last executing test programs: 5.69576128s ago: executing program 0 (id=1257): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) syz_clone3(&(0x7f0000000080)={0x801400, &(0x7f0000000040)=0xffffffffffffffff, 0x0, 0x0, {0x1c}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_getfd(r0, r0, 0x0) 5.367747596s ago: executing program 0 (id=1259): sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = socket$igmp6(0xa, 0x3, 0x2) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000005c0)={@dev={0xfe, 0x80, '\x00', 0x40}, @remote, @remote, 0x3, 0x2, 0x5, 0x400, 0xb7, 0xc20022, r2}) syz_emit_ethernet(0x7a, &(0x7f0000000640)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x80}, @val={@void, {0x8100, 0x0, 0x0, 0x1}}, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '@\x00', 0x40, 0x3a, 0x0, @remote, @mcast2, {[], @param_prob={0x2, 0x1, 0x0, 0x500, {0x0, 0x6, '\x00', 0x40, 0x0, 0xff, @private1, @private2, [@hopopts={0x3a}], "f4c638bed6f068cc"}}}}}}}, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb86dd603012bb00282b00fc020000000000000000000000000000fe8000000000000000000000000000aa"], 0x0) 4.788637227s ago: executing program 1 (id=1260): bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000001000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d00"], 0x0, 0x804, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$rfkill(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000005000000000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r0, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 4.67387912s ago: executing program 0 (id=1261): r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x28}, 0x20008000) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000000)=0x4a3, 0x4) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e22, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r0, 0x0, 0xd, &(0x7f0000000340)=0x8, 0x4) recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) 3.986077133s ago: executing program 1 (id=1262): io_uring_setup(0x29c, &(0x7f0000000300)={0x0, 0x4454, 0x1000, 0xfffffffd, 0x2}) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000001100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000300)="300e308002", 0x1001, r0) 3.425604004s ago: executing program 1 (id=1263): r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmmsg(r0, &(0x7f00000042c0)=[{{&(0x7f00000006c0)=@xdp={0x2c, 0x6, r2, 0x36}, 0x80, 0x0, 0x0, &(0x7f0000000640)=ANY=[], 0x10}}], 0x1, 0x4004) 3.09233596s ago: executing program 0 (id=1264): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000880)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000640)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x3c, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}, @NFTA_SET_ELEM_EXPRESSIONS={0x4}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 2.220763967s ago: executing program 0 (id=1265): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f0000002f40)={&(0x7f0000000180)=@newtaction={0x68, 0x30, 0x9, 0xfffffffd, 0x0, {}, [{0x54, 0x1, [@m_skbedit={0x50, 0x1, 0x0, 0x0, {{0xc}, {0x24, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PRIORITY={0x8, 0x8}, @TCA_SKBEDIT_PARMS={0x18}]}, {0x4}, {0xc, 0xa}, {0xc, 0x9, {0x3b}}}}]}]}, 0x68}}, 0x0) 1.777488396s ago: executing program 1 (id=1266): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000140)=ANY=[@ANYBLOB="7400000002060104000000000000000006000002050005000200000005000400000000001400078008001240001000000800134000005bad0500010007000000050001"], 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008041) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000080900010073797a30000000005c000000030a1b000000000000000000050000000900010073797a30000000000900030073797a300000000008000a4000000003280004800800024000ad50120800014000000000140004"], 0xa4}, 0x1, 0x0, 0x0, 0x20040001}, 0x40810) 1.581813349s ago: executing program 0 (id=1267): syz_clone(0x1144280, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000f40)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2688ca4c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) readv(0xffffffffffffffff, 0x0, 0x0) getrandom(0x0, 0x0, 0x0) 1.242014956s ago: executing program 1 (id=1268): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x14c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x188}, {&(0x7f00000007c0)=""/154, 0x8}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) write$cgroup_int(r2, &(0x7f0000000440)=0x51e, 0x12) 0s ago: executing program 1 (id=1269): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000001340)=@newsa={0x184, 0x1a, 0x1, 0xfffffffe, 0x100, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@private1={0xfc, 0x1, '\x00', 0x1}, 0x1, 0x717, 0x4e23, 0x5, 0xa, 0x0, 0x20, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, {0xfe, 0x1000000000000192, 0x9ba3, 0xcbed, 0x8251c, 0x5, 0xfffffffffffffffc, 0x4}, {0xffffffffffffffff, 0x0, 0x1f}, {0xfffffffe, 0x3fc}, 0x7e, 0x3505, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @algo_aead={0x4c, 0x12, {{'rfc4106-gcm-aesni\x00'}, 0x0, 0x40}}]}, 0x184}, 0x1, 0x0, 0x0, 0x4000}, 0x844) kernel console output (not intermixed with test programs): for pid=7419 comm="syz.0.1061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 843.010950][ T28] audit: type=1400 audit(842.920:6899): avc: denied { read write } for pid=7414 comm="syz.1.1060" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 843.012153][ T28] audit: type=1400 audit(842.920:6900): avc: denied { ioctl } for pid=7419 comm="syz.0.1061" path="socket:[14447]" dev="sockfs" ino=14447 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 843.642914][ C0] vcan0: j1939_tp_rxtimer: 0x861cb800: rx timeout, send abort [ 844.143045][ C0] vcan0: j1939_tp_rxtimer: 0x861c9600: rx timeout, send abort [ 844.143576][ C0] vcan0: j1939_tp_rxtimer: 0x861cb800: abort rx timeout. Force session deactivation [ 844.643778][ C0] vcan0: j1939_tp_rxtimer: 0x861c9600: abort rx timeout. Force session deactivation [ 847.147107][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 847.147674][ T28] audit: type=1400 audit(847.060:6930): avc: denied { read } for pid=7434 comm="syz.1.1064" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 847.170394][ T28] audit: type=1400 audit(847.080:6931): avc: denied { read open } for pid=7434 comm="syz.1.1064" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 847.275094][ T28] audit: type=1400 audit(847.180:6932): avc: denied { ioctl } for pid=7434 comm="syz.1.1064" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 847.358932][ T28] audit: type=1400 audit(847.270:6933): avc: denied { ioctl } for pid=7434 comm="syz.1.1064" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 847.445865][ T28] audit: type=1400 audit(847.360:6934): avc: denied { ioctl } for pid=7434 comm="syz.1.1064" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64ce scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 847.681493][ T28] audit: type=1400 audit(847.590:6935): avc: denied { ioctl } for pid=7434 comm="syz.1.1064" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64b8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 847.994010][ T28] audit: type=1400 audit(847.910:6936): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 848.042017][ T28] audit: type=1400 audit(847.950:6937): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 848.042386][ T28] audit: type=1400 audit(847.950:6938): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 848.058430][ T28] audit: type=1400 audit(847.970:6939): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 851.652049][ T2885] usb 2-1: new high-speed USB device number 16 using dummy_hcd [ 851.831894][ T2885] usb 2-1: Using ep0 maxpacket: 16 [ 852.088117][ T2885] usb 2-1: config 0 has no interfaces? [ 852.156200][ T28] kauditd_printk_skb: 61 callbacks suppressed [ 852.156628][ T28] audit: type=1400 audit(852.070:7001): avc: denied { ioctl } for pid=7447 comm="syz.1.1069" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.160508][ T28] audit: type=1400 audit(852.070:7002): avc: denied { ioctl } for pid=7447 comm="syz.1.1069" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.168254][ T2885] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 852.168505][ T2885] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 852.168607][ T2885] usb 2-1: SerialNumber: syz [ 852.183036][ T2885] usb 2-1: config 0 descriptor?? [ 852.222720][ T28] audit: type=1400 audit(852.130:7003): avc: denied { ioctl } for pid=7447 comm="syz.1.1069" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.238837][ T28] audit: type=1400 audit(852.150:7004): avc: denied { ioctl } for pid=7447 comm="syz.1.1069" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.273259][ T28] audit: type=1400 