ 1256.197733][T10918] mapped:3049 shmem:783 pagetables:407 [ 1256.197733][T10918] sec_pagetables:0 bounce:0 [ 1256.197733][T10918] kernel_misc_reclaimable:0 [ 1256.197733][T10918] free:430654 free_pcp:1118 free_cma:4032 [ 1256.198205][T10918] Node 0 active_anon:8944kB inactive_anon:0kB active_file:24504kB inactive_file:143068kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:12196kB dirty:28kB writeback:0kB shmem:3132kB kernel_stack:1480kB pagetables:1628kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB gpu_active:0kB gpu_reclaim:0kB [ 1256.198681][T10918] Normal free:1366780kB boost:0kB min:4768kB low:6188kB high:7608kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:2540kB unevictable:0kB writepending:4kB zspages:0kB present:1556480kB managed:1424840kB mlocked:0kB bounce:0kB free_pcp:4472kB local_pcp:2808kB free_cma:0kB [ 1256.222777][T10918] lowmem_reserve[]: 0 4224 4224 [ 1256.224466][T10918] Normal: 3*4kB (UME) 2*8kB (UM) 2*16kB (UE) 2*32kB (UE) 6*64kB (U) 26*128kB (UE) 6*256kB (UM) 7*512kB (UM) 4*1024kB (M) 5*2048kB (UME) 328*4096kB (UM) = 1366780kB [ 1256.313350][T10918] 42676 total pagecache pages [ 1256.327006][T10918] 0 pages in swap cache [ 1256.328100][T10918] Free swap = 124996kB [ 1256.335043][T10918] Total swap = 124996kB [ 1256.336334][T10918] 524288 pages RAM [ 1256.355494][T10918] 135168 pages HighMem/MovableOnly [ 1256.366947][T10918] 32910 pages reserved [ 1256.368172][T10918] 4096 pages cma reserved [ 1265.457994][ T28] audit: type=1400 audit(1265.370:7532): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1265.715442][ T28] audit: type=1400 audit(1265.630:7533): avc: denied { create } for pid=10919 comm="syz.1.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1265.747161][ T28] audit: type=1400 audit(1265.660:7534): avc: denied { create } for pid=10919 comm="syz.1.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1266.151296][ T28] audit: type=1400 audit(1266.070:7535): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1266.523414][ T28] audit: type=1400 audit(1266.440:7536): avc: denied { create } for pid=10921 comm="syz.1.2101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1266.637201][ T28] audit: type=1400 audit(1266.540:7537): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1266.923172][ T28] audit: type=1400 audit(1266.840:7538): avc: denied { read write } for pid=10923 comm="syz.1.2102" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1266.973448][ T28] audit: type=1400 audit(1266.890:7539): avc: denied { mounton } for pid=10923 comm="syz.1.2102" path="/475/file0" dev="tmpfs" ino=2495 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1267.287522][ T28] audit: type=1400 audit(1267.200:7540): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1267.454718][ T28] audit: type=1400 audit(1267.370:7541): avc: denied { read write } for pid=10925 comm="syz.1.2103" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1270.777624][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 1270.780650][ T28] audit: type=1400 audit(1270.690:7556): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1271.215499][ T28] audit: type=1400 audit(1271.130:7557): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1271.424903][ T28] audit: type=1400 audit(1271.340:7558): avc: denied { read write } for pid=10944 comm="syz.1.2112" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1271.769794][ T28] audit: type=1400 audit(1271.670:7559): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1272.047137][ T28] audit: type=1400 audit(1271.940:7560): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1272.236667][ T28] audit: type=1400 audit(1272.150:7561): avc: denied { create } for pid=10947 comm="syz.0.2114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 1272.295731][ T28] audit: type=1400 audit(1272.210:7562): avc: denied { create } for pid=10946 comm="syz.1.2113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 1272.331843][ T28] audit: type=1400 audit(1272.250:7563): avc: denied { read write } for pid=10946 comm="syz.1.2113" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1272.509552][ T28] audit: type=1400 audit(1272.420:7564): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1272.662630][ T28] audit: type=1400 audit(1272.580:7565): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1290.143436][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 1290.151514][ T28] audit: type=1400 audit(1290.060:7578): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1290.573045][ T28] audit: type=1400 audit(1290.490:7579): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1290.642248][ T28] audit: type=1400 audit(1290.560:7580): avc: denied { name_bind } for pid=10963 comm="syz.1.2120" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 1290.967133][ T28] audit: type=1400 audit(1290.880:7581): avc: denied { read write } for pid=10965 comm="syz.0.2121" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1291.496512][ T28] audit: type=1400 audit(1291.410:7582): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1293.207209][ T28] audit: type=1400 audit(1293.120:7583): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1293.791615][ T28] audit: type=1400 audit(1293.710:7584): avc: denied { read write } for pid=7302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1293.870714][ T28] audit: type=1400 audit(1293.790:7585): avc: denied { read write } for pid=10969 comm="syz.1.2123" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1293.912662][ T28] audit: type=1400 audit(1293.830:7586): avc: denied { read write } for pid=10969 comm="syz.1.2123" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1294.186884][ T28] audit: type=1400 audit(1294.100:7587): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1295.267421][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 1295.267836][ T28] audit: type=1400 audit(1295.180:7593): avc: denied { map_create } for pid=10975 comm="syz.0.2126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1295.312786][ T28] audit: type=1400 audit(1295.230:7594): avc: denied { map_create } for pid=10975 comm="syz.0.2126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1295.320148][ T28] audit: type=1400 audit(1295.230:7595): avc: denied { prog_load } for pid=10975 comm="syz.0.2126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1295.650110][ T28] audit: type=1400 audit(1295.560:7596): avc: denied { map_create } for pid=10977 comm="syz.1.2127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1307.950849][ T28] audit: type=1400 audit(1307.870:7597): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1308.870855][ T28] audit: type=1400 audit(1308.790:7598): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1309.424486][ T28] audit: type=1400 audit(1309.340:7599): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1309.916318][ T28] audit: type=1400 audit(1309.830:7600): avc: denied { read write } for pid=10985 comm="syz.1.2130" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1310.200506][ T28] audit: type=1400 audit(1310.100:7601): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1310.559418][ T28] audit: type=1400 audit(1310.460:7602): avc: denied { read } for pid=10987 comm="syz.1.2131" name="event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1310.647208][ T28] audit: type=1400 audit(1310.560:7603): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1311.135902][ T28] audit: type=1400 audit(1311.050:7604): avc: denied { read write } for pid=10989 comm="syz.1.2132" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1311.187980][ T28] audit: type=1400 audit(1311.100:7605): avc: denied { read write } for pid=10989 comm="syz.1.2132" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1311.188357][ T28] audit: type=1400 audit(1311.100:7606): avc: denied { name_bind } for pid=10989 comm="syz.1.2132" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 1313.758761][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 1313.759558][ T28] audit: type=1400 audit(1313.670:7612): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1314.333887][ T28] audit: type=1400 audit(1314.250:7613): avc: denied { read } for pid=10999 comm="syz.1.2137" name="usbmon0" dev="devtmpfs" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1314.570227][ T28] audit: type=1400 audit(1314.460:7614): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1315.035072][ T28] audit: type=1400 audit(1314.950:7615): avc: denied { read write } for pid=11001 comm="syz.1.2138" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1315.157314][ T28] audit: type=1400 audit(1315.070:7616): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1315.507465][ T28] audit: type=1400 audit(1315.420:7617): avc: denied { create } for pid=11003 comm="syz.1.2139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1315.586585][ T28] audit: type=1400 audit(1315.500:7618): avc: denied { map_create } for pid=11003 comm="syz.1.2139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1315.679564][ T28] audit: type=1400 