last executing test programs: 3m35.897297397s ago: executing program 0 (id=2940): socket$nl_route(0x10, 0x3, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x1) r1 = syz_io_uring_setup(0x66e, &(0x7f0000000240)={0x0, 0x0, 0x10100, 0x0, 0x2e9}, &(0x7f0000000380)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r1, 0x567, 0x0, 0x0, 0x0, 0x0) 3m34.748410493s ago: executing program 0 (id=2941): mkdirat(0xffffffffffffff9c, 0x0, 0x0) syz_usb_connect(0x0, 0x24, &(0x7f0000000180)=ANY=[@ANYBLOB="120100009e173610ef171e7206de01020303090212000101000000090400000002"], 0x0) 3m33.44748776s ago: executing program 0 (id=2942): mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x200000b, 0x204031, 0xffffffffffffffff, 0xffffd000) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x200000000000014f, 0xfffffffffffffc9e, &(0x7f0000001680)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x19, 0x10, 0x8, 0x2, 0x0}}, 0x10) 3m16.065656614s ago: executing program 0 (id=2943): socketpair$unix(0x1, 0x5ee99a5d3961586, 0x0, 0x0) 3m15.886399456s ago: executing program 0 (id=2944): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1802000080100000000000000400000085000000b500000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) 3m15.577842767s ago: executing program 0 (id=2945): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3180, 0x8000, 0x400244}, &(0x7f0000000340)=0x0, &(0x7f00000006c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0xc}) io_uring_enter(r3, 0x4c6e, 0xc67a, 0x8, 0x0, 0x0) io_uring_enter(r3, 0x627, 0x4c1, 0x43, 0x0, 0x0) 2m30.115741807s ago: executing program 32 (id=2945): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3180, 0x8000, 0x400244}, &(0x7f0000000340)=0x0, &(0x7f00000006c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0xc}) io_uring_enter(r3, 0x4c6e, 0xc67a, 0x8, 0x0, 0x0) io_uring_enter(r3, 0x627, 0x4c1, 0x43, 0x0, 0x0) 18.684230999s ago: executing program 2 (id=3033): r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fsopen(0x0, 0x1) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000140)="f8", 0x1, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) recvfrom(r0, 0x0, 0x0, 0x43, 0x0, 0x0) 18.366708319s ago: executing program 2 (id=3034): r0 = getpgrp(0x0) r1 = syz_pidfd_open(r0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) fremovexattr(r1, &(0x7f0000000280)=@known='trusted.overlay.nlink\x00') 18.085667068s ago: executing program 2 (id=3036): socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000100)={0x1, "ff0f000000000000f5a72d866b0000000000f0ffdefe00"}) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r2 = openat$dma_heap(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$igmp(0x2, 0x3, 0x2) ioctl$DMA_HEAP_IOCTL_ALLOC(r2, 0xc0184800, &(0x7f0000000100)={0x1, r1}) ioctl$DMA_BUF_SET_NAME_A(r3, 0x40086203, &(0x7f00000001c0)='\x02\x00\x00\x00\x05\x00\x00\x00-control\x00') write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz0\x00', {0x3, 0x2, 0x6, 0xfffa}, 0x3a, [0x8000, 0xc95a, 0xf, 0x8, 0x80, 0x2, 0x7, 0x7f, 0xa9, 0x4d, 0x6, 0x5f, 0x9, 0x15, 0xffff2d37, 0xff7fff01, 0x6, 0x5, 0x7, 0x5, 0x6, 0x0, 0x7, 0x3c5b, 0x1, 0x20, 0xd, 0x1, 0x0, 0xffffffff, 0xe661, 0x6, 0x7, 0x5, 0x8, 0x4c74, 0x10000, 0x7, 0x3, 0xe, 0x0, 0x80008071, 0x7, 0x17, 0x1, 0x7, 0x5, 0x3e, 0x18e, 0x6, 0x6, 0x0, 0x8, 0x4, 0x8, 0x3ff, 0x80, 0x0, 0x5, 0x6, 0x8, 0x4, 0x1, 0x40], [0x10000007, 0x9, 0x8000012f, 0x8004, 0x5, 0xfffffff3, 0x129432f6, 0xc8, 0xf1, 0xe, 0x2bf, 0x6c7, 0x9, 0xfffffffc, 0x3, 0x0, 0x0, 0x5, 0x2f, 0xe, 0x312, 0x66abcbd2, 0xea4, 0x0, 0x4, 0x1007, 0x7fff, 0x6, 0x400, 0x401, 0x6, 0x1, 0xff, 0x7, 0x1000005, 0x5f31, 0xd, 0x4e0, 0x381, 0x4, 0xb, 0x4, 0x9, 0x8, 0x40, 0x6, 0x47, 0x8000, 0x1, 0xfe000000, 0xffff, 0x2, 0x4, 0x200009, 0x3, 0x3, 0x4000009, 0x6, 0x0, 0x3, 0xbc45, 0x48c93690, 0x42, 0x3], [0x7, 0x408, 0x3ff, 0x5, 0xfffffffd, 0x100, 0x4, 0x9, 0x5, 0x7fff, 0x0, 0x5, 0xb, 0x4, 0x5, 0x5, 0x0, 0x1ef, 0x5, 0x8, 0x86, 0x3, 0x303c, 0x3e7, 0xb, 0x5, 0x2, 0x2, 0x3, 0x20000008, 0x4, 0x6d01, 0x6, 0x38, 0x200, 0x1fd, 0x80, 0x3, 0x4, 0x2950bfaf, 0x1000, 0xa2, 0x4, 0xa9, 0x5, 0x6, 0xac8, 0xbf, 0x2, 0x3, 0x7ff, 0x12b, 0x4, 0x1, 0xa, 0xffffffff, 0x5, 0x1c, 0x120000, 0x7ff, 0x2006, 0x80a2ed, 0x4, 0x25], [0x9, 0xbb33, 0x7, 0xb, 0x5, 0x938, 0x6, 0x6, 0x0, 0xb9, 0xce4, 0x1ff, 0x2, 0x57, 0x5, 0x3, 0x2, 0x10000, 0x4, 0x7fff, 0xfffc, 0xa620, 0x1, 0x5, 0x801, 0x2000002, 0x150, 0x60a7, 0x6, 0x16, 0xffffffff, 0x80000000, 0x5, 0x5, 0xc8, 0x1, 0xfffff000, 0x10000, 0x3, 0x7e, 0x9, 0x9622, 0x7, 0xaf, 0x20000008, 0x5, 0x517, 0x2, 0x5, 0x0, 0x30b1d693, 0xa1f, 0xf40, 0x7, 0x530e, 0x6c1b, 0x0, 0x4, 0x5, 0x7ff, 0xd7, 0x200, 0xb, 0xfff]}, 0x45c) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) 17.700281944s ago: executing program 2 (id=3038): mmap$binder(&(0x7f00000f1000/0x2000)=nil, 0x2000, 0x1, 0x11, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x804e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) io_pgetevents(0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat(0xffffffffffffff9c, 0x0, 0x0) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f00000004c0)) 15.384670358s ago: executing program 1 (id=3040): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf09"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r0 = syz_open_dev$loop(&(0x7f0000000100), 0x2, 0x2001) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000040), 0xe09) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r1, 0x0, {0x2a00, 0x80010000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x14, 0x1c, "fee8a2ab78fc979fd1e00d96072000001ea89de2b7fb0000e60080b8785d960001000000000000000000007efff100004000", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c527d3d458dd4992861ac00", "f4bd000000801900", [0x8, 0xffffffff9673e35d]}}) 13.649403243s ago: executing program 1 (id=3041): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x6, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x94) 12.733575334s ago: executing program 1 (id=3042): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x0, 0xea60}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f00000005c0)=0x400000001, 0x4) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000280)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0x5, @remote, 0x3}, 0x1c) sendmmsg(r0, &(0x7f00000082c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000890) shutdown(r0, 0x0) 11.624637468s ago: executing program 1 (id=3043): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x100) setresuid(0x0, 0xee00, 0x0) capset(&(0x7f0000000500)={0x20080522}, &(0x7f0000000200)={0x200002, 0x200003, 0x801, 0x4, 0x7}) utimes(&(0x7f0000000000)='./file0\x00', 0x0) 10.319794134s ago: executing program 1 (id=3044): r0 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000540)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [0x2, 0x0, 0x3, 0x6c4ba42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffe, 0xcd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0xfffffffffffffffb, 0x0, 0x2, 0x0, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x100, 0x80003, 0x0, 0x0, 0x0, 0x200, 0x0, 0x40000000000, 0x801, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1000000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x4, 0xfffffffffffffffe, 0x0, 0x8000000000000001, 0x0, 0x0, 0x80, 0x2004, 0x0, 0x4000000000, 0x0, 0x3, 0x0, 0xfffffffd]}) 9.499222339s ago: executing program 1 (id=3045): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), r3) sendmsg$BATADV_CMD_GET_DAT_CACHE(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="030302000000040000000600000008000300", @ANYRES32=r4], 0x1c}}, 0x0) 417.752142ms ago: executing program 2 (id=3046): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x6, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00'}, 0x94) 0s ago: executing program 2 (id=3047): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x4f26, 0x0, 0x2, 0x401, 0x1, 0xcc7, 0xffffffff, 0x5c952399, 0x5, 0x403, 0x802, 0x7, 0x1, 0x0, 0x705, 0xe1cb, 0x8006, 0x4, 0x4, 0x395, 0x80001089, 0xfffffffd, 0x0, 0xfffffff5, 0xffffeadb, 0x3, 0x40003e, 0x8, 0x10000, 0x8000000, 0x2]}) kernel console output (not intermixed with test programs): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2025.899360][ T29] audit: type=1400 audit(2000525082.340:23056): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2026.048940][ T29] audit: type=1400 audit(2000525082.490:23057): avc: denied { module_request } for pid=14513 comm="syz.0.2856" kmod="fs-afs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2026.217899][ T29] audit: type=1400 audit(2000525082.660:23058): avc: denied { module_request } for pid=14513 comm="syz.0.2856" kmod="fs-afs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2026.578327][ T29] audit: type=1400 audit(2000525083.020:23059): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2026.585158][ T29] audit: type=1400 audit(2000525083.020:23060): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2026.590490][ T29] audit: type=1400 audit(2000525083.030:23061): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2026.802532][ T29] audit: type=1400 audit(2000525083.240:23062): avc: denied { name_bind } for pid=14517 comm="syz.0.2857" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2026.815009][ T29] audit: type=1400 audit(2000525083.260:23063): avc: denied { node_bind } for pid=14517 comm="syz.0.2857" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2027.628830][ T29] audit: type=1400 audit(2000525084.070:23064): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2027.636325][ T29] audit: type=1400 audit(2000525084.080:23065): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2027.641420][ T29] audit: type=1400 audit(2000525084.080:23066): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2027.873158][ T29] audit: type=1400 audit(2000525084.310:23067): avc: denied { name_bind } for pid=14520 comm="syz.0.2858" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2027.880801][ T29] audit: type=1400 audit(2000525084.320:23068): avc: denied { node_bind } for pid=14520 comm="syz.0.2858" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2030.253254][T14532] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2861'. [ 2030.259560][T14532] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2861'. [ 2031.956089][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 2031.957340][ T29] audit: type=1400 audit(2000525088.390:23113): avc: denied { read write } for pid=14537 comm="syz.0.2864" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2031.974886][ T29] audit: type=1400 audit(2000525088.410:23114): avc: denied { read write open } for pid=14537 comm="syz.0.2864" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2032.133486][ T29] audit: type=1400 audit(2000525088.570:23115): avc: denied { ioctl } for pid=14537 comm="syz.0.2864" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2032.139373][ T29] audit: type=1400 audit(2000525088.590:23116): avc: denied { ioctl } for pid=14537 comm="syz.0.2864" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2032.255780][ T29] audit: type=1400 audit(2000525088.690:23117): avc: denied { ioctl } for pid=14537 comm="syz.0.2864" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2032.348305][ T29] audit: type=1400 audit(2000525088.790:23118): avc: denied { ioctl } for pid=14537 comm="syz.0.2864" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2032.351193][ T29] audit: type=1400 audit(2000525088.790:23119): avc: denied { ioctl } for pid=14537 comm="syz.0.2864" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2032.385175][ T9756] usb 1-1: new high-speed USB device number 62 using dummy_hcd [ 2032.420686][ T29] audit: type=1400 audit(2000525088.860:23120): avc: denied { ioctl } for pid=14537 comm="syz.0.2864" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2032.423212][ T29] audit: type=1400 audit(2000525088.860:23121): avc: denied { ioctl } for pid=14537 comm="syz.0.2864" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2032.440574][ T29] audit: type=1400 audit(2000525088.890:23122): avc: denied { ioctl } for pid=14537 comm="syz.0.2864" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2032.585851][ T9756] usb 1-1: Using ep0 maxpacket: 8 [ 2032.649372][ T9756] usb 1-1: config 0 has an invalid interface number: 84 but max is 0 [ 2032.650312][ T9756] usb 1-1: config 0 has no interface number 0 [ 2032.651288][ T9756] usb 1-1: config 0 interface 84 altsetting 246 has an endpoint descriptor with address 0xFA, changing to 0x8A [ 2032.653244][ T9756] usb 1-1: config 0 interface 84 altsetting 246 endpoint 0x9 has invalid maxpacket 1024, setting to 64 [ 2032.653292][ T9756] usb 1-1: config 0 interface 84 altsetting 246 has an endpoint descriptor with address 0xC8, changing to 0x88 [ 2032.653389][ T9756] usb 1-1: config 0 interface 84 altsetting 246 endpoint 0xE has invalid wMaxPacketSize 0 [ 2032.653414][ T9756] usb 1-1: config 0 interface 84 has no altsetting 0 [ 2032.875896][ T9756] usb 1-1: New USB device found, idVendor=0867, idProduct=9812, bcdDevice=46.08 [ 2032.876688][ T9756] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2032.877212][ T9756] usb 1-1: Product: syz [ 2032.878069][ T9756] usb 1-1: Manufacturer: syz [ 2032.878469][ T9756] usb 1-1: SerialNumber: syz [ 2032.986184][ T9756] usb 1-1: config 0 descriptor?? [ 2033.368342][ T9756] comedi comedi5: Endpoint has wrong direction [ 2033.369280][ T9756] dt9812 1-1:0.84: driver 'dt9812' failed to auto-configure device. [ 2033.414832][ T9756] usb 1-1: USB disconnect, device number 62 [ 2035.295151][ T3701] usb 1-1: new high-speed USB device number 63 using dummy_hcd [ 2035.475406][ T3701] usb 1-1: Using ep0 maxpacket: 32 [ 2035.708217][ T3701] usb 1-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=26.3f [ 2035.709558][ T3701] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2035.710644][ T3701] usb 1-1: Product: syz [ 2035.711614][ T3701] usb 1-1: Manufacturer: syz [ 2035.712389][ T3701] usb 1-1: SerialNumber: syz [ 2035.736931][ T3701] usb 1-1: config 0 descriptor?? [ 2039.569914][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 2039.573657][ T29] audit: type=1400 audit(2000525096.010:23183): avc: denied { ioctl } for pid=14555 comm="syz.0.2866" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2039.893008][ T29] audit: type=1400 audit(2000525096.330:23184): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2039.915903][ T29] audit: type=1400 audit(2000525096.350:23185): avc: denied { read write open } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2039.920217][ T29] audit: type=1400 audit(2000525096.360:23186): avc: denied { ioctl } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2040.150208][ T29] audit: type=1400 audit(2000525096.590:23187): avc: denied { create } for pid=14564 comm="syz.1.2867" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2040.176799][ T29] audit: type=1400 audit(2000525096.620:23188): avc: denied { ioctl } for pid=14564 comm="syz.1.2867" path="socket:[30111]" dev="sockfs" ino=30111 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2040.299836][ T29] audit: type=1400 audit(2000525096.740:23189): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2040.303498][ T29] audit: type=1400 audit(2000525096.740:23190): avc: denied { read write open } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2040.319069][ T29] audit: type=1400 audit(2000525096.760:23191): avc: denied { ioctl } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2040.670459][ T29] audit: type=1400 audit(2000525097.110:23192): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2045.544294][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 2045.546618][ T29] audit: type=1400 audit(2000525101.980:23219): avc: denied { allowed } for pid=14578 comm="syz.1.2871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2045.713714][ T29] audit: type=1400 audit(2000525102.150:23220): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2045.725805][ T29] audit: type=1400 audit(2000525102.160:23221): avc: denied { read write open } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2045.746498][ T29] audit: type=1400 audit(2000525102.190:23222): avc: denied { ioctl } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2045.949785][ T29] audit: type=1400 audit(2000525102.390:23223): avc: denied { read } for pid=14581 comm="syz.1.2872" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2045.968773][ T29] audit: type=1400 audit(2000525102.410:23224): avc: denied { read open } for pid=14581 comm="syz.1.2872" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2045.988391][T14582] binder: 14581:14582 ioctl 400c620e 20000080 returned -22 [ 2045.989285][ T29] audit: type=1400 audit(2000525102.420:23225): avc: denied { ioctl } for pid=14581 comm="syz.1.2872" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2046.072912][ T9348] usb 1-1: USB disconnect, device number 63 [ 2046.147884][ T29] audit: type=1400 audit(2000525102.580:23226): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2046.148317][ T29] audit: type=1400 audit(2000525102.580:23227): avc: denied { read write open } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2046.148407][ T29] audit: type=1400 audit(2000525102.580:23228): avc: denied { ioctl } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2050.550358][ T29] kauditd_printk_skb: 373 callbacks suppressed [ 2050.564795][ T29] audit: type=1400 audit(2000525106.990:23602): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2050.565181][ T29] audit: type=1400 audit(2000525107.000:23603): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2050.565253][ T29] audit: type=1400 audit(2000525107.000:23604): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2051.052060][ T29] audit: type=1400 audit(2000525107.490:23605): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2051.061325][ T29] audit: type=1400 audit(2000525107.510:23606): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2051.074190][ T29] audit: type=1400 audit(2000525107.510:23607): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2053.275697][ T29] audit: type=1400 audit(2000525109.710:23608): avc: denied { read } for pid=14600 comm="syz.1.2876" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2053.282962][ T29] audit: type=1400 audit(2000525109.720:23609): avc: denied { read open } for pid=14600 comm="syz.1.2876" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2053.509306][ T29] audit: type=1400 audit(2000525109.950:23610): avc: denied { ioctl } for pid=14600 comm="syz.1.2876" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2053.837912][ T29] audit: type=1400 audit(2000525110.240:23611): avc: denied { read } for pid=14608 comm="syz.0.2880" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2061.955288][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 2061.955731][ T29] audit: type=1400 audit(2000525118.390:23618): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2061.970173][ T29] audit: type=1400 audit(2000525118.410:23619): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2061.983713][ T29] audit: type=1400 audit(2000525118.420:23620): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2062.395398][ T29] audit: type=1400 audit(2000525118.830:23621): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2062.396970][ T29] audit: type=1400 audit(2000525118.840:23622): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2062.401033][ T29] audit: type=1400 audit(2000525118.840:23623): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2062.781739][ T29] audit: type=1400 audit(2000525119.220:23624): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2062.787169][ T29] audit: type=1400 audit(2000525119.230:23625): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2062.805183][ T29] audit: type=1400 audit(2000525119.240:23626): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2062.928786][ T29] audit: type=1400 audit(2000525119.370:23627): avc: denied { map_create } for pid=14618 comm="syz.0.2883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2071.302662][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 2071.303579][ T29] audit: type=1400 audit(2000525127.740:23678): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2071.402277][ T29] audit: type=1400 audit(2000525127.850:23679): avc: denied { read write open } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2071.465103][ T29] audit: type=1400 audit(2000525127.900:23680): avc: denied { ioctl } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2071.728692][ T29] audit: type=1400 audit(2000525128.170:23681): avc: denied { create } for pid=14639 comm="syz.1.2890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2071.741125][ T29] audit: type=1400 audit(2000525128.180:23682): avc: denied { bind } for pid=14639 comm="syz.1.2890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2073.880648][ T29] audit: type=1400 audit(2000525130.320:23683): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2073.889507][ T29] audit: type=1400 audit(2000525130.330:23684): avc: denied { read write open } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2073.892632][ T29] audit: type=1400 audit(2000525130.330:23685): avc: denied { ioctl } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2074.185127][ T29] audit: type=1400 audit(2000525130.620:23686): avc: denied { create } for pid=14642 comm="syz.1.2891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2074.247692][ T29] audit: type=1400 audit(2000525130.690:23687): avc: denied { allowed } for pid=14642 comm="syz.1.2891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2077.657197][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 2077.658282][ T29] audit: type=1400 audit(2000525134.100:23697): avc: denied { prog_load } for pid=14644 comm="syz.1.2892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2077.660063][ T29] audit: type=1400 audit(2000525134.100:23698): avc: denied { bpf } for pid=14644 comm="syz.1.2892" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2077.692057][ T29] audit: type=1400 audit(2000525134.130:23699): avc: denied { read write } for pid=14644 comm="syz.1.2892" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2077.723103][ T29] audit: type=1400 audit(2000525134.160:23700): avc: denied { read write open } for pid=14644 comm="syz.1.2892" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2081.216119][ T29] audit: type=1400 audit(2000525137.660:23701): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2081.218766][ T29] audit: type=1400 audit(2000525137.660:23702): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2081.223697][ T29] audit: type=1400 audit(2000525137.660:23703): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2081.553793][ T29] audit: type=1400 audit(2000525137.990:23704): avc: denied { create } for pid=14648 comm="syz.0.2893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2081.578870][ T29] audit: type=1400 audit(2000525138.020:23705): avc: denied { read } for pid=14648 comm="syz.0.2893" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2081.581831][ T29] audit: type=1400 audit(2000525138.020:23706): avc: denied { read open } for pid=14648 comm="syz.0.2893" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2084.122604][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 2084.123893][ T29] audit: type=1400 audit(2000525140.560:23716): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2084.160991][ T29] audit: type=1400 audit(2000525140.600:23717): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2084.165596][ T29] audit: type=1400 audit(2000525140.600:23718): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2084.482898][ T29] audit: type=1400 audit(2000525140.920:23719): avc: denied { create } for pid=14651 comm="syz.0.2894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2084.498697][ T29] audit: type=1400 audit(2000525140.940:23720): avc: denied { bind } for pid=14651 comm="syz.0.2894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2084.509536][ T29] audit: type=1400 audit(2000525140.950:23721): avc: denied { setopt } for pid=14651 comm="syz.0.2894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2084.516738][ T29] audit: type=1400 audit(2000525140.960:23722): avc: denied { accept } for pid=14651 comm="syz.0.2894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2084.520838][ T29] audit: type=1400 audit(2000525140.960:23723): avc: denied { write } for pid=14651 comm="syz.0.2894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2084.524028][ T29] audit: type=1400 audit(2000525140.960:23724): avc: denied { read } for pid=14651 comm="syz.0.2894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2086.720937][ T29] audit: type=1400 audit(2000525143.170:23725): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2087.575062][ T9756] usb 1-1: new high-speed USB device number 64 using dummy_hcd [ 2087.725889][ T9756] usb 1-1: Using ep0 maxpacket: 16 [ 2087.780525][ T9756] usb 1-1: config 0 has an invalid interface number: 41 but max is 0 [ 2087.781687][ T9756] usb 1-1: config 0 has no interface number 0 [ 2087.782689][ T9756] usb 1-1: config 0 interface 41 altsetting 2 bulk endpoint 0x4 has invalid maxpacket 16 [ 2087.783698][ T9756] usb 1-1: config 0 interface 41 altsetting 2 bulk endpoint 0x82 has invalid maxpacket 64 [ 2087.785532][ T9756] usb 1-1: config 0 interface 41 has no altsetting 0 [ 2087.877236][ T9756] usb 1-1: New USB device found, idVendor=0fe6, idProduct=9800, bcdDevice=d1.9a [ 2087.878342][ T9756] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2087.879342][ T9756] usb 1-1: Product: syz [ 2087.880058][ T9756] usb 1-1: Manufacturer: syz [ 2087.880760][ T9756] usb 1-1: SerialNumber: syz [ 2087.910434][ T9756] usb 1-1: config 0 descriptor?? [ 2087.951394][T14656] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2087.961670][T14656] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2088.203962][T14656] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2088.209428][T14656] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2088.873434][ T9756] CoreChips 1-1:0.41 (unnamed net_device) (uninitialized): sr_get_phy_addr : Error reading PHYID register:ffffffb9 [ 2088.877610][ T9756] CoreChips 1-1:0.41: probe with driver CoreChips failed with error -71 [ 2088.898516][ T9756] usb 1-1: USB disconnect, device number 64 [ 2089.305205][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 2089.306494][ T29] audit: type=1400 audit(2000525145.740:23775): avc: denied { create } for pid=14669 comm="syz.0.