audit(852.190:7005): avc: denied { ioctl } for pid=7447 comm="syz.1.1069" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.312458][ T28] audit: type=1400 audit(852.190:7006): avc: denied { ioctl } for pid=7447 comm="syz.1.1069" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 852.545971][ T28] audit: type=1400 audit(852.460:7007): avc: denied { bpf } for pid=7447 comm="syz.1.1069" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 852.559450][ T2885] usb 2-1: USB disconnect, device number 16 [ 852.712054][ T28] audit: type=1400 audit(852.630:7008): avc: denied { create } for pid=7455 comm="syz.0.1071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 852.792456][ T28] audit: type=1400 audit(852.700:7009): avc: denied { bind } for pid=7455 comm="syz.0.1071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 852.824018][ T28] audit: type=1400 audit(852.740:7010): avc: denied { read write } for pid=7447 comm="syz.1.1069" name="event0" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 853.422312][ T40] usb 2-1: new full-speed USB device number 17 using dummy_hcd [ 853.641898][ T40] usb 2-1: config 0 has no interfaces? [ 853.686283][ T40] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 853.687453][ T40] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 853.688519][ T40] usb 2-1: SerialNumber: syz [ 853.703184][ T40] usb 2-1: config 0 descriptor?? [ 854.115862][ T40] usb 2-1: USB disconnect, device number 17 [ 855.292783][ T40] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 855.541880][ T40] usb 1-1: Using ep0 maxpacket: 32 [ 855.718252][ T40] usb 1-1: unable to get BOS descriptor or descriptor too short [ 855.855839][ T40] usb 1-1: config 8 has an invalid interface number: 188 but max is 0 [ 855.857074][ T40] usb 1-1: config 8 has no interface number 0 [ 855.858165][ T40] usb 1-1: config 8 interface 188 has no altsetting 0 [ 855.982719][ T6723] usb 2-1: new high-speed USB device number 18 using dummy_hcd [ 856.208606][ T40] usb 1-1: New USB device found, idVendor=0ccd, idProduct=0102, bcdDevice=89.0e [ 856.210806][ T40] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 856.213838][ T40] usb 1-1: Product: syz [ 856.215620][ T40] usb 1-1: Manufacturer: syz [ 856.217355][ T40] usb 1-1: SerialNumber: syz [ 856.311644][ T6723] usb 2-1: Using ep0 maxpacket: 16 [ 856.773733][ T6723] usb 2-1: config 0 has no interfaces? [ 856.882773][ T40] usb 1-1: USB disconnect, device number 14 [ 856.974833][ T6723] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 856.976018][ T6723] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 856.985274][ T6723] usb 2-1: SerialNumber: syz [ 857.002639][ T6723] usb 2-1: config 0 descriptor?? [ 857.175477][ T28] kauditd_printk_skb: 103 callbacks suppressed [ 857.175830][ T28] audit: type=1400 audit(857.090:7114): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 857.185848][ T28] audit: type=1400 audit(857.100:7115): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 857.368514][ T28] audit: type=1400 audit(857.280:7116): avc: denied { read write } for pid=7479 comm="syz.1.1074" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 857.395568][ T28] audit: type=1400 audit(857.310:7117): avc: denied { read write open } for pid=7479 comm="syz.1.1074" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 857.451584][ T28] audit: type=1400 audit(857.360:7118): avc: denied { ioctl } for pid=7479 comm="syz.1.1074" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 857.879297][ T28] audit: type=1400 audit(857.790:7119): avc: denied { read } for pid=7495 comm="syz.0.1075" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 857.904564][ T28] audit: type=1400 audit(857.820:7120): avc: denied { read open } for pid=7495 comm="syz.0.1075" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 857.935498][ T28] audit: type=1400 audit(857.850:7121): avc: denied { ioctl } for pid=7495 comm="syz.0.1075" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 857.939796][ T28] audit: type=1400 audit(857.850:7122): avc: denied { ioctl } for pid=7495 comm="syz.0.1075" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 857.957651][ T28] audit: type=1400 audit(857.870:7123): avc: denied { ioctl } for pid=7495 comm="syz.0.1075" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64ce scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 862.281805][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 862.282071][ T28] audit: type=1400 audit(862.190:7150): avc: denied { read } for pid=7506 comm="syz.0.1080" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 862.282241][ T28] audit: type=1400 audit(862.190:7151): avc: denied { read open } for pid=7506 comm="syz.0.1080" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 865.018086][ T28] audit: type=1400 audit(864.930:7152): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 865.020306][ T28] audit: type=1400 audit(864.930:7153): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 865.105484][ T28] audit: type=1400 audit(865.020:7154): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 865.645093][ T28] audit: type=1400 audit(865.560:7155): avc: denied { read append } for pid=7508 comm="syz.0.1081" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 865.646347][ T28] audit: type=1400 audit(865.560:7156): avc: denied { read open } for pid=7508 comm="syz.0.1081" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 865.705837][ T28] audit: type=1400 audit(865.620:7157): avc: denied { block_suspend } for pid=7508 comm="syz.0.1081" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 865.870413][ T28] audit: type=1400 audit(865.780:7158): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 865.887638][ T28] audit: type=1400 audit(865.800:7159): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 867.428895][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 867.430003][ T28] audit: type=1400 audit(867.340:7169): avc: denied { mount } for pid=7518 comm="syz.0.1084" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 867.486304][ T40] usb 2-1: USB disconnect, device number 18 [ 867.714888][ T28] audit: type=1400 audit(867.630:7170): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 867.719522][ T28] audit: type=1400 audit(867.630:7171): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 867.735058][ T28] audit: type=1400 audit(867.650:7172): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 868.275236][ T28] audit: type=1400 audit(868.190:7173): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 868.284396][ T28] audit: type=1400 audit(868.190:7174): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 868.330030][ T28] audit: type=1400 audit(868.190:7175): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 869.264444][ T28] audit: type=1400 audit(869.180:7176): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 869.266968][ T28] audit: type=1400 audit(869.180:7177): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 869.279738][ T28] audit: type=1400 audit(869.180:7178): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 870.842199][ T40] usb 2-1: new high-speed USB device number 19 using dummy_hcd [ 871.032047][ T40] usb 2-1: Using ep0 maxpacket: 16 [ 871.075216][ T40] usb 2-1: config 0 has no interfaces? [ 871.136952][ T40] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 871.138430][ T40] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 871.139410][ T40] usb 2-1: SerialNumber: syz [ 871.148854][ T40] usb 2-1: config 0 descriptor?? [ 872.740997][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 872.742225][ T28] audit: type=1400 audit(872.650:7224): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 872.813724][ T28] audit: type=1400 audit(872.730:7225): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 872.816733][ T28] audit: type=1400 audit(872.730:7226): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 873.547079][ T28] audit: type=1400 audit(873.460:7227): avc: denied { write } for pid=7544 comm="syz.0.1092" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 873.566637][ T28] audit: type=1400 audit(873.480:7228): avc: denied { write open } for pid=7544 comm="syz.0.1092" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 874.016170][ T28] audit: type=1400 audit(873.930:7229): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 874.034953][ T28] audit: type=1400 audit(873.950:7230): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 874.045730][ T28] audit: type=1400 audit(873.960:7231): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 875.172661][ T28] audit: type=1400 audit(875.090:7232): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 875.175774][ T28] audit: type=1400 audit(875.090:7233): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 