audit(1315.590:7619): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1316.045924][ T28] audit: type=1400 audit(1315.960:7620): avc: denied { mounton } for pid=11005 comm="syz.1.2140" path="/505/bus" dev="tmpfs" ino=2648 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 1316.364882][ T28] audit: type=1400 audit(1316.280:7621): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1318.905573][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 1318.910258][ T28] audit: type=1400 audit(1574.811:7625): avc: denied { map_create } for pid=11012 comm="syz.1.2143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1318.987554][ T28] audit: type=1400 audit(1574.891:7626): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1319.113608][ T28] audit: type=1400 audit(1575.021:7627): avc: denied { create } for pid=11014 comm="syz.1.2144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1319.180915][ T28] audit: type=1400 audit(1575.091:7628): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1319.581279][ T28] audit: type=1400 audit(1575.491:7629): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1320.832733][ T28] audit: type=1400 audit(1576.741:7630): avc: denied { create } for pid=11018 comm="syz.1.2146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1321.220596][ T28] audit: type=1400 audit(1577.121:7631): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1321.412036][ T28] audit: type=1400 audit(1577.321:7632): avc: denied { create } for pid=11021 comm="syz.1.2147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1321.461289][ T28] audit: type=1400 audit(1577.371:7633): avc: denied { create } for pid=11021 comm="syz.1.2147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1321.809722][ T28] audit: type=1400 audit(1577.711:7634): avc: denied { read write } for pid=7793 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1326.311922][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 1326.321833][ T28] audit: type=1400 audit(1582.221:7642): avc: denied { execute } for pid=11030 comm="syz.1.2151" path="/516/memory.events.local" dev="tmpfs" ino=2704 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 1326.931163][T11033] ------------[ cut here ]------------ [ 1326.931710][T11033] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#0: syz.1.2151/11033 [ 1326.934712][T11033] Modules linked in: [ 1326.935783][T11033] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1326.936364][T11033] CPU: 0 UID: 0 PID: 11033 Comm: syz.1.2151 Tainted: G L syzkaller #0 PREEMPT [ 1326.936819][T11033] Tainted: [L]=SOFTLOCKUP [ 1326.937068][T11033] Hardware name: ARM-Versatile Express [ 1326.937336][T11033] Call trace: [ 1326.937528][T11033] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1326.937991][T11033] r7:82a1e6fc r6:00000000 r5:8231bf50 r4:00000001 [ 1326.938290][T11033] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 1326.938687][T11033] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 1326.939407][T11033] r7:82a1e6fc r6:00000000 r5:839de200 r4:82c7bd3c [ 1326.940108][T11033] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 1326.940647][T11033] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 1326.941295][T11033] r7:80265f80 [ 1326.941449][T11033] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 1326.941842][T11033] r3:82a0b544 r2:00000001 r1:82302a38 r0:8230a318 [ 1326.942097][T11033] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 1326.942441][T11033] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 1326.942795][T11033] r8:00000009 r7:8230b514 r6:e0371ebc r5:839de200 r4:00000000 [ 1326.943090][T11033] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 1326.943522][T11033] r10:839de8f4 r9:00000000 r8:e0371f68 r7:839dead0 r6:00000080 r5:839de200 [ 1326.943854][T11033] r4:839de200 [ 1326.944071][T11033] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 1326.944434][T11033] r8:e0371f68 r7:839dead0 r6:83151a40 r5:839de200 r4:841855c0 [ 1326.944758][T11033] [<802572f8>] (do_exit) from [<80257f68>] (do_group_exit+0x0/0x8c) [ 1326.945150][T11033] r7:00000001 [ 1326.945335][T11033] [<80257f50>] (sys_exit) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1326.945685][T11033] Exception stack(0xe0371fa8 to 0xe0371ff0) [ 1326.945955][T11033] 1fa0: 00000000 00000000 00000000 00000000 00000000 00000000 [ 1326.946325][T11033] 1fc0: 00000000 00000000 00000000 00000001 00346378 00000000 003d0f00 76f370dc [ 1326.946700][T11033] 1fe0: 76f36e60 76f36e50 00018f14 00130300 [ 1326.949178][T11033] Rebooting in 86400 seconds..