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2089.316892][ T29] audit: type=1400 audit(2000525145.760:23776): avc: denied { read } for pid=14669 comm="syz.0.2897" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2089.319644][ T29] audit: type=1400 audit(2000525145.760:23777): avc: denied { read open } for pid=14669 comm="syz.0.2897" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2089.336442][ T29] audit: type=1400 audit(2000525145.780:23778): avc: denied { create } for pid=14669 comm="syz.0.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2089.362184][ T29] audit: type=1400 audit(2000525145.790:23779): avc: denied { bind } for pid=14669 comm="syz.0.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2089.373038][ T29] audit: type=1400 audit(2000525145.810:23780): avc: denied { listen } for pid=14669 comm="syz.0.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2089.398456][ T29] audit: type=1400 audit(2000525145.840:23781): avc: denied { accept } for pid=14669 comm="syz.0.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2089.903292][ T29] audit: type=1400 audit(2000525146.340:23782): avc: denied { map_create } for pid=14669 comm="syz.0.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2089.911173][ T29] audit: type=1400 audit(2000525146.360:23783): avc: denied { map_read map_write } for pid=14669 comm="syz.0.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2089.926382][ T29] audit: type=1400 audit(2000525146.370:23784): avc: denied { create } for pid=14669 comm="syz.0.2897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2094.735430][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 2094.736743][ T29] audit: type=1400 audit(2000525151.170:23828): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2094.789260][ T29] audit: type=1400 audit(2000525151.230:23829): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2094.791452][ T29] audit: type=1400 audit(2000525151.230:23830): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2104.045956][ T29] audit: type=1400 audit(2000525160.480:23831): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2104.053255][ T29] audit: type=1400 audit(2000525160.490:23832): avc: denied { read write open } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2104.060638][ T29] audit: type=1400 audit(2000525160.510:23833): avc: denied { ioctl } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2104.288614][ T29] audit: type=1400 audit(2000525160.730:23834): avc: denied { create } for pid=14691 comm="syz.1.2901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2104.302504][ T29] audit: type=1400 audit(2000525160.740:23835): avc: denied { setopt } for pid=14691 comm="syz.1.2901" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2104.313839][ T29] audit: type=1400 audit(2000525160.760:23836): avc: denied { setopt } for pid=14691 comm="syz.1.2901" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2104.410444][ T29] audit: type=1400 audit(2000525160.840:23837): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2104.412693][ T29] audit: type=1400 audit(2000525160.840:23838): avc: denied { read write open } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2104.415948][ T29] audit: type=1400 audit(2000525160.840:23839): avc: denied { ioctl } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2104.636444][ T29] audit: type=1400 audit(2000525161.080:23840): avc: denied { create } for pid=14693 comm="syz.1.2902" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2110.434918][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 2110.435717][ T29] audit: type=1400 audit(2000525166.870:23882): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2110.437279][ T29] audit: type=1400 audit(2000525166.870:23883): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2110.438411][ T29] audit: type=1400 audit(2000525166.870:23884): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2110.660175][ T29] audit: type=1400 audit(2000525167.100:23885): avc: denied { prog_load } for pid=14709 comm="syz.0.2906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2110.666456][ T29] audit: type=1400 audit(2000525167.110:23886): avc: denied { bpf } for pid=14709 comm="syz.0.2906" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2110.675000][ T29] audit: type=1400 audit(2000525167.110:23887): avc: denied { create } for pid=14709 comm="syz.0.2906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2110.730235][ T29] audit: type=1400 audit(2000525167.170:23888): avc: denied { setopt } for pid=14709 comm="syz.0.2906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2110.741876][ T29] audit: type=1400 audit(2000525167.180:23889): avc: denied { create } for pid=14709 comm="syz.0.2906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2110.775231][ T29] audit: type=1400 audit(2000525167.210:23890): avc: denied { write } for pid=14709 comm="syz.0.2906" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2110.972757][ T29] audit: type=1400 audit(2000525167.410:23891): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2117.147325][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 2117.148510][ T29] audit: type=1400 audit(2000525173.590:23918): avc: denied { read } for pid=14722 comm="syz.0.2911" name="audio" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2117.158113][ T29] audit: type=1400 audit(2000525173.600:23919): avc: denied { read open } for pid=14722 comm="syz.0.2911" path="/dev/audio" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2117.180173][ T29] audit: type=1400 audit(2000525173.620:23920): avc: denied { ioctl } for pid=14722 comm="syz.0.2911" path="/dev/audio" dev="devtmpfs" ino=728 ioctlcmd=0x4dff scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2122.948851][ T29] audit: type=1400 audit(2000525179.390:23921): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2122.951311][ T29] audit: type=1400 audit(2000525179.390:23922): avc: denied { read write open } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2122.986587][ T29] audit: type=1400 audit(2000525179.440:23923): avc: denied { ioctl } for pid=9374 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2123.501121][ T29] audit: type=1400 audit(2000525179.940:23924): avc: denied { allowed } for pid=14726 comm="syz.1.2912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2123.522136][ T29] audit: type=1400 audit(2000525179.960:23925): avc: denied { create } for pid=14726 comm="syz.1.2912" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2123.528754][ T29] audit: type=1400 audit(2000525179.970:23926): avc: denied { map } for pid=14726 comm="syz.1.2912" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=30284 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2123.548291][ T29] audit: type=1400 audit(2000525179.990:23927): avc: denied { read write } for pid=14726 comm="syz.1.2912" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=30284 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2123.551074][ T29] audit: type=1400 audit(2000525179.990:23928): avc: denied { map } for pid=14726 comm="syz.1.2912" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=30284 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2123.573087][ T29] audit: type=1400 audit(2000525180.010:23929): avc: denied { read write } for pid=14726 comm="syz.1.2912" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=30284 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2123.743664][ T29] audit: type=1400 audit(2000525180.180:23930): avc: denied { read write } for pid=9374 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2125.751081][T14734] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2915'. [ 2125.805908][T14734] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2915'. [ 2127.961075][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 2127.964081][ T29] audit: type=1400 audit(2000525184.400:23993): avc: denied { connect } for pid=14750 comm="syz.0.2921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2127.979350][ T29] audit: type=1400 audit(2000525184.420:23994): avc: denied { execmem } for pid=14750 comm="syz.0.2921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2129.341143][ T29] audit: type=1400 audit(2000525185.780:23995): avc: denied { map_create } for pid=14752 comm="syz.1.2922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2129.382659][ T29] audit: type=1400 audit(2000525185.820:23996): avc: denied { map_read map_write } for pid=14752 comm="syz.1.2922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2130.638348][ T29] audit: type=1400 audit(2000525187.080:23997): avc: denied { write } for pid=14750 comm="syz.0.2921" path="socket:[30315]" dev="sockfs" ino=30315 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2130.659709][ T29] audit: type=1400 audit(2000525187.100:23998): avc: denied { write } for pid=14750 comm="syz.0.2921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2136.715315][ T29] audit: type=1400 audit(2000525193.160:23999): avc: denied { write } for pid=14759 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2136.717512][ T29] audit: type=1400 audit(2000525193.160:24000): avc: denied { write open } for pid=14759 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2136.765593][ T29] audit: type=1400 audit(2000525193.210:24001): avc: denied { search } for pid=14759 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2136.768013][ T29] audit: type=1400 audit(2000525193.210:24002): avc: denied { search } for pid=14759 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2136.770052][ T29] audit: type=1400 audit(2000525193.210:24003): avc: denied { search } for pid=14759 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2136.771876][ T29] audit: type=1400 audit(2000525193.210:24004): avc: denied { search } for pid=14759 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2136.894214][ T29] audit: type=1400 audit(2000525193.330:24005): avc: denied { search } for pid=14760 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2136.895667][ T29] audit: type=1400 audit(2000525193.330:24006): avc: denied { search } for pid=14760 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2136.895755][ T29] audit: type=1400 audit(2000525193.330:24007): avc: denied { search } for pid=14760 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2136.909363][ T29] audit: type=1400 audit(2000525193.360:24008): avc: denied { read open } for pid=14760 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2141.726945][ T29] kauditd_printk_skb: 167 callbacks suppressed [ 2141.732982][ T29] audit: type=1400 audit(2000525198.150:24176): avc: denied { read open } for pid=14774 comm="syz.0.2926" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2141.753888][ T29] audit: type=1400 audit(2000525198.190:24177): avc: denied { ioctl } for pid=14774 comm="syz.0.2926" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2141.837369][ T29] audit: type=1400 audit(2000525198.280:24178): avc: denied { module_request } for pid=14774 comm="syz.0.2926" kmod="net-pf-10-proto-0-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2142.585245][ T29] audit: type=1400 audit(2000525199.020:24179): avc: denied { module_request } for pid=14774 comm="syz.0.2926" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2143.788678][ T29] audit: type=1400 audit(2000525200.230:24180): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2143.796388][ T29] audit: type=1400 audit(2000525200.240:24181): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2143.800398][ T29] audit: type=1400 audit(2000525200.240:24182): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2144.434963][ T29] audit: type=1400 audit(2000525200.870:24183): avc: denied { create } for pid=14783 comm="syz.0.2927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2149.215763][ T29] audit: type=1400 audit(2000525205.660:24184): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2149.219460][ T29] audit: type=1400 audit(2000525205.660:24185): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2149.228895][ T29] audit: type=1400 audit(2000525205.670:24186): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2150.118889][ T29] audit: type=1400 audit(2000525206.560:24187): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2150.122490][ T29] audit: type=1400 audit(2000525206.560:24188): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2150.152735][ T29] audit: type=1400 audit(2000525206.590:24189): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2150.725103][ T29] audit: type=1400 audit(2000525207.160:24190): avc: denied { create } for pid=14791 comm="syz.0.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2150.758358][ T29] audit: type=1400 audit(2000525207.200:24191): avc: denied { create } for pid=14791 comm="syz.0.