877.904573][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 877.904907][ T28] audit: type=1400 audit(877.820:7244): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 877.919184][ T28] audit: type=1400 audit(877.830:7245): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 877.972287][ T28] audit: type=1400 audit(877.880:7246): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 878.466441][ T28] audit: type=1400 audit(878.380:7247): avc: denied { allowed } for pid=7552 comm="syz.0.1096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 878.486121][ T28] audit: type=1400 audit(878.400:7248): avc: denied { create } for pid=7552 comm="syz.0.1096" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 878.645645][ T28] audit: type=1400 audit(878.560:7249): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 878.654122][ T28] audit: type=1400 audit(878.570:7250): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 878.657778][ T28] audit: type=1400 audit(878.570:7251): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 878.866442][ T28] audit: type=1400 audit(878.780:7252): avc: denied { create } for pid=7554 comm="syz.0.1097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 878.884344][ T28] audit: type=1400 audit(878.790:7253): avc: denied { ioctl } for pid=7554 comm="syz.0.1097" path="socket:[15511]" dev="sockfs" ino=15511 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 879.299215][ C1] vcan0: j1939_tp_rxtimer: 0x861ca000: rx timeout, send abort [ 879.799472][ C1] vcan0: j1939_tp_rxtimer: 0x861c7c00: rx timeout, send abort [ 879.800377][ C1] vcan0: j1939_tp_rxtimer: 0x861ca000: abort rx timeout. Force session deactivation [ 880.300273][ C1] vcan0: j1939_tp_rxtimer: 0x861c7c00: abort rx timeout. Force session deactivation [ 881.618026][ T2885] usb 2-1: USB disconnect, device number 19 [ 883.306999][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 883.307508][ T28] audit: type=1400 audit(883.220:7290): avc: denied { read write } for pid=7567 comm="syz.0.1101" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 883.333796][ T28] audit: type=1400 audit(883.250:7291): avc: denied { read write open } for pid=7567 comm="syz.0.1101" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 883.432157][ T28] audit: type=1400 audit(883.340:7292): avc: denied { create } for pid=7568 comm="syz.1.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 883.606215][ T28] audit: type=1400 audit(883.520:7293): avc: denied { ioctl } for pid=7568 comm="syz.1.1102" path="socket:[15528]" dev="sockfs" ino=15528 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 883.666276][ T28] audit: type=1400 audit(883.580:7294): avc: denied { bind } for pid=7568 comm="syz.1.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 883.705837][ T28] audit: type=1400 audit(883.620:7295): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 883.708508][ T28] audit: type=1400 audit(883.620:7296): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 883.728207][ T28] audit: type=1400 audit(883.640:7297): avc: denied { setopt } for pid=7568 comm="syz.1.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 883.757678][ T28] audit: type=1400 audit(883.670:7298): avc: denied { write } for pid=7568 comm="syz.1.1102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 883.785028][ T28] audit: type=1400 audit(883.700:7299): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 885.722071][ T2885] usb 2-1: new high-speed USB device number 20 using dummy_hcd [ 885.983017][ T2885] usb 2-1: Using ep0 maxpacket: 16 [ 886.394745][ T2885] usb 2-1: config 0 has no interfaces? [ 886.507890][ T2885] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 886.508214][ T2885] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 886.508274][ T2885] usb 2-1: SerialNumber: syz [ 886.529409][ T2885] usb 2-1: config 0 descriptor?? [ 889.596635][ T28] kauditd_printk_skb: 41 callbacks suppressed [ 889.596901][ T28] audit: type=1400 audit(889.510:7341): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 889.624886][ T28] audit: type=1400 audit(889.540:7342): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 889.633854][ T28] audit: type=1400 audit(889.550:7343): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 890.746546][ T28] audit: type=1400 audit(890.660:7344): avc: denied { allowed } for pid=7582 comm="syz.0.1106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 890.770471][ T28] audit: type=1400 audit(890.680:7345): avc: denied { create } for pid=7582 comm="syz.0.1106" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 890.779805][ T28] audit: type=1400 audit(890.690:7346): avc: denied { read write } for pid=7582 comm="syz.0.1106" name="cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 890.814838][ T28] audit: type=1400 audit(890.730:7347): avc: denied { read write open } for pid=7582 comm="syz.0.1106" path="/dev/cuse" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 891.331994][ T28] audit: type=1400 audit(891.240:7348): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.352502][ T28] audit: type=1400 audit(891.260:7349): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.382891][ T28] audit: type=1400 audit(891.290:7350): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 893.837412][ C1] vcan0: j1939_tp_rxtimer: 0x861bd200: rx timeout, send abort [ 894.337575][ C1] vcan0: j1939_tp_rxtimer: 0x863e9600: rx timeout, send abort [ 894.338348][ C1] vcan0: j1939_tp_rxtimer: 0x861bd200: abort rx timeout. Force session deactivation [ 894.838490][ C1] vcan0: j1939_tp_rxtimer: 0x863e9600: abort rx timeout. Force session deactivation [ 895.283258][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 895.283629][ T28] audit: type=1400 audit(895.200:7377): avc: denied { name_bind } for pid=7588 comm="syz.0.1109" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 895.288497][ T28] audit: type=1400 audit(895.200:7378): avc: denied { node_bind } for pid=7588 comm="syz.0.1109" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 896.692674][ T28] audit: type=1400 audit(896.600:7379): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 896.697253][ T28] audit: type=1400 audit(896.610:7380): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 896.709039][ T28] audit: type=1400 audit(896.610:7381): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 896.913585][ T28] audit: type=1400 audit(896.830:7382): avc: denied { read } for pid=7592 comm="syz.0.1110" name="rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 896.916434][ T28] audit: type=1400 audit(896.830:7383): avc: denied { read open } for pid=7592 comm="syz.0.1110" path="/dev/rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 896.932879][ T28] audit: type=1400 audit(896.850:7384): avc: denied { ioctl } for pid=7592 comm="syz.0.1110" path="/dev/rtc0" dev="devtmpfs" ino=699 ioctlcmd=0x7007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 896.957372][ T40] usb 2-1: USB disconnect, device number 20 [ 897.228653][ T28] audit: type=1400 audit(897.140:7385): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 897.291917][ T28] audit: type=1400 audit(897.190:7386): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 900.312486][ T7610] can: request_module (can-proto-0) failed. [ 900.603836][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 900.607483][ T28] audit: type=1400 audit(900.520:7410): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 900.662073][ T28] audit: type=1400 audit(900.570:7411): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 900.663969][ T28] audit: type=1400 audit(900.570:7412): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 900.711841][ T28] audit: type=1400 audit(900.620:7413): avc: denied { name_bind } for pid=7612 comm="syz.0.1114" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 900.712294][ T28] audit: type=1400 audit(900.620:7414): avc: denied { node_bind } for pid=7612 comm="syz.0.1114" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 901.298271][ T28] audit: type=1400 audit(901.210:7415): avc: denied { read write } for pid=7614 comm="syz.1.1115" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 901.300448][ T28] audit: type=1400 audit(901.210:7416): avc: denied { read write open } for pid=7614 comm="syz.1.1115" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 901.337272][ T28] audit: type=1400 audit(901.250:7417): avc: denied { ioctl } for pid=7614 comm="syz.1.1115" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 901.340272][ T28] audit: type=1400 audit(901.250:7418): avc: denied { ioctl } for pid=7614 comm="syz.1.1115" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 901.393996][ T28] audit: type=1400 audit(901.300:7419): avc: denied { ioctl } for pid=7614 comm="syz.1.1115" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 901.631719][ T40] usb 2-1: new high-speed USB device number 21 using dummy_hcd [ 901.912192][ T40] usb 2-1: Using ep0 maxpacket: 16 [ 902.362784][ T40] usb 2-1: config 0 has no interfaces? [ 902.524612][ T40] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 902.525668][ T40] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 902.533398][ T40] usb 2-1: SerialNumber: syz [ 902.549220][ T40] usb 2-1: config 0 descriptor?? [ 903.028546][ T40] usb 2-1: USB disconnect, device number 21 [ 903.581419][ T40] usb 2-1: new high-speed USB device number 22 using dummy_hcd [ 903.761992][ T40] usb 2-1: Using ep0 maxpacket: 16 [ 903.888582][ T40] usb 2-1: config 0 has no interfaces? [ 903.992614][ T40] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 903.993907][ T40] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 904.002316][ T40] usb 2-1: SerialNumber: syz [ 904.022953][ T40] usb 2-1: config 0 descriptor?? [ 905.951542][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 905.953569][ T28] audit: type=1400 audit(905.860:7487): avc: denied { name_bind } for pid=7641 comm="syz.0.1120" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 905.955253][ T28] audit: type=1400 audit(905.860:7488): avc: denied { node_bind } for pid=7641 comm="syz.0.1120" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 907.260094][ T28] audit: type=1400 audit(907.170:7489): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 907.315424][ T28] audit: type=1400 audit(907.230:7490): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 907.321678][ T28] audit: type=1400 audit(907.230:7491): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 908.713427][ T28] audit: type=1400 audit(908.630:7492): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 908.724560][ T28] audit: type=1400 audit(908.640:7493): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 908.752000][ T28] audit: type=1400 audit(908.660:7494): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 909.374096][ T28] audit: type=1400 audit(909.290:7495): avc: denied { read write } for pid=7646 comm="syz.0.1122" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 909.376898][ T28] audit: type=1400 audit(909.290:7496): avc: denied { read write open } for pid=7646 comm="syz.0.1122" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 911.361459][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 911.366000][ T28] audit: type=1400 audit(911.270:7500): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 911.474851][ T28] audit: type=1400 audit(911.390:7501): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 911.517238][ T28] audit: type=1400 audit(911.430:7502): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 912.814567][ T28] audit: type=1400 audit(912.720:7503): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 912.838694][ T28] audit: type=1400 audit(912.720:7504): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 912.853045][ T28] audit: type=1400 audit(912.770:7505): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 913.515869][ T28] audit: type=1400 audit(913.430:7506): avc: denied { name_bind } for pid=7652 comm="syz.0.1125" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 913.556509][ T28] audit: type=1400 audit(913.470:7507): avc: denied { node_bind } for pid=7652 comm="syz.0.1125" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 913.915676][ T28] audit: type=1400 audit(913.830:7508): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 913.920547][ T28] audit: type=1400 audit(913.830:7509): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 914.356980][ T2885] usb 2-1: USB disconnect, device number 22 [ 916.756044][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 916.757300][ T28] audit: type=1400 audit(916.670:7520): avc: denied { prog_load } for pid=7663 comm="syz.0.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 916.793669][ T28] audit: type=1400 audit(916.710:7521): avc: denied { bpf } for pid=7663 comm="syz.0.1128" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 916.846082][ T28] audit: type=1400 audit(916.760:7522): avc: denied { map_create } for pid=7663 comm="syz.0.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 916.905162][ T28] audit: type=1400 audit(916.820:7523): avc: denied { map_create } for pid=7663 comm="syz.0.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 916.928013][ T28] audit: type=1400 audit(916.840:7524): avc: denied { prog_load } for pid=7663 comm="syz.0.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 916.929859][ T28] audit: type=1400 audit(916.840:7525): avc: denied { bpf } for pid=7663 comm="syz.0.1128" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 916.967807][ T28] audit: type=1400 audit(916.880:7526): avc: denied { create } for pid=7661 comm="syz.1.1127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 916.978570][ T28] audit: type=1400 audit(916.890:7527): avc: denied { perfmon } for pid=7663 comm="syz.0.1128" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 916.992839][ T28] audit: type=1400 audit(916.910:7528): avc: denied { prog_load } for pid=7663 comm="syz.0.1128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 916.994912][ T28] audit: type=1400 audit(916.910:7529): avc: denied { perfmon } for pid=7663 comm="syz.0.1128" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 919.831977][ T2885] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 920.096283][ T2885] usb 2-1: Using ep0 maxpacket: 16 [ 920.296979][ T2885] usb 2-1: config 0 has no interfaces? [ 920.487004][ T2885] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 920.488219][ T2885] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 920.494430][ T2885] usb 2-1: SerialNumber: syz [ 920.521840][ T2885] usb 2-1: config 0 descriptor?? [ 920.877195][ T2885] usb 2-1: USB disconnect, device number 23 [ 921.361844][ T2885] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 921.582864][ T2885] usb 2-1: Using ep0 maxpacket: 16 [ 921.844064][ T28] kauditd_printk_skb: 66 callbacks suppressed [ 921.845630][ T28] audit: type=1400 audit(921.760:7596): avc: denied { ioctl } for pid=7669 comm="syz.1.1131" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 921.895661][ T2885] usb 2-1: config 0 has no interfaces? [ 921.897058][ T28] audit: type=1400 audit(921.810:7597): avc: denied { ioctl } for pid=7669 comm="syz.1.1131" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 921.914465][ T28] audit: type=1400 audit(921.830:7598): avc: denied { ioctl } for pid=7669 comm="syz.1.1131" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 921.923477][ T28] audit: type=1400 audit(921.830:7599): avc: denied { ioctl } for pid=7669 comm="syz.1.1131" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 921.995529][ T28] audit: type=1400 audit(921.910:7600): avc: denied { ioctl } for pid=7669 comm="syz.1.1131" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 921.999733][ T28] audit: type=1400 audit(921.910:7601): avc: denied { ioctl } for pid=7669 comm="syz.1.1131" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 922.001814][ T2885] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 922.002115][ T2885] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 922.002302][ T2885] usb 2-1: SerialNumber: syz [ 922.020931][ T2885] usb 2-1: config 0 descriptor?? [ 922.046191][ T28] audit: type=1400 audit(921.960:7602): avc: denied { ioctl } for pid=7669 comm="syz.1.1131" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 922.049177][ T28] audit: type=1400 audit(921.960:7603): avc: denied { ioctl } for pid=7669 comm="syz.1.1131" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 922.094750][ T28] audit: type=1400 audit(922.000:7604): avc: denied { ioctl } for pid=7669 comm="syz.1.1131" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 922.095202][ T28] audit: type=1400 audit(922.000:7605): avc: denied { ioctl } for pid=7669 comm="syz.1.1131" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 927.202392][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 927.208511][ T28] audit: type=1400 audit(927.120:7613): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 927.224898][ T28] audit: type=1400 audit(927.140:7614): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 927.364864][ T28] audit: type=1400 audit(927.280:7615): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 929.462273][ T28] audit: type=1400 audit(929.370:7616): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 929.467357][ T28] audit: type=1400 audit(929.380:7617): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 929.501858][ T28] audit: type=1400 audit(929.410:7618): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 930.010950][ T28] audit: type=1400 audit(929.920:7619): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 930.086320][ T28] audit: type=1400 audit(930.000:7620): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 930.123347][ T28] audit: type=1400 audit(930.040:7621): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 932.636034][ T2885] usb 2-1: USB disconnect, device number 24 [ 932.943492][ T28] audit: type=1400 audit(932.840:7622): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.015130][ T28] audit: type=1400 audit(932.930:7623): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.063391][ T28] audit: type=1400 audit(932.980:7624): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.494555][ T28] audit: type=1400 audit(933.410:7625): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.509643][ T28] audit: type=1400 audit(933.420:7626): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.613562][ T28] audit: type=1400 audit(933.490:7627): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.831789][ T28] audit: type=1400 audit(933.730:7628): avc: denied { allowed } for pid=7705 comm="syz.1.1137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 934.044908][ T28] audit: type=1400 audit(933.960:7629): avc: denied { create } for pid=7707 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 934.067520][ T28] audit: type=1400 audit(933.980:7630): avc: denied { setopt } for pid=7707 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 934.085737][ T28] audit: type=1400 audit(934.000:7631): avc: denied { write } for pid=7707 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 936.159928][ T7714] Illegal XDP return value 4070994976 on prog (id 8) dev N/A, expect packet loss! [ 936.441666][ T2885] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 936.731923][ T2885] usb 1-1: Using ep0 maxpacket: 16 [ 937.167641][ T2885] usb 1-1: config 0 has no interfaces? [ 937.517341][ T2885] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 937.518781][ T2885] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 937.523976][ T2885] usb 1-1: SerialNumber: syz [ 937.710748][ T2885] usb 1-1: config 0 descriptor?? [ 938.057882][ T28] kauditd_printk_skb: 54 callbacks suppressed [ 938.067507][ T28] audit: type=1400 audit(937.970:7686): avc: denied { ioctl } for pid=7713 comm="syz.0.1141" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.327733][ T2885] usb 1-1: USB disconnect, device number 15 [ 938.622101][ T28] audit: type=1400 audit(938.530:7687): avc: denied { read write } for pid=7713 comm="syz.0.1141" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.658268][ T28] audit: type=1400 audit(938.570:7688): avc: denied { read write open } for pid=7713 comm="syz.0.1141" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.728016][ T28] audit: type=1400 audit(938.640:7689): avc: denied { ioctl } for pid=7713 comm="syz.0.1141" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.753019][ T28] audit: type=1400 audit(938.660:7690): avc: denied { ioctl } for pid=7713 comm="syz.0.1141" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.828518][ T28] audit: type=1400 audit(938.740:7691): avc: denied { ioctl } for pid=7713 comm="syz.0.1141" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.890310][ T28] audit: type=1400 audit(938.800:7692): avc: denied { ioctl } for pid=7713 comm="syz.0.1141" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 938.951939][ T28] audit: type=1400 audit(938.860:7693): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 938.956926][ T28] audit: type=1400 audit(938.870:7694): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 939.046364][ T28] audit: type=1400 audit(938.950:7695): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 939.931942][ T2856] usb 1-1: new high-speed USB device number 16 using dummy_hcd [ 940.092383][ T2856] usb 1-1: Using ep0 maxpacket: 16 [ 940.290945][ T2856] usb 1-1: config 0 has no interfaces? [ 940.304935][ T2856] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 940.306112][ T2856] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 940.307087][ T2856] usb 1-1: SerialNumber: syz [ 940.372418][ T2856] usb 1-1: config 0 descriptor?? [ 944.745801][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 944.756055][ T28] audit: type=1400 audit(944.660:7728): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 944.758317][ T28] audit: type=1400 audit(944.660:7729): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 944.971502][ T28] audit: type=1400 audit(944.880:7730): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 945.935243][ T28] audit: type=1400 audit(945.850:7731): avc: denied { prog_load } for pid=7738 comm="syz.1.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 945.937745][ T28] audit: type=1400 audit(945.850:7732): avc: denied { bpf } for pid=7738 comm="syz.1.1145" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 945.947513][ T28] audit: type=1400 audit(945.850:7733): avc: denied { prog_load } for pid=7738 comm="syz.1.1145" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 945.949130][ T28] audit: type=1400 audit(945.860:7734): avc: denied { perfmon } for pid=7738 comm="syz.1.1145" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 945.950671][ T28] audit: type=1400 audit(945.860:7735): avc: denied { perfmon } for pid=7738 comm="syz.1.1145" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 945.952638][ T28] audit: type=1400 audit(945.860:7736): avc: denied { perfmon } for pid=7738 comm="syz.1.1145" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 945.964209][ T28] audit: type=1400 audit(945.860:7737): avc: denied { perfmon } for pid=7738 comm="syz.1.1145" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 949.800598][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 949.800933][ T28] audit: type=1400 audit(949.710:7767): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 949.821631][ T28] audit: type=1400 audit(949.730:7768): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 949.942071][ T28] audit: type=1400 audit(949.860:7769): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 950.904343][ T40] usb 1-1: USB disconnect, device number 16 [ 951.112232][ T28] audit: type=1400 audit(951.020:7770): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 951.155332][ T28] audit: type=1400 audit(951.070:7771): avc: denied { create } for pid=7751 comm="syz.1.1150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 951.158303][ T28] audit: type=1400 audit(951.070:7772): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 951.185175][ T28] audit: type=1400 audit(951.100:7773): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 951.240441][ T28] audit: type=1400 audit(951.150:7774): avc: denied { create } for pid=7751 comm="syz.1.1150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 951.273560][ T28] audit: type=1400 audit(951.190:7775): avc: denied { write } for pid=7751 comm="syz.1.1150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 951.278560][ T28] audit: type=1400 audit(951.190:7776): avc: denied { module_request } for pid=7751 comm="syz.1.1150" kmod="net-pf-16-proto-16-family-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 954.861757][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 954.862237][ T28] audit: type=1400 audit(954.760:7803): avc: denied { allowed } for pid=7769 comm="syz.1.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 954.862478][ T28] audit: type=1400 audit(954.770:7804): avc: denied { prog_load } for pid=7769 comm="syz.1.