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2150.795899][ T29] audit: type=1400 audit(2000525207.240:24192): avc: denied { setopt } for pid=14791 comm="syz.0.2929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2150.903638][ T29] audit: type=1400 audit(2000525207.340:24193): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2151.246806][T14794] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2930'. [ 2161.455357][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 2161.456784][ T29] audit: type=1400 audit(2000525217.890:24209): avc: denied { map_create } for pid=14814 comm="syz.1.2937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2161.480914][ T29] audit: type=1400 audit(2000525217.920:24210): avc: denied { map_read map_write } for pid=14814 comm="syz.1.2937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2161.498376][ T29] audit: type=1400 audit(2000525217.940:24211): avc: denied { prog_load } for pid=14814 comm="syz.1.2937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2161.500973][ T29] audit: type=1400 audit(2000525217.940:24212): avc: denied { bpf } for pid=14814 comm="syz.1.2937" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2161.512895][ T29] audit: type=1400 audit(2000525217.950:24213): avc: denied { perfmon } for pid=14814 comm="syz.1.2937" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2161.515921][ T29] audit: type=1400 audit(2000525217.950:24214): avc: denied { perfmon } for pid=14814 comm="syz.1.2937" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2161.538172][ T29] audit: type=1400 audit(2000525217.980:24215): avc: denied { perfmon } for pid=14814 comm="syz.1.2937" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2161.540206][ T29] audit: type=1400 audit(2000525217.980:24216): avc: denied { perfmon } for pid=14814 comm="syz.1.2937" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2161.568820][ T29] audit: type=1400 audit(2000525218.010:24217): avc: denied { bpf } for pid=14814 comm="syz.1.2937" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2161.575208][ T29] audit: type=1400 audit(2000525218.010:24218): avc: denied { bpf } for pid=14814 comm="syz.1.2937" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2166.857818][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 2166.858805][ T29] audit: type=1400 audit(2000525223.300:24232): avc: denied { prog_load } for pid=14818 comm="syz.1.2939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2166.894320][ T29] audit: type=1400 audit(2000525223.330:24233): avc: denied { bpf } for pid=14818 comm="syz.1.2939" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2167.291696][ T29] audit: type=1400 audit(2000525223.730:24234): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2167.294286][ T29] audit: type=1400 audit(2000525223.730:24235): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2167.310896][ T29] audit: type=1400 audit(2000525223.750:24236): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2167.826450][ T29] audit: type=1400 audit(2000525224.250:24237): avc: denied { read } for pid=14822 comm="syz.0.2940" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2167.828045][ T29] audit: type=1400 audit(2000525224.260:24238): avc: denied { read open } for pid=14822 comm="syz.0.2940" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2167.832237][ T29] audit: type=1400 audit(2000525224.270:24239): avc: denied { ioctl } for pid=14822 comm="syz.0.2940" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2167.842793][ T29] audit: type=1400 audit(2000525224.280:24240): avc: denied { sys_module } for pid=14822 comm="syz.0.2940" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2167.847528][ T29] audit: type=1400 audit(2000525224.290:24241): avc: denied { module_request } for pid=14822 comm="syz.0.2940" kmod="tty-ldisc-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2168.955384][T13810] usb 1-1: new high-speed USB device number 65 using dummy_hcd [ 2169.125229][T13810] usb 1-1: Using ep0 maxpacket: 16 [ 2169.323045][T13810] usb 1-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 2169.323275][T13810] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2169.327474][T13810] usb 1-1: Product: syz [ 2169.328316][T13810] usb 1-1: Manufacturer: syz [ 2169.328413][T13810] usb 1-1: SerialNumber: syz [ 2169.388557][T13810] r8152-cfgselector 1-1: Unknown version 0x0000 [ 2169.628935][ T3701] r8152-cfgselector 1-1: USB disconnect, device number 65 [ 2187.047373][ T29] kauditd_printk_skb: 63 callbacks suppressed [ 2187.047991][ T29] audit: type=1400 audit(2000525243.490:24305): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2187.050680][ T29] audit: type=1400 audit(2000525243.490:24306): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2187.053358][ T29] audit: type=1400 audit(2000525243.490:24307): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2187.256658][ T29] audit: type=1400 audit(2000525243.700:24308): avc: denied { read write } for pid=13958 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2187.266668][ T29] audit: type=1400 audit(2000525243.710:24309): avc: denied { read write open } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2187.273800][ T29] audit: type=1400 audit(2000525243.710:24310): avc: denied { ioctl } for pid=13958 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2187.410608][ T29] audit: type=1400 audit(2000525243.850:24311): avc: denied { prog_load } for pid=14844 comm="syz.0.2944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2187.418427][ T29] audit: type=1400 audit(2000525243.860:24312): avc: denied { bpf } for pid=14844 comm="syz.0.2944" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2187.428444][ T29] audit: type=1400 audit(2000525243.870:24313): avc: denied { perfmon } for pid=14844 comm="syz.0.2944" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2187.433243][ T29] audit: type=1400 audit(2000525243.870:24314): avc: denied { perfmon } for pid=14844 comm="syz.0.2944" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2190.480252][T14820] Process accounting resumed [ 2193.665085][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 2193.671130][ T29] audit: type=1400 audit(2000525250.100:24336): avc: denied { mount } for pid=14853 comm="syz.1.2947" name="/" dev="ramfs" ino=30412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2210.729385][ T29] audit: type=1400 audit(2000525267.170:24337): avc: denied { create } for pid=14865 comm="syz.1.2951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2210.777395][ T29] audit: type=1400 audit(2000525267.220:24338): avc: denied { setopt } for pid=14865 comm="syz.1.2951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2213.169791][ T29] audit: type=1400 audit(2000525269.610:24339): avc: denied { create } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2213.289303][ T29] audit: type=1400 audit(2000525269.710:24340): avc: denied { write } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2213.358074][ T29] audit: type=1400 audit(2000525269.800:24341): avc: denied { create } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2213.409721][ T29] audit: type=1400 audit(2000525269.850:24342): avc: denied { read } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2213.947493][ T29] audit: type=1400 audit(2000525270.380:24343): avc: denied { execmem } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2219.192195][ T29] audit: type=1400 audit(2000525275.630:24344): avc: denied { create } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2219.232203][ T29] audit: type=1400 audit(2000525275.670:24345): avc: denied { create } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2219.256441][ T29] audit: type=1400 audit(2000525275.690:24346): avc: denied { create } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2219.269603][ T29] audit: type=1400 audit(2000525275.720:24347): avc: denied { write } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2219.299562][ T29] audit: type=1400 audit(2000525275.740:24348): avc: denied { module_request } for pid=14867 comm="syz.1.2952" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2219.770979][ T29] audit: type=1400 audit(2000525276.210:24349): avc: denied { read } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2219.777347][ T29] audit: type=1400 audit(2000525276.220:24350): avc: denied { create } for pid=14867 comm="syz.1.2952" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2219.782488][ T29] audit: type=1400 audit(2000525276.220:24351): avc: denied { ioctl } for pid=14867 comm="syz.1.2952" path="socket:[31223]" dev="sockfs" ino=31223 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2219.802615][ T29] audit: type=1400 audit(2000525276.240:24352): avc: denied { module_request } for pid=14867 comm="syz.1.2952" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2220.168405][ T29] audit: type=1400 audit(2000525276.610:24353): avc: denied { sys_module } for pid=14867 comm="syz.1.2952" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2233.116409][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 2233.125579][ T29] audit: type=1400 audit(2000525289.560:24356): avc: denied { execute } for pid=14876 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2233.133550][ T29] audit: type=1400 audit(2000525289.570:24357): avc: denied { execute_no_trans } for pid=14876 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2233.170244][ T29] audit: type=1400 audit(2000525289.610:24358): avc: denied { execute } for pid=14876 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2233.288917][ T29] audit: type=1400 audit(2000525289.730:24359): avc: denied { execmem } for pid=14876 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2233.370535][ T29] audit: type=1400 audit(2000525289.810:24360): avc: denied { read } for pid=14877 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2233.373693][ T29] audit: type=1400 audit(2000525289.810:24361): avc: denied { read open } for pid=14877 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2233.425419][ T29] audit: type=1400 audit(2000525289.860:24362): avc: denied { mounton } for pid=14877 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2233.495671][ T29] audit: type=1400 audit(2000525289.920:24363): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2233.832955][ T29] audit: type=1400 audit(2000525290.270:24364): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2233.843832][ T29] audit: type=1400 audit(2000525290.290:24365): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2238.476228][T14936] lo: entered promiscuous mode [ 2238.508446][T14936] netlink: 1 bytes leftover after parsing attributes in process `syz.1.2955'. [ 2238.541591][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 2238.542654][ T29] audit: type=1400 audit(2000525294.980:24382): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2239.259511][ T29] audit: type=1400 audit(2000525295.700:24383): avc: denied { allowed } for pid=14947 comm="syz.1.2956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2239.266895][ T29] audit: type=1400 audit(2000525295.710:24384): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2239.329720][ T29] audit: type=1400 audit(2000525295.770:24385): avc: denied { create } for pid=14947 comm="syz.1.2956" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2239.369612][ T29] audit: type=1400 audit(2000525295.810:24386): avc: denied { create } for pid=14947 comm="syz.1.2956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2239.409624][ T29] audit: type=1400 audit(2000525295.850:24387): avc: denied { setopt } for pid=14947 comm="syz.1.2956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2239.453212][ T29] audit: type=1400 audit(2000525295.890:24388): avc: denied { write } for pid=14947 comm="syz.1.2956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2239.554596][ T29] audit: type=1400 audit(2000525295.990:24389): avc: denied { read } for pid=14947 comm="syz.1.2956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2239.581865][ T29] audit: type=1400 audit(2000525296.020:24390): avc: denied { read } for pid=14947 comm="syz.1.2956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2239.919876][ T29] audit: type=1400 audit(2000525296.360:24391): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2241.327060][T14877] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2241.362710][T14877] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2243.561124][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 2243.580549][ T29] audit: type=1400 audit(2000525300.000:24409): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2244.040090][ T29] audit: type=1400 audit(2000525300.480:24410): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2244.045672][ T29] audit: type=1400 audit(2000525300.490:24411): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2244.594843][T14877] hsr_slave_0: entered promiscuous mode [ 2244.596533][T14877] hsr_slave_1: entered promiscuous mode [ 2244.605690][T14877] debugfs: 'hsr0' already exists in 'hsr' [ 2244.606470][T14877] Cannot create hsr debugfs directory [ 2244.705042][ T29] audit: type=1400 audit(2000525301.140:24412): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="rtnl-link-virt_wifi" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2245.663988][ T29] audit: type=1400 audit(2000525302.100:24413): avc: denied { create } for pid=14877 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2245.685338][ T29] audit: type=1400 audit(2000525302.120:24414): avc: denied { write } for pid=14877 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2245.707582][ T29] audit: type=1400 audit(2000525302.140:24415): avc: denied { read } for pid=14877 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2245.711582][ T29] audit: type=1400 audit(2000525302.150:24416): avc: denied { read } for pid=14877 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2245.737072][ T29] audit: type=1400 audit(2000525302.180:24417): avc: denied { write } for pid=14877 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2245.746077][ T29] audit: type=1400 audit(2000525302.180:24418): avc: denied { read } for pid=14877 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2245.776710][T14877] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 2245.819844][T14877] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 2245.879407][T14877] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 2245.926567][T14877] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 2248.097936][T15168] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2960'. [ 2249.403082][T14877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2249.546047][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 2249.548483][ T29] audit: type=1400 audit(2000525305.990:24446): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2249.812261][ T29] audit: type=1400 audit(2000525306.250:24447): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2249.837604][ T29] audit: type=1400 audit(2000525306.280:24448): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2250.282996][ T29] audit: type=1400 audit(2000525306.720:24449): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2250.707885][ T29] audit: type=1400 audit(2000525307.150:24450): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2250.713994][ T29] audit: type=1400 audit(2000525307.150:24451): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2251.044250][ T29] audit: type=1400 audit(2000525307.480:24452): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2251.865580][ T29] audit: type=1400 audit(2000525308.310:24453): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2251.871919][ T29] audit: type=1400 audit(2000525308.310:24454): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2252.781119][ T29] audit: type=1400 audit(2000525309.220:24455): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2254.866721][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 2254.868857][ T29] audit: type=1400 audit(2000525311.310:24462): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2254.877713][ T29] audit: type=1400 audit(2000525311.310:24463): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2255.300520][ T29] audit: type=1400 audit(2000525311.740:24464): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2255.681887][ T29] audit: type=1400 audit(2000525312.120:24465): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2255.694201][ T29] audit: type=1400 audit(2000525312.130:24466): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2256.114935][ T29] audit: type=1400 audit(2000525312.550:24467): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2256.452681][ T29] audit: type=1400 audit(2000525312.890:24468): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2256.458259][ T29] audit: type=1400 audit(2000525312.900:24469): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2256.813537][ T29] audit: type=1400 audit(2000525313.250:24470): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2257.256102][ T29] audit: type=1400 audit(2000525313.700:24471): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2259.920859][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 2259.929266][ T29] audit: type=1400 audit(2000525316.360:24482): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2260.330740][ T29] audit: type=1400 audit(2000525316.770:24483): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2260.333974][ T29] audit: type=1400 audit(2000525316.770:24484): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2260.796308][ T29] audit: type=1400 audit(2000525317.240:24485): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2261.225258][ T29] audit: type=1400 audit(2000525317.650:24486): avc: denied { sys_module } for pid=14877 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2261.233984][ T29] audit: type=1400 audit(2000525317.670:24487): avc: denied { module_request } for pid=14877 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2261.870081][T14877] veth0_vlan: entered promiscuous mode [ 2261.965732][T14877] veth1_vlan: entered promiscuous mode [ 2262.266910][T14877] veth0_macvtap: entered promiscuous mode [ 2262.316101][T14877] veth1_macvtap: entered promiscuous mode [ 2262.562667][T14864] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2262.565094][T14864] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2262.568624][T14864] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2262.569811][T14864] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2262.836110][ T29] audit: type=1400 audit(2000525319.280:24488): avc: denied { mounton } for pid=14877 comm="syz-executor" path="/syzkaller.glVx1a/syz-tmp" dev="vda" ino=819 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 2262.851965][ T29] audit: type=1400 audit(2000525319.290:24489): avc: denied { mount } for pid=14877 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2262.877619][ T29] audit: type=1400 audit(2000525319.320:24490): avc: denied { mounton } for pid=14877 comm="syz-executor" path="/syzkaller.glVx1a/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2262.892481][ T29] audit: type=1400 audit(2000525319.330:24491): avc: denied { mounton } for pid=14877 comm="syz-executor" path="/syzkaller.glVx1a/syz-tmp/newroot/proc" dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2265.627366][ T1208] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2265.720307][ T1208] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2265.823655][ T1208] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2265.929393][ T1208] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2266.376015][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 2266.377015][ T29] audit: type=1400 audit(2000525322.810:24508): avc: denied { create } for pid=15207 comm="syz.2.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2266.390839][ T1208] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2266.398882][ T29] audit: type=1400 audit(2000525322.840:24509): avc: denied { create } for pid=15207 comm="syz.2.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2266.418641][ T1208] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2266.426782][ T29] audit: type=1400 audit(2000525322.870:24510): avc: denied { write } for pid=15207 comm="syz.2.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2266.447724][T15224] netlink: 64 bytes leftover after parsing attributes in process `syz.2.2953'. [ 2266.450248][ T29] audit: type=1400 audit(2000525322.880:24511): avc: denied { nlmsg_write } for pid=15207 comm="syz.2.2953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2266.457432][ T1208] bond0 (unregistering): Released all slaves [ 2266.547354][ T1208] hsr_slave_0: left promiscuous mode [ 2266.549726][ T1208] hsr_slave_1: left promiscuous mode [ 2266.582995][ T1208] veth1_macvtap: left promiscuous mode [ 2266.583445][ T1208] veth0_macvtap: left promiscuous mode [ 2266.585955][ T1208] veth1_vlan: left promiscuous mode [ 2266.586400][ T1208] veth0_vlan: left promiscuous mode [ 2268.423309][ T29] audit: type=1400 audit(2000525324.860:24512): avc: denied { write } for pid=15226 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2268.432991][ T29] audit: type=1400 audit(2000525324.880:24513): avc: denied { write open } for pid=15226 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2268.900420][ T29] audit: type=1400 audit(2000525325.340:24514): avc: denied { write } for pid=15227 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2268.908276][ T29] audit: type=1400 audit(2000525325.350:24515): avc: denied { write open } for pid=15227 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2268.935706][ T29] audit: type=1400 audit(2000525325.380:24516): avc: denied { search } for pid=15227 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2268.936138][ T29] audit: type=1400 audit(2000525325.380:24517): avc: denied { search } for pid=15227 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2272.242376][ T29] kauditd_printk_skb: 157 callbacks suppressed [ 2272.246350][ T29] audit: type=1400 audit(2000525328.680:24675): avc: denied { write } for pid=15233 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2272.256946][ T29] audit: type=1400 audit(2000525328.700:24676): avc: denied { write open } for pid=15233 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2272.632518][ T29] audit: type=1400 audit(2000525329.070:24677): avc: denied { write } for pid=15234 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2272.639003][ T29] audit: type=1400 audit(2000525329.090:24678): avc: denied { write open } for pid=15234 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2272.678086][ T29] audit: type=1400 audit(2000525329.120:24679): avc: denied { search } for pid=15234 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2272.678533][ T29] audit: type=1400 audit(2000525329.120:24680): avc: denied { search } for pid=15234 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2272.685988][ T29] audit: type=1400 audit(2000525329.120:24681): avc: denied { search } for pid=15234 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2272.686548][ T29] audit: type=1400 audit(2000525329.120:24682): avc: denied { search } for pid=15234 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2272.742109][ T29] audit: type=1400 audit(2000525329.180:24683): avc: denied { search } for pid=15235 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2272.742658][ T29] audit: type=1400 audit(2000525329.180:24684): avc: denied { search } for pid=15235 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2277.416741][ T29] kauditd_printk_skb: 338 callbacks suppressed [ 2277.417830][ T29] audit: type=1400 audit(2000525333.850:25023): avc: denied { search } for pid=15253 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2277.426808][ T29] audit: type=1400 audit(2000525333.870:25024): avc: denied { read } for pid=15253 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2277.431511][ T29] audit: type=1400 audit(2000525333.870:25025): avc: denied { read open } for pid=15253 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2277.437292][ T29] audit: type=1400 audit(2000525333.880:25026): avc: denied { search } for pid=15253 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2277.438725][ T29] audit: type=1400 audit(2000525333.880:25027): avc: denied { search } for pid=15253 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2277.439904][ T29] audit: type=1400 audit(2000525333.880:25028): avc: denied { search } for pid=15253 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2277.442808][ T29] audit: type=1400 audit(2000525333.880:25029): avc: denied { read } for pid=15253 comm="cmp" name="resolv.conf.eth3.link" dev="tmpfs" ino=70 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2277.446327][ T29] audit: type=1400 audit(2000525333.890:25030): avc: denied { read open } for pid=15253 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=70 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2277.449275][ T29] audit: type=1400 audit(2000525333.890:25031): avc: denied { getattr } for pid=15253 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2277.452995][ T29] audit: type=1400 audit(2000525333.890:25032): avc: denied { getattr } for pid=15253 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=70 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2282.455186][ T29] kauditd_printk_skb: 202 callbacks suppressed [ 2282.456682][ T29] audit: type=1400 audit(2000525338.890:25235): avc: denied { search } for pid=15273 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2282.459824][ T29] audit: type=1400 audit(2000525338.900:25236): avc: denied { search } for pid=15273 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2282.462464][ T29] audit: type=1400 audit(2000525338.900:25237): avc: denied { search } for pid=15273 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2282.519325][ T29] audit: type=1400 audit(2000525338.960:25238): avc: denied { search } for pid=15260 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2282.602864][ T29] audit: type=1400 audit(2000525339.040:25239): avc: denied { prog_load } for pid=15251 comm="syz.1.2968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2282.649101][ T29] audit: type=1400 audit(2000525339.080:25240): avc: denied { bpf } for pid=15251 comm="syz.1.2968" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2282.649563][ T29] audit: type=1400 audit(2000525339.080:25241): avc: denied { perfmon } for pid=15251 comm="syz.1.2968" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2282.655406][ T29] audit: type=1400 audit(2000525339.080:25242): avc: denied { perfmon } for pid=15251 comm="syz.1.2968" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2282.655806][ T29] audit: type=1400 audit(2000525339.090:25243): avc: denied { perfmon } for pid=15251 comm="syz.1.2968" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2282.655906][ T29] audit: type=1400 audit(2000525339.090:25244): avc: denied { perfmon } for pid=15251 comm="syz.1.2968" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2289.370182][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 2289.371451][ T29] audit: type=1400 audit(2000525345.810:25260): avc: denied { name_bind } for pid=15289 comm="syz.2.2975" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2289.396505][ T29] audit: type=1400 audit(2000525345.840:25261): avc: denied { node_bind } for pid=15289 comm="syz.2.2975" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2289.437269][ T29] audit: type=1400 audit(2000525345.880:25262): avc: denied { allowed } for pid=15289 comm="syz.2.2975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2289.472983][ T29] audit: type=1400 audit(2000525345.910:25263): avc: denied { prog_load } for pid=15289 comm="syz.2.2975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2289.497147][ T29] audit: type=1400 audit(2000525345.940:25264): avc: denied { bpf } for pid=15289 comm="syz.2.2975" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2292.206966][ T29] audit: type=1400 audit(2000525348.650:25265): avc: denied { read write } for pid=15294 comm="syz.2.2976" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2292.209747][ T29] audit: type=1400 audit(2000525348.650:25266): avc: denied { read write open } for pid=15294 comm="syz.2.2976" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2292.240134][T15295] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2292.241053][T15295] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2292.250683][ T29] audit: type=1400 audit(2000525348.650:25267): avc: denied { ioctl } for pid=15294 comm="syz.2.2976" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2292.250982][ T29] audit: type=1400 audit(2000525348.680:25268): avc: denied { ioctl } for pid=15294 comm="syz.2.2976" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2292.962580][ T29] audit: type=1400 audit(2000525349.400:25269): avc: denied { create } for pid=15299 comm="syz.2.2977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2295.429084][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 2295.435272][ T29] audit: type=1400 audit(2000525351.870:25273): avc: denied { write } for pid=15306 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2295.439126][ T29] audit: type=1400 audit(2000525351.880:25274): avc: denied { write open } for pid=15306 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2295.472556][ T29] audit: type=1400 audit(2000525351.910:25275): avc: denied { search } for pid=15306 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.472965][ T29] audit: type=1400 audit(2000525351.910:25276): avc: denied { search } for pid=15306 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.476982][ T29] audit: type=1400 audit(2000525351.910:25277): avc: denied { search } for pid=15306 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.477313][ T29] audit: type=1400 audit(2000525351.910:25278): avc: denied { search } for pid=15306 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.598979][ T29] audit: type=1400 audit(2000525352.040:25279): avc: denied { search } for pid=15307 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.599446][ T29] audit: type=1400 audit(2000525352.040:25280): avc: denied { search } for pid=15307 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.599535][ T29] audit: type=1400 audit(2000525352.040:25281): avc: denied { search } for pid=15307 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.616386][ T29] audit: type=1400 audit(2000525352.050:25282): avc: denied { read open } for pid=15307 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2297.479536][T15315] netlink: 'syz.2.2981': attribute type 4 has an invalid length. [ 2300.653640][ T29] kauditd_printk_skb: 365 callbacks suppressed [ 2300.658125][ T29] audit: type=1400 audit(2000525357.090:25648): avc: denied { search } for pid=15325 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2300.661704][ T29] audit: type=1400 audit(2000525357.100:25649): avc: denied { search } for pid=15325 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2300.662649][ T29] audit: type=1400 audit(2000525357.100:25650): avc: denied { search } for pid=15325 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2300.675314][ T29] audit: type=1400 audit(2000525357.120:25651): avc: denied { getattr } for pid=15325 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=73 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2300.695481][ T29] audit: type=1400 audit(2000525357.120:25652): avc: denied { search } for pid=15325 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2300.719017][ T29] audit: type=1400 audit(2000525357.160:25653): avc: denied { search } for pid=15325 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2300.720135][ T29] audit: type=1400 audit(2000525357.160:25654): avc: denied { search } for pid=15325 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2300.725207][ T29] audit: type=1400 audit(2000525357.160:25655): avc: denied { search } for pid=15325 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2300.725635][ T29] audit: type=1400 audit(2000525357.160:25656): avc: denied { remove_name search } for pid=15325 comm="rm" name="resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=73 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2300.728277][ T29] audit: type=1400 audit(2000525357.170:25657): avc: denied { unlink } for pid=15325 comm="rm" name="resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=73 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2305.709576][ T29] kauditd_printk_skb: 204 callbacks suppressed [ 2305.712476][ T29] audit: type=1400 audit(2000525362.150:25862): avc: denied { create } for pid=15363 comm="syz.1.2986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2305.789306][ T29] audit: type=1400 audit(2000525362.230:25863): avc: denied { write } for pid=15363 comm="syz.1.2986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2305.792844][ T29] audit: type=1400 audit(2000525362.230:25864): avc: denied { module_request } for pid=15363 comm="syz.1.2986" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2305.805936][ T29] audit: type=1400 audit(2000525362.240:25865): avc: denied { sys_module } for pid=15363 comm="syz.1.2986" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2305.826172][ T29] audit: type=1400 audit(2000525362.260:25866): avc: denied { module_request } for pid=15363 comm="syz.1.2986" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2305.958247][ T29] audit: type=1400 audit(2000525362.400:25867): avc: denied { write } for pid=15368 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2305.968303][ T29] audit: type=1400 audit(2000525362.410:25868): avc: denied { write open } for pid=15368 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2306.022046][ T29] audit: type=1400 audit(2000525362.460:25869): avc: denied { search } for pid=15368 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2306.050599][ T29] audit: type=1400 audit(2000525362.490:25870): avc: denied { search } for pid=15368 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2306.052826][ T29] audit: type=1400 audit(2000525362.490:25871): avc: denied { search } for pid=15368 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2308.855336][T15389] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2308.865626][T15389] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2310.740568][ T29] kauditd_printk_skb: 208 callbacks suppressed [ 2310.742197][ T29] audit: type=1400 audit(2000525367.180:26080): avc: denied { prog_load } for pid=15399 comm="syz.1.2995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2310.786005][ T29] audit: type=1400 audit(2000525367.210:26081): avc: denied { bpf } for pid=15399 comm="syz.1.2995" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2310.790600][ T29] audit: type=1400 audit(2000525367.230:26082): avc: denied { perfmon } for pid=15399 comm="syz.1.2995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2310.811010][ T29] audit: type=1400 audit(2000525367.250:26083): avc: denied { perfmon } for pid=15399 comm="syz.1.2995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2310.813410][ T29] audit: type=1400 audit(2000525367.250:26084): avc: denied { perfmon } for pid=15399 comm="syz.1.2995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2310.843017][ T29] audit: type=1400 audit(2000525367.280:26085): avc: denied { perfmon } for pid=15399 comm="syz.1.2995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2310.853464][ T29] audit: type=1400 audit(2000525367.300:26086): avc: denied { perfmon } for pid=15399 comm="syz.1.2995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2310.868298][ T29] audit: type=1400 audit(2000525367.310:26087): avc: denied { bpf } for pid=15399 comm="syz.1.2995" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2311.571472][ T29] audit: type=1400 audit(2000525368.010:26088): avc: denied { name_bind } for pid=15401 comm="syz.1.2996" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2311.576006][ T29] audit: type=1400 audit(2000525368.010:26089): avc: denied { node_bind } for pid=15401 comm="syz.1.2996" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2317.306624][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 2317.307689][ T29] audit: type=1400 audit(2000525373.750:26096): avc: denied { create } for pid=15410 comm="syz.2.2999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2317.319206][ T29] audit: type=1400 audit(2000525373.760:26097): avc: denied { ioctl } for pid=15410 comm="syz.2.2999" path="socket:[32053]" dev="sockfs" ino=32053 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2317.328727][ T29] audit: type=1400 audit(2000525373.770:26098): avc: denied { ioctl } for pid=15410 comm="syz.2.2999" path="socket:[32053]" dev="sockfs" ino=32053 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2317.340928][ T29] audit: type=1400 audit(2000525373.780:26099): avc: denied { setopt } for pid=15410 comm="syz.2.2999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2317.583909][ T29] audit: type=1400 audit(2000525374.020:26100): avc: denied { prog_load } for pid=15412 comm="syz.2.3000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2317.589756][ T29] audit: type=1400 audit(2000525374.040:26101): avc: denied { bpf } for pid=15412 comm="syz.2.3000" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2317.594368][ T29] audit: type=1400 audit(2000525374.040:26102): avc: denied { perfmon } for pid=15412 comm="syz.2.3000" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2317.610343][ T29] audit: type=1400 audit(2000525374.050:26103): avc: denied { perfmon } for pid=15412 comm="syz.2.3000" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2317.622224][ T29] audit: type=1400 audit(2000525374.060:26104): avc: denied { perfmon } for pid=15412 comm="syz.2.3000" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2317.641388][ T29] audit: type=1400 audit(2000525374.080:26105): avc: denied { perfmon } for pid=15412 comm="syz.2.3000" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2322.348632][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 2322.355289][ T29] audit: type=1400 audit(2000525378.790:26121): avc: denied { prog_load } for pid=15426 comm="syz.2.3006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2322.355639][ T29] audit: type=1400 audit(2000525378.790:26122): avc: denied { bpf } for pid=15426 comm="syz.2.3006" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2322.381085][ T29] audit: type=1400 audit(2000525378.820:26123): avc: denied { perfmon } for pid=15426 comm="syz.2.3006" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2322.406714][ T29] audit: type=1400 audit(2000525378.840:26124): avc: denied { perfmon } for pid=15426 comm="syz.2.3006" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2322.407182][ T29] audit: type=1400 audit(2000525378.840:26125): avc: denied { perfmon } for pid=15426 comm="syz.2.3006" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2322.407412][ T29] audit: type=1400 audit(2000525378.840:26126): avc: denied { perfmon } for pid=15426 comm="syz.2.3006" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2322.407491][ T29] audit: type=1400 audit(2000525378.840:26127): avc: denied { bpf } for pid=15426 comm="syz.2.3006" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2322.462993][ T29] audit: type=1400 audit(2000525378.900:26128): avc: denied { prog_load } for pid=15426 comm="syz.2.3006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2322.477963][ T29] audit: type=1400 audit(2000525378.920:26129): avc: denied { bpf } for pid=15426 comm="syz.2.3006" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2322.482397][ T29] audit: type=1400 audit(2000525378.920:26130): avc: denied { perfmon } for pid=15426 comm="syz.2.3006" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2325.588518][T15432] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2325.591861][T15432] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2328.226494][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 