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 954.862668][ T28] audit: type=1400 audit(954.770:7805): avc: denied { bpf } for pid=7769 comm="syz.1.1156" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 954.939073][ T28] audit: type=1400 audit(954.840:7806): avc: denied { map_create } for pid=7769 comm="syz.1.1156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 954.939501][ T28] audit: type=1400 audit(954.850:7807): avc: denied { ioctl } for pid=7769 comm="syz.1.1156" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x5407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 955.012935][ T28] audit: type=1400 audit(954.910:7808): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 955.061036][ T28] audit: type=1400 audit(954.970:7809): avc: denied { read write } for pid=7768 comm="syz.0.1155" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 955.064817][ T28] audit: type=1400 audit(954.980:7810): avc: denied { read write open } for pid=7768 comm="syz.0.1155" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 955.159732][ T28] audit: type=1400 audit(955.060:7811): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 955.163489][ T28] audit: type=1400 audit(955.080:7812): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 955.931277][ T7774] netlink: 104 bytes leftover after parsing attributes in process `syz.1.1157'. [ 960.622760][ T28] kauditd_printk_skb: 63 callbacks suppressed [ 960.622946][ T28] audit: type=1400 audit(960.410:7876): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 960.623125][ T28] audit: type=1400 audit(960.420:7877): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 960.623260][ T28] audit: type=1400 audit(960.420:7878): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 960.623425][ T28] audit: type=1400 audit(960.450:7879): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 960.623623][ T28] audit: type=1400 audit(960.450:7880): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 960.623826][ T28] audit: type=1400 audit(960.450:7881): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 961.040380][ T28] audit: type=1400 audit(960.950:7882): avc: denied { create } for pid=7793 comm="syz.1.1167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 961.050443][ T28] audit: type=1400 audit(960.960:7883): avc: denied { getopt } for pid=7793 comm="syz.1.1167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 961.442559][ T28] audit: type=1400 audit(961.350:7884): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 961.626274][ T28] audit: type=1400 audit(961.540:7885): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 965.885213][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 965.887208][ T28] audit: type=1400 audit(965.800:7901): avc: denied { create } for pid=7801 comm="syz.0.1171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 965.907340][ T28] audit: type=1400 audit(965.820:7902): avc: denied { write } for pid=7801 comm="syz.0.1171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 965.909332][ T28] audit: type=1400 audit(965.820:7903): avc: denied { nlmsg_write } for pid=7801 comm="syz.0.1171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 967.113076][ T28] audit: type=1400 audit(966.990:7904): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 967.115109][ T28] audit: type=1400 audit(966.990:7905): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 967.117029][ T28] audit: type=1400 audit(966.990:7906): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 967.854936][ T28] audit: type=1400 audit(967.770:7907): avc: denied { watch watch_reads } for pid=7803 comm="syz.0.1172" path="/576" dev="tmpfs" ino=3023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 967.935251][ T28] audit: type=1400 audit(967.850:7908): avc: denied { watch watch_reads } for pid=7803 comm="syz.0.1172" path="/576" dev="tmpfs" ino=3023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 968.250662][ T28] audit: type=1400 audit(968.160:7909): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 968.258155][ T28] audit: type=1400 audit(968.170:7910): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 971.101188][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 971.101731][ T28] audit: type=1400 audit(971.010:7939): avc: denied { read } for pid=7815 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 971.476033][ T28] audit: type=1400 audit(971.290:7940): avc: denied { create } for pid=7815 comm="syz.0.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 971.483140][ T28] audit: type=1400 audit(971.400:7941): avc: denied { bind } for pid=7815 comm="syz.0.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 971.569522][ T28] audit: type=1400 audit(971.480:7942): avc: denied { setopt } for pid=7815 comm="syz.0.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 971.577931][ T28] audit: type=1400 audit(971.490:7943): avc: denied { accept } for pid=7815 comm="syz.0.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 971.593999][ T28] audit: type=1400 audit(971.510:7944): avc: denied { write } for pid=7815 comm="syz.0.1175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 971.709278][ T28] audit: type=1400 audit(971.620:7945): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 972.100543][ T28] audit: type=1400 audit(972.010:7946): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 972.104266][ T28] audit: type=1400 audit(972.020:7947): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 972.706826][ T28] audit: type=1400 audit(972.620:7948): avc: denied { read } for pid=7817 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 976.172504][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 976.173394][ T28] audit: type=1400 audit(976.090:7954): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 976.266847][ T28] audit: type=1400 audit(976.180:7955): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 976.285415][ T28] audit: type=1400 audit(976.200:7956): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 976.682202][ T28] audit: type=1400 audit(976.580:7957): avc: denied { read } for pid=7821 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 976.788576][ T28] audit: type=1400 audit(976.700:7958): avc: denied { create } for pid=7821 comm="syz.0.1178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 976.892090][ T28] audit: type=1400 audit(976.800:7959): avc: denied { create } for pid=7821 comm="syz.0.1178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 976.925102][ T28] audit: type=1400 audit(976.840:7960): avc: denied { create } for pid=7821 comm="syz.0.1178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 977.004367][ T28] audit: type=1400 audit(976.920:7961): avc: denied { create } for pid=7821 comm="syz.0.1178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 977.009879][ T28] audit: type=1400 audit(976.920:7962): avc: denied { write } for pid=7821 comm="syz.0.1178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 977.146107][ T28] audit: type=1400 audit(977.060:7963): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 981.355053][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 981.356134][ T28] audit: type=1400 audit(981.270:7980): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 981.360771][ T28] audit: type=1400 audit(981.270:7981): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 981.369781][ T28] audit: type=1400 audit(981.280:7982): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 982.121807][ T28] audit: type=1400 audit(982.030:7983): avc: denied { read } for pid=7829 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 982.273719][ T28] audit: type=1400 audit(982.170:7984): avc: denied { append } for pid=7829 comm="syz.0.1182" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 982.274247][ T28] audit: type=1400 audit(982.180:7985): avc: denied { append open } for pid=7829 comm="syz.0.1182" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 982.571626][ T28] audit: type=1400 audit(982.480:7986): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 982.788986][ T28] audit: type=1400 audit(982.700:7987): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 982.791887][ T28] audit: type=1400 audit(982.710:7988): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 983.050515][ T28] audit: type=1400 audit(982.960:7989): avc: denied { read } for pid=7831 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 987.854446][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 987.854931][ T28] audit: type=1400 audit(987.760:8004): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 987.956338][ T28] audit: type=1400 audit(987.870:8005): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 987.962325][ T28] audit: type=1400 audit(987.880:8006): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 988.306394][ T28] audit: type=1400 audit(988.220:8007): avc: denied { read } for pid=7839 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 988.430744][ T28] audit: type=1400 audit(988.340:8008): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 988.434318][ T28] audit: type=1400 audit(988.350:8009): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 988.450506][ T28] audit: type=1400 audit(988.360:8010): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 988.625839][ T28] audit: type=1400 audit(988.540:8011): avc: denied { read } for pid=7841 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 989.186539][ T28] audit: type=1400 audit(989.100:8012): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 989.302277][ T28] audit: type=1400 audit(989.140:8013): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 992.999569][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 992.999900][ T28] audit: type=1400 audit(992.910:8030): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 993.044364][ T28] audit: type=1400 