2328.238385][ T29] audit: type=1400 audit(2000525384.670:26144): avc: denied { module_request } for pid=15435 comm="syz.1.3009" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2329.102934][ T29] audit: type=1400 audit(2000525385.540:26145): avc: denied { prog_load } for pid=15438 comm="syz.1.3010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2329.131052][ T29] audit: type=1400 audit(2000525385.570:26146): avc: denied { bpf } for pid=15438 comm="syz.1.3010" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2329.160564][ T29] audit: type=1400 audit(2000525385.600:26147): avc: denied { perfmon } for pid=15438 comm="syz.1.3010" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2329.183489][ T29] audit: type=1400 audit(2000525385.620:26148): avc: denied { perfmon } for pid=15438 comm="syz.1.3010" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2329.196512][ T29] audit: type=1400 audit(2000525385.630:26149): avc: denied { perfmon } for pid=15438 comm="syz.1.3010" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2329.232200][ T29] audit: type=1400 audit(2000525385.670:26150): avc: denied { perfmon } for pid=15438 comm="syz.1.3010" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2329.261502][ T29] audit: type=1400 audit(2000525385.700:26151): avc: denied { perfmon } for pid=15438 comm="syz.1.3010" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2329.281337][ T29] audit: type=1400 audit(2000525385.720:26152): avc: denied { bpf } for pid=15438 comm="syz.1.3010" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2330.292216][ T29] audit: type=1400 audit(2000525386.730:26153): avc: denied { create } for pid=15442 comm="syz.1.3012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2333.335863][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 2333.340692][ T29] audit: type=1400 audit(2000525389.780:26155): avc: denied { prog_load } for pid=15445 comm="syz.1.3013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2333.344899][ T29] audit: type=1400 audit(2000525389.780:26156): avc: denied { bpf } for pid=15445 comm="syz.1.3013" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2333.371674][ T29] audit: type=1400 audit(2000525389.800:26157): avc: denied { perfmon } for pid=15445 comm="syz.1.3013" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2333.396349][ T29] audit: type=1400 audit(2000525389.840:26158): avc: denied { perfmon } for pid=15445 comm="syz.1.3013" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2333.399232][ T29] audit: type=1400 audit(2000525389.840:26159): avc: denied { perfmon } for pid=15445 comm="syz.1.3013" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2333.423614][ T29] audit: type=1400 audit(2000525389.860:26160): avc: denied { perfmon } for pid=15445 comm="syz.1.3013" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2333.448935][ T29] audit: type=1400 audit(2000525389.890:26161): avc: denied { bpf } for pid=15445 comm="syz.1.3013" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2333.480956][ T29] audit: type=1400 audit(2000525389.920:26162): avc: denied { bpf } for pid=15445 comm="syz.1.3013" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2333.497811][ T29] audit: type=1400 audit(2000525389.930:26163): avc: denied { prog_run } for pid=15445 comm="syz.1.3013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2334.400014][ T29] audit: type=1400 audit(2000525390.840:26164): avc: denied { prog_load } for pid=15447 comm="syz.2.3015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2339.569265][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 2339.573623][ T29] audit: type=1400 audit(2000525396.000:26177): avc: denied { create } for pid=15462 comm="syz.1.3021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2339.628828][ T29] audit: type=1400 audit(2000525396.070:26178): avc: denied { bind } for pid=15462 comm="syz.1.3021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2339.639570][ T29] audit: type=1400 audit(2000525396.080:26179): avc: denied { accept } for pid=15462 comm="syz.1.3021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2339.681857][ T29] audit: type=1400 audit(2000525396.120:26180): avc: denied { setopt } for pid=15462 comm="syz.1.3021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2339.711871][ T29] audit: type=1400 audit(2000525396.150:26181): avc: denied { write } for pid=15462 comm="syz.1.3021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2339.766568][ T29] audit: type=1400 audit(2000525396.210:26182): avc: denied { read } for pid=15462 comm="syz.1.3021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2340.761183][ T29] audit: type=1400 audit(2000525397.200:26183): avc: denied { create } for pid=15460 comm="syz.2.3020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2341.865076][ T29] audit: type=1400 audit(2000525398.290:26184): avc: denied { module_request } for pid=15460 comm="syz.2.3020" kmod="fs-btrfs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2343.200540][ T29] audit: type=1400 audit(2000525399.640:26185): avc: denied { create } for pid=15468 comm="syz.1.3022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2343.221701][ T29] audit: type=1400 audit(2000525399.660:26186): avc: denied { write } for pid=15468 comm="syz.1.3022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2344.849970][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 2344.853166][ T29] audit: type=1400 audit(2000525401.290:26193): avc: denied { create } for pid=15475 comm="syz.1.3024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2344.899322][ T29] audit: type=1400 audit(2000525401.340:26194): avc: denied { write } for pid=15475 comm="syz.1.3024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2344.926117][ T29] audit: type=1400 audit(2000525401.370:26195): avc: denied { create } for pid=15475 comm="syz.1.3024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2344.931509][ T29] audit: type=1400 audit(2000525401.370:26196): avc: denied { write } for pid=15475 comm="syz.1.3024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2344.963174][ T29] audit: type=1400 audit(2000525401.400:26197): avc: denied { module_request } for pid=15475 comm="syz.1.3024" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2345.849082][ T29] audit: type=1400 audit(2000525402.290:26198): avc: denied { prog_load } for pid=15478 comm="syz.1.3025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2345.862084][ T29] audit: type=1400 audit(2000525402.300:26199): avc: denied { bpf } for pid=15478 comm="syz.1.3025" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2345.893013][ T29] audit: type=1400 audit(2000525402.330:26200): avc: denied { perfmon } for pid=15478 comm="syz.1.3025" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2345.912181][ T29] audit: type=1400 audit(2000525402.350:26201): avc: denied { perfmon } for pid=15478 comm="syz.1.3025" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2345.936361][ T29] audit: type=1400 audit(2000525402.380:26202): avc: denied { perfmon } for pid=15478 comm="syz.1.3025" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2350.031093][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 2350.031497][ T29] audit: type=1400 audit(2000525406.470:26207): avc: denied { create } for pid=15480 comm="syz.1.3026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2350.048361][ T29] audit: type=1400 audit(2000525406.490:26208): avc: denied { create } for pid=15480 comm="syz.1.3026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2350.065584][ T29] audit: type=1400 audit(2000525406.500:26209): avc: denied { create } for pid=15480 comm="syz.1.3026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2350.066125][ T29] audit: type=1400 audit(2000525406.500:26210): avc: denied { write } for pid=15480 comm="syz.1.3026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2350.109799][ T29] audit: type=1400 audit(2000525406.540:26211): avc: denied { module_request } for pid=15480 comm="syz.1.3026" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2350.555440][ T29] audit: type=1400 audit(2000525406.990:26212): avc: denied { read } for pid=15480 comm="syz.1.3026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2350.579266][ T29] audit: type=1400 audit(2000525407.020:26213): avc: denied { write } for pid=15480 comm="syz.1.3026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2351.620612][ T29] audit: type=1400 audit(2000525408.060:26214): avc: denied { prog_load } for pid=15485 comm="syz.2.3027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2351.624154][ T29] audit: type=1400 audit(2000525408.060:26215): avc: denied { bpf } for pid=15485 comm="syz.2.3027" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2351.681386][ T29] audit: type=1400 audit(2000525408.120:26216): avc: denied { read write } for pid=15485 comm="syz.2.3027" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2351.716907][T15486] fuse: Unknown parameter '0x0000000000000004' [ 2362.816690][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 2362.823748][ T29] audit: type=1400 audit(2000525419.250:26226): avc: denied { prog_load } for pid=15493 comm="syz.2.3029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2362.828918][ T29] audit: type=1400 audit(2000525419.280:26227): avc: denied { bpf } for pid=15493 comm="syz.2.3029" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2362.900209][ T29] audit: type=1400 audit(2000525419.340:26228): avc: denied { name_bind } for pid=15493 comm="syz.2.3029" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2362.917897][ T29] audit: type=1400 audit(2000525419.350:26229): avc: denied { node_bind } for pid=15493 comm="syz.2.3029" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2363.483892][ T29] audit: type=1400 audit(2000525419.920:26230): avc: denied { prog_load } for pid=15495 comm="syz.2.3030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2363.489645][ T29] audit: type=1400 audit(2000525419.930:26231): avc: denied { bpf } for pid=15495 comm="syz.2.3030" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2363.509281][ T29] audit: type=1400 audit(2000525419.950:26232): avc: denied { perfmon } for pid=15495 comm="syz.2.3030" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2363.528431][ T29] audit: type=1400 audit(2000525419.960:26233): avc: denied { perfmon } for pid=15495 comm="syz.2.3030" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2363.555431][ T29] audit: type=1400 audit(2000525419.990:26234): avc: denied { perfmon } for pid=15495 comm="syz.2.3030" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2363.561860][ T29] audit: type=1400 audit(2000525420.000:26235): avc: denied { perfmon } for pid=15495 comm="syz.2.3030" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2369.056362][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 2369.062154][ T29] audit: type=1400 audit(2000525425.490:26265): avc: denied { prog_load } for pid=15515 comm="syz.1.3040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2369.125297][ T29] audit: type=1400 audit(2000525425.560:26266): avc: denied { bpf } for pid=15515 comm="syz.1.3040" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2370.062444][ T29] audit: type=1400 audit(2000525426.500:26267): avc: denied { prog_load } for pid=15517 comm="syz.1.3041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2370.079431][ T29] audit: type=1400 audit(2000525426.520:26268): avc: denied { bpf } for pid=15517 comm="syz.1.3041" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2370.084163][ T29] audit: type=1400 audit(2000525426.520:26269): avc: denied { perfmon } for pid=15517 comm="syz.1.3041" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2370.106337][ T29] audit: type=1400 audit(2000525426.540:26270): avc: denied { perfmon } for pid=15517 comm="syz.1.3041" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2370.112205][ T29] audit: type=1400 audit(2000525426.550:26271): avc: denied { perfmon } for pid=15517 comm="syz.1.3041" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2370.133647][ T29] audit: type=1400 audit(2000525426.560:26272): avc: denied { perfmon } for pid=15517 comm="syz.1.3041" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2370.258958][ T29] audit: type=1400 audit(2000525426.680:26273): avc: denied { perfmon } for pid=15517 comm="syz.1.3041" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2370.276196][ T29] audit: type=1400 audit(2000525426.720:26274): avc: denied { bpf } for pid=15517 comm="syz.1.3041" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2374.797369][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 2374.803405][ T29] audit: type=1400 audit(2000525431.240:26277): avc: denied { execmem } for pid=15527 comm="syz.1.3045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2379.306277][ T29] audit: type=1400 audit(2000525435.750:26278): avc: denied { create } for pid=15527 comm="syz.1.3045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2379.363652][ T29] audit: type=1400 audit(2000525435.800:26279): avc: denied { ioctl } for pid=15527 comm="syz.1.3045" path="socket:[32872]" dev="sockfs" ino=32872 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2379.410995][ T29] audit: type=1400 audit(2000525435.850:26280): avc: denied { module_request } for pid=15527 comm="syz.1.3045" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2379.791634][ T29] audit: type=1400 audit(2000525436.230:26281): avc: denied { sys_module } for pid=15527 comm="syz.1.3045" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2379.818044][ T29] audit: type=1400 audit(2000525436.250:26282): avc: denied { module_request } for pid=15527 comm="syz.1.3045" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2379.932866][ T29] audit: type=1400 audit(2000525436.370:26283): avc: denied { write } for pid=15527 comm="syz.1.3045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2379.979568][ T29] audit: type=1400 audit(2000525436.420:26284): avc: denied { module_request } for pid=15527 comm="syz.1.3045" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2380.506226][ T29] audit: type=1400 audit(2000525436.760:26285): avc: denied { read } for pid=15527 comm="syz.1.3045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2380.507683][ T29] audit: type=1400 audit(2000525436.770:26286): avc: denied { write } for pid=15527 comm="syz.1.3045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2382.989093][ T29] audit: type=1400 audit(2000525439.430:26287): avc: denied { prog_load } for pid=15535 comm="syz.2.3046" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2382.991764][ T29] audit: type=1400 audit(2000525439.430:26288): avc: denied { bpf } for pid=15535 comm="syz.2.3046" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2383.008688][ T29] audit: type=1400 audit(2000525439.450:26289): avc: denied { perfmon } for pid=15535 comm="syz.2.3046" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2383.012508][ T29] audit: type=1400 audit(2000525439.450:26290): avc: denied { perfmon } for pid=15535 comm="syz.2.3046" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2383.019292][ T29] audit: type=1400 audit(2000525439.460:26291): avc: denied { perfmon } for pid=15535 comm="syz.2.3046" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.998323][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 2385.999540][ T29] audit: type=1400 audit(2000525442.430:26299): avc: denied { ioctl } for pid=15537 comm="syz.2.3047" path="/dev/comedi3" dev="devtmpfs" ino=714 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2386.007633][T15540] 8<--- cut here --- [ 2386.015297][T15540] Unable to handle kernel paging request at virtual address fee04f29 when write [ 2386.015758][T15540] [fee04f29] *pgd=80000080007003, *pmd=00000000 [ 2386.016868][T15540] Internal error: Oops: a06 [#1] SMP ARM [ 2386.019407][T15540] Modules linked in: [ 2386.020079][T15540] CPU: 1 UID: 0 PID: 15540 Comm: syz.2.3047 Tainted: G L syzkaller #0 PREEMPT [ 2386.021011][T15540] Tainted: [L]=SOFTLOCKUP [ 2386.021517][T15540] Hardware name: ARM-Versatile Express [ 2386.021828][T15540] PC is at subdev_8255_io+0x60/0x6c [ 2386.022175][T15540] LR is at subdev_8255_io+0x4c/0x6c [ 2386.022473][T15540] pc : [<814162b4>] lr : [<814162a0>] psr: 60000013 [ 2386.022810][T15540] sp : df9cdcb0 ip : df9cdcb0 fp : df9cdccc [ 2386.023098][T15540] r10: 00000001 r9 : 00000084 r8 : df9cdd9c [ 2386.023389][T15540] r7 : 00004f26 r6 : 0000009b r5 : 844fe3c0 r4 : 00004f29 [ 2386.023712][T15540] r3 : 0000009b r2 : fee04f29 r1 : 00000001 r0 : 844fe3c0 [ 2386.024126][T15540] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 2386.024881][T15540] Control: 30c5387d Table: 850e9cc0 DAC: 00000000 [ 2386.025312][T15540] Register r0 information: slab kmalloc-192 start 844fe3c0 pointer offset 0 size 192 [ 2386.026544][T15540] Register r1 information: non-paged memory [ 2386.027408][T15540] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 2386.028230][T15540] Register r3 information: non-paged memory [ 2386.028543][T15540] Register r4 information: non-paged memory [ 2386.028874][T15540] Register r5 information: slab kmalloc-192 start 844fe3c0 pointer offset 0 size 192 [ 2386.029387][T15540] Register r6 information: non-paged memory [ 2386.029688][T15540] Register r7 information: non-paged memory [ 2386.029963][T15540] Register r8 information: 2-page vmalloc region starting at 0xdf9cc000 allocated at kernel_clone+0xac/0x3ec [ 2386.031643][T15540] Register r9 information: non-paged memory [ 2386.032259][T15540] Register r10 information: non-paged memory [ 2386.032419][T15540] Register r11 information: 2-page vmalloc region starting at 0xdf9cc000 allocated at kernel_clone+0xac/0x3ec [ 2386.032770][T15540] Register r12 information: 2-page vmalloc region starting at 0xdf9cc000 allocated at kernel_clone+0xac/0x3ec [ 2386.033383][T15540] Process syz.2.3047 (pid: 15540, stack limit = 0xdf9cc000) [ 2386.033758][T15540] Stack: (0xdf9cdcb0 to 0xdf9ce000) [ 2386.034018][T15540] dca0: 81416254 844fe3c0 00004f26 00004f26 [ 2386.034387][T15540] dcc0: df9cdcec df9cdcd0 81415f8c 81416260 00004f26 805150ac 86fc8cc0 86fc8cc0 [ 2386.034820][T15540] dce0: df9cdd0c df9cdcf0 8141634c 81415f40 844fe3c0 00000000 86fc8cc0 00004f26 [ 2386.035319][T15540] dd00: df9cdd4c df9cdd10 814164f8 814162cc 0000005f 8432b180 828217b0 00000000 [ 2386.035626][T15540] dd20: 00000000 829d46a0 844fe3c0 844fe404 df9cdd88 844fe3c0 00000000 82b28ad8 [ 2386.035894][T15540] dd40: df9cdd84 df9cdd50 8140502c 81416490 844fe3f0 00000000 df9cdd74 200000c0 [ 2386.036101][T15540] dd60: 844fe3c0 b5403587 844fe3f0 859dc800 40946400 00000003 df9cde44 df9cdd88 [ 2386.036342][T15540] dd80: 81400984 81404f30 35353238 00000000 00000000 00000000 00000000 00004f26 [ 2386.036533][T15540] dda0: 00000000 00000002 00000401 00000001 00000cc7 ffffffff 5c952399 00000005 [ 2386.036725][T15540] ddc0: 00000403 00000802 00000007 00000001 00000000 00000705 0000e1cb 00008006 [ 2386.036919][T15540] dde0: 00000004 00000004 00000395 80001089 fffffffd 00000000 fffffff5 ffffeadb [ 2386.037114][T15540] de00: 00000003 0040003e 00000008 00010000 08000000 00000002 00000000 f51b01cf [ 2386.037309][T15540] de20: 00000000 851e79c0 844fe3c0 200000c0 844fe3f0 859dc800 df9cdf14 df9cde48 [ 2386.037595][T15540] de40: 81401978 81400890 00000000 00000000 00000000 df9cde54 df9cde54 f51b01cf [ 2386.037825][T15540] de60: 00000000 00000000 824a45ec 0000005f 83fefde0 00000064 845c3444 859dc800 [ 2386.038018][T15540] de80: df9cdee4 df9cde90 807b8180 807ae6a4 00000064 00000001 00000000 df9cdeac [ 2386.038308][T15540] dea0: 8603ba90 834dfb28 00006400 0000000b df9cdea0 00000000 df9cdd40 f51b01cf [ 2386.038625][T15540] dec0: 851e79c0 40946400 200000c0 200000c0 851e79c0 00000003 df9cdef4 df9cdee8 [ 2386.038901][T15540] dee0: 807b82a0 f51b01cf df9cdf14 40946400 00000000 851e79c1 200000c0 851e79c0 [ 2386.039149][T15540] df00: 00000003 859dc800 df9cdfa4 df9cdf18 80585768 814013c8 ecac8b10 859dc800 [ 2386.039377][T15540] df20: df9cdf3c df9cdf30 81ab01ac 81ab007c df9cdf54 df9cdf40 8025bcbc 8028e0c4 [ 2386.039660][T15540] df40: df9cdfb0 40000000 df9cdf84 df9cdf58 80221a38 8025bc78 00000000 8281d17c [ 2386.039924][T15540] df60: df9cdfb0 0014c8c0 ecac8b10 8022198c 00000000 f51b01cf df9cdfac 00000000 [ 2386.040215][T15540] df80: 00000000 00326450 00000036 8020029c 859dc800 00000036 00000000 df9cdfa8 [ 2386.040396][T15540] dfa0: 80200060 80585644 00000000 00000000 00000003 40946400 200000c0 00000000 [ 2386.040620][T15540] dfc0: 00000000 00000000 00326450 00000036 00310000 00000000 00006364 76f810bc [ 2386.040822][T15540] dfe0: 76f80ec0 76f80eb0 000192bc 00132360 60000010 00000003 00000000 00000000 [ 2386.041017][T15540] Call trace: [ 2386.041232][T15540] [<81416254>] (subdev_8255_io) from [<81415f8c>] (subdev_8255_do_config+0x58/0x60) [ 2386.041871][T15540] r7:00004f26 r6:00004f26 r5:844fe3c0 r4:81416254 [ 2386.042133][T15540] [<81415f34>] (subdev_8255_do_config) from [<8141634c>] (subdev_8255_io_init+0x8c/0x9c) [ 2386.042629][T15540] r4:86fc8cc0 [ 2386.042781][T15540] [<814162c0>] (subdev_8255_io_init) from [<814164f8>] (dev_8255_attach+0x74/0x120) [ 2386.043148][T15540] r7:00004f26 r6:86fc8cc0 r5:00000000 r4:844fe3c0 [ 2386.043417][T15540] [<81416484>] (dev_8255_attach) from [<8140502c>] (comedi_device_attach+0x108/0x250) [ 2386.043817][T15540] r10:82b28ad8 r9:00000000 r8:844fe3c0 r7:df9cdd88 r6:844fe404 r5:844fe3c0 [ 2386.044123][T15540] r4:829d46a0 [ 2386.044290][T15540] [<81404f24>] (comedi_device_attach) from [<81400984>] (do_devconfig_ioctl+0x100/0x220) [ 2386.045027][T15540] r10:00000003 r9:40946400 r8:859dc800 r7:844fe3f0 r6:b5403587 r5:844fe3c0 [ 2386.045504][T15540] r4:200000c0 [ 2386.045677][T15540] [<81400884>] (do_devconfig_ioctl) from [<81401978>] (comedi_unlocked_ioctl+0x5bc/0x1c2c) [ 2386.046167][T15540] r8:859dc800 r7:844fe3f0 r6:200000c0 r5:844fe3c0 r4:851e79c0 [ 2386.046647][T15540] [<814013bc>] (comedi_unlocked_ioctl) from [<80585768>] (sys_ioctl+0x130/0xba0) [ 2386.047061][T15540] r10:859dc800 r9:00000003 r8:851e79c0 r7:200000c0 r6:851e79c1 r5:00000000 [ 2386.047403][T15540] r4:40946400 [ 2386.047574][T15540] [<80585638>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2386.047936][T15540] Exception stack(0xdf9cdfa8 to 0xdf9cdff0) [ 2386.048308][T15540] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 2386.048656][T15540] dfc0: 00000000 00000000 00326450 00000036 00310000 00000000 00006364 76f810bc [ 2386.049035][T15540] dfe0: 76f80ec0 76f80eb0 000192bc 00132360 [ 2386.049324][T15540] r10:00000036 r9:859dc800 r8:8020029c r7:00000036 r6:00326450 r5:00000000 [ 2386.049706][T15540] r4:00000000 [ 2386.050208][T15540] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 2386.052311][T15540] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc [ 2386.106460][ T29] audit: type=1400 audit(2000525442.500:26300): avc: denied { write } for pid=3089 comm="syz-executor" path="pipe:[1823]" dev="pipefs" ino=1823 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2386.106997][ T29] audit: type=1400 audit(2000525442.520:26301): avc: denied { write } for pid=3089 comm="syz-executor" path="pipe:[1823]" dev="pipefs" ino=1823 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2386.107335][ T29] audit: type=1400 audit(2000525442.540:26302): avc: denied { read } for pid=2903 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 2386.107423][ T29] audit: type=1400 audit(2000525442.540:26303): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2386.107479][ T29] audit: type=1400 audit(2000525442.540:26304): avc: denied { search } for pid=2903 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2386.126784][ T29] audit: type=1400 audit(2000525442.570:26305): avc: denied { write } for pid=3089 comm="syz-executor" path="pipe:[1823]" dev="pipefs" ino=1823 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2386.156406][ T29] audit: type=1400 audit(2000525442.600:26306): avc: denied { add_name search } for pid=2903 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2386.158172][ T29] audit: type=1400 audit(2000525442.600:26307): avc: denied { create } for pid=2903 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2386.162017][ T29] audit: type=1400 audit(2000525442.600:26308): avc: denied { append open } for pid=2903 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2386.258293][T15540] Kernel panic - not syncing: Fatal exception [ 2386.260495][T15540] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:20:54 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=7efc39e4 R03=7efc39dc R04=00000000 R05=7efc39dc R06=00000000 R07=00000109 R08=00000000 R09=000004c8 R10=0000000e R11=00002cd1 R12=00000000 R13=ed9b1ff8 R14=0015fd84 R15=0015fd84 PSR=40010193 -Z-- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000002 R02=eb08f030 R03=00000030 R04=84591840 R05=df9cd938 R06=82959b68 R07=00000001 R08=82827248 R09=00000000 R10=00001b94 R11=df9cd8d4 R12=df9cd878 R13=df9cd8b8 R14=81abd9a8 R15=80aa42a0 PSR=80000193 N--- A S svc32 s00=1c000000 s01=00000000 d00=000000001c000000 s02=08000000 s03=fffeb61b d01=fffeb61b08000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=fe2577ab s09=00f2d657 d04=00f2d657fe2577ab s10=ffffffff s11=00000000 d05=00000000ffffffff s12=00567307 s13=004a4500 d06=004a450000567307 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=0d790fd6 d08=0d790fd600000000 s18=98000000 s19=00029d56 d09=00029d5698000000 s20=ffd12bb2 s21=004a44fc d10=004a44fcffd12bb2 s22=ffffffff s23=00000000 d11=00000000ffffffff s24=1c2577ab s25=00000000 d12=000000001c2577ab s26=08000000 s27=fffeb61b d13=fffeb61b08000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=010078cb s33=004dc0fb d16=004dc0fb010078cb s34=00000000 s35=00000000 d17=0000000000000000 s36=fe30541a s37=ff8bd953 d18=ff8bd953fe30541a s38=ffffffff s39=ffffffff d19=ffffffffffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=03ec01e4 s43=00000000 d21=0000000003ec01e4 s44=00000007 s45=00000000 d22=0000000000000007 s46=014eab4c s47=00000000 d23=00000000014eab4c s48=00d6bfcc s49=0d790fd6 d24=0d790fd600d6bfcc s50=18d6b6a4 s51=00000000 d25=0000000018d6b6a4 s52=0010261a s53=fe9d536e d26=fe9d536e0010261a s54=011c5c8a s55=01aa8d5a d27=01aa8d5a011c5c8a s56=014579ce s57=fff89288 d28=fff89288014579ce s58=fffc4944 s59=011c5c8a d29=011c5c8afffc4944 s60=0597d520 s61=fffeb61b d30=fffeb61b0597d520 s62=494ec107 s63=0033bd26 d31=0033bd26494ec107 FPSCR: 00000000