audit(992.960:8031): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 993.128677][ T28] audit: type=1400 audit(992.960:8032): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 993.592627][ T28] audit: type=1400 audit(993.490:8033): avc: denied { read } for pid=7852 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 993.613400][ T28] audit: type=1400 audit(993.530:8034): avc: denied { create } for pid=7852 comm="syz.1.1192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 993.741904][ T28] audit: type=1400 audit(993.650:8035): avc: denied { prog_load } for pid=7852 comm="syz.1.1192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 993.742294][ T28] audit: type=1400 audit(993.650:8036): avc: denied { bpf } for pid=7852 comm="syz.1.1192" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 993.894512][ T28] audit: type=1400 audit(993.810:8037): avc: denied { map_create } for pid=7852 comm="syz.1.1192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 993.900989][ T28] audit: type=1400 audit(993.810:8038): avc: denied { bpf } for pid=7852 comm="syz.1.1192" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 993.956989][ T28] audit: type=1400 audit(993.870:8039): avc: denied { map_create } for pid=7852 comm="syz.1.1192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 998.116700][ T28] kauditd_printk_skb: 51 callbacks suppressed [ 998.117014][ T28] audit: type=1400 audit(998.030:8091): avc: denied { module_request } for pid=7870 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 998.175387][ T28] audit: type=1400 audit(998.090:8092): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 998.180234][ T28] audit: type=1400 audit(998.090:8093): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 998.555122][ T28] audit: type=1400 audit(998.470:8094): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 998.875033][ T28] audit: type=1400 audit(998.790:8095): avc: denied { sys_module } for pid=7870 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 998.903140][ T28] audit: type=1400 audit(998.820:8096): avc: denied { module_request } for pid=7870 comm="syz-executor" kmod="nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 999.038310][ T28] audit: type=1400 audit(998.950:8097): avc: denied { read } for pid=7873 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 999.389152][ T28] audit: type=1400 audit(999.300:8098): avc: denied { module_request } for pid=7870 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 999.712542][ T28] audit: type=1400 audit(999.520:8099): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 999.843033][ T28] audit: type=1400 audit(999.760:8100): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1000.415683][ T7141] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1000.471683][ T7141] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1000.475361][ T7141] bond0 (unregistering): Released all slaves [ 1000.661067][ T7141] hsr_slave_0: left promiscuous mode [ 1000.663858][ T7141] hsr_slave_1: left promiscuous mode [ 1003.142478][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 1003.142853][ T28] audit: type=1400 audit(1003.060:8140): avc: denied { search } for pid=7903 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1003.157710][ T28] audit: type=1400 audit(1003.070:8141): avc: denied { search } for pid=7903 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1003.158753][ T28] audit: type=1400 audit(1003.070:8142): avc: denied { search } for pid=7903 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1003.164985][ T28] audit: type=1400 audit(1003.080:8143): avc: denied { search } for pid=7903 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1003.175783][ T28] audit: type=1400 audit(1003.090:8144): avc: denied { search } for pid=7903 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1003.176676][ T28] audit: type=1400 audit(1003.090:8145): avc: denied { search } for pid=7903 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1003.179588][ T28] audit: type=1400 audit(1003.090:8146): avc: denied { read open } for pid=7903 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1003.208491][ T28] audit: type=1400 audit(1003.120:8147): avc: denied { getattr } for pid=7903 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1003.215833][ T28] audit: type=1400 audit(1003.130:8148): avc: denied { search } for pid=7903 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1003.216887][ T28] audit: type=1400 audit(1003.130:8149): avc: denied { search } for pid=7903 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1005.825560][ T2956] 8021q: adding VLAN 0 to HW filter on device eth1 [ 1006.266686][ T7973] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1006.632803][ T7973] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1006.965701][ T7973] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1007.548350][ T7973] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1007.803511][ T7870] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1007.834991][ T7870] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1008.099063][ T2670] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1008.289416][ T28] kauditd_printk_skb: 166 callbacks suppressed [ 1008.289815][ T28] audit: type=1400 audit(1008.200:8316): avc: denied { sys_module } for pid=7870 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1008.297287][ T28] audit: type=1400 audit(1008.210:8317): avc: denied { module_request } for pid=7870 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1008.329455][ T28] audit: type=1400 audit(1008.240:8318): avc: denied { write } for pid=8035 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1008.352152][ T28] audit: type=1400 audit(1008.260:8319): avc: denied { write open } for pid=8035 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1008.393655][ T28] audit: type=1400 audit(1008.310:8320): avc: denied { search } for pid=8035 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1008.397229][ T7141] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1008.397651][ T7141] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1008.412572][ T28] audit: type=1400 audit(1008.320:8321): avc: denied { search } for pid=8035 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1008.413016][ T28] audit: type=1400 audit(1008.320:8322): avc: denied { search } for pid=8035 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1008.413214][ T28] audit: type=1400 audit(1008.320:8323): avc: denied { search } for pid=8035 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1008.429907][ T2670] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1008.652370][ T28] audit: type=1400 audit(1008.560:8324): avc: denied { search } for pid=8062 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1008.654335][ T28] audit: type=1400 audit(1008.560:8325): avc: denied { search } for pid=8062 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1011.336085][ T8090] fuse: Unknown parameter 'grou00000000000000000000' [ 1011.517695][ T2956] 8021q: adding VLAN 0 to HW filter on device eth2 [ 1011.946305][ T7870] hsr_slave_0: entered promiscuous mode [ 1011.948029][ T7870] hsr_slave_1: entered promiscuous mode [ 1013.329063][ T28] kauditd_printk_skb: 186 callbacks suppressed [ 1013.329548][ T28] audit: type=1400 audit(1013.240:8512): avc: denied { write } for pid=8129 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1013.346157][ T28] audit: type=1400 audit(1013.260:8513): avc: denied { write open } for pid=8129 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1013.422663][ T28] audit: type=1400 audit(1013.330:8514): avc: denied { search } for pid=8129 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1013.424585][ T28] audit: type=1400 audit(1013.330:8515): avc: denied { search } for pid=8129 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1013.435601][ T28] audit: type=1400 audit(1013.330:8516): avc: denied { search } for pid=8129 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1013.437485][ T28] audit: type=1400 audit(1013.330:8517): avc: denied { search } for pid=8129 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1013.585792][ T28] audit: type=1400 audit(1013.500:8518): avc: denied { search } for pid=8193 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1013.588075][ T28] audit: type=1400 audit(1013.500:8519): avc: denied { search } for pid=8193 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1013.602678][ T28] audit: type=1400 audit(1013.510:8520): avc: denied { search } for pid=8193 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1013.612413][ T28] audit: type=1400 audit(1013.520:8521): avc: denied { read open } for pid=8193 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1014.324925][ T7870] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1014.369485][ T7870] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 1014.382104][ T7870] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1014.433358][ T7870] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 1014.443765][ T7870] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1014.448156][ T7870] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 1014.456114][ T7870] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1014.460764][ T7870] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 1018.140138][ T7870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1018.496593][ T28] kauditd_printk_skb: 364 callbacks suppressed [ 1018.496827][ T28] audit: type=1400 audit(1018.410:8886): avc: denied { search } for pid=8236 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1018.513048][ T28] audit: type=1400 audit(1018.430:8887): avc: denied { read } for pid=8236 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1018.524801][ T28] audit: type=1400 audit(1018.440:8888): avc: denied { read open } for pid=8236 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1018.536254][ T28] audit: type=1400 audit(1018.450:8889): avc: denied { search } for pid=8236 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1018.536542][ T28] audit: type=1400 audit(1018.450:8890): avc: denied { search } for pid=8236 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1018.544251][ T28] audit: type=1400 audit(1018.450:8891): avc: denied { search } for pid=8236 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1018.548467][ T28] audit: type=1400 audit(1018.460:8892): avc: denied { read } for pid=8236 comm="cmp" name="resolv.conf.eth3.link" dev="tmpfs" ino=38 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1018.556437][ T28] audit: type=1400 audit(1018.470:8893): avc: denied { read open } for pid=8236 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=38 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1018.561434][ T28] audit: type=1400 audit(1018.480:8894): avc: denied { sys_module } for pid=7870 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1018.576753][ T28] audit: type=1400 audit(1018.480:8895): avc: denied { module_request } for pid=7870 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1023.501832][ T28] kauditd_printk_skb: 370 callbacks suppressed [ 1023.502447][ T28] audit: type=1400 audit(1023.420:9266): avc: denied { write } for pid=8266 comm="syz.0.1211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1023.742369][ T28] audit: type=1400 audit(1023.650:9267): avc: denied { search } for pid=8265 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1023.744411][ T28] audit: type=1400 audit(1023.650:9268): avc: denied { read } for pid=8265 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1023.746301][ T28] audit: type=1400 audit(1023.660:9269): avc: denied { read open } for pid=8265 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1023.766168][ T28] audit: type=1400 audit(1023.680:9270): avc: denied { search } for pid=8265 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1023.768329][ T28] audit: type=1400 audit(1023.680:9271): avc: denied { search } for pid=8265 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1023.770619][ T28] audit: type=1400 audit(1023.680:9272): avc: denied { search } for pid=8265 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1023.773118][ T28] audit: type=1400 audit(1023.680:9273): avc: denied { read } for pid=8265 comm="cmp" name="resolv.conf.eth2.dhcp" dev="tmpfs" ino=40 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1023.841477][ T28] audit: type=1400 audit(1023.740:9274): avc: denied { module_request } for pid=7870 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1023.844351][ T28] audit: type=1400 audit(1023.750:9275): avc: denied { read open } for pid=8265 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.dhcp" dev="tmpfs" ino=40 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1026.822177][ T2856] usb 1-1: new high-speed USB device number 17 using dummy_hcd [ 1027.072130][ T2856] usb 1-1: Using ep0 maxpacket: 16 [ 1027.478618][ T2856] usb 1-1: config 0 has no interfaces? [ 1027.542269][ T2856] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1027.543540][ T2856] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1027.547860][ T2856] usb 1-1: SerialNumber: syz [ 1027.576183][ T2856] usb 1-1: config 0 descriptor?? [ 1028.139657][ T2856] usb 1-1: USB disconnect, device number 17 [ 1028.615513][ T28] kauditd_printk_skb: 218 callbacks suppressed [ 1028.626264][ T28] audit: type=1400 audit(1028.530:9494): avc: denied { read write } for pid=8281 comm="syz.0.1212" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1028.639358][ T28] audit: type=1400 audit(1028.550:9495): avc: denied { read write open } for pid=8281 comm="syz.0.1212" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1028.646111][ T28] audit: type=1400 audit(1028.560:9496): avc: denied { sys_module } for pid=7870 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1028.671871][ T28] audit: type=1400 audit(1028.580:9497): avc: denied { module_request } for pid=7870 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1028.702248][ T28] audit: type=1400 audit(1028.610:9498): avc: denied { ioctl } for pid=8281 comm="syz.0.1212" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1028.732083][ T28] audit: type=1400 audit(1028.630:9499): avc: denied { search } for pid=8292 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1028.762089][ T28] audit: type=1400 audit(1028.660:9500): avc: denied { search } for pid=8292 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1028.762596][ T28] audit: type=1400 audit(1028.660:9501): avc: denied { search } for pid=8292 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1028.762945][ T28] audit: type=1400 audit(1028.660:9502): avc: denied { getattr } for pid=8292 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=41 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1028.804788][ T28] audit: type=1400 audit(1028.710:9503): avc: denied { ioctl } for pid=8281 comm="syz.0.1212" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1029.062099][ T2856] usb 1-1: new full-speed USB device number 18 using dummy_hcd [ 1029.334068][ T2856] usb 1-1: config 0 has no interfaces? [ 1029.452907][ T2856] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1029.454086][ T2856] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 1029.466678][ T2856] usb 1-1: SerialNumber: syz [ 1029.497751][ T2856] usb 1-1: config 0 descriptor?? [ 1030.151961][ T2856] usb 1-1: USB disconnect, device number 18 [ 1030.307069][ T7870] veth0_vlan: entered promiscuous mode [ 1030.359988][ T7870] veth1_vlan: entered promiscuous mode [ 1030.786286][ T7870] veth0_macvtap: entered promiscuous mode [ 1030.845984][ T7870] veth1_macvtap: entered promiscuous mode [ 1031.125847][ T6484] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1031.126754][ T6484] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1031.126828][ T6484] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1031.126863][ T6484] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1033.704415][ T28] kauditd_printk_skb: 383 callbacks suppressed [ 1033.710421][ T28] audit: type=1400 audit(1033.620:9887): avc: denied { read write } for pid=8331 comm="syz.1.1216" name="event0" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1033.710838][ T28] audit: type=1400 audit(1033.620:9888): avc: denied { read write open } for pid=8331 comm="syz.1.1216" path="/dev/input/event0" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1033.814107][ T28] audit: type=1400 audit(1033.730:9889): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1033.880805][ T28] audit: type=1400 audit(1033.780:9890): avc: denied { search } for pid=8336 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1033.881360][ T28] audit: type=1400 audit(1033.780:9891): avc: denied { read } for pid=8336 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1033.881737][ T28] audit: type=1400 audit(1033.780:9892): avc: denied { read open } for pid=8336 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1033.881976][ T28] audit: type=1400 audit(1033.790:9893): avc: denied { search } for pid=8336 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1033.882183][ T28] audit: type=1400 audit(1033.790:9894): avc: denied { search } for pid=8336 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1033.882381][ T28] audit: type=1400 audit(1033.790:9895): avc: denied { search } for pid=8336 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1033.882586][ T28] audit: type=1400 audit(1033.790:9896): avc: denied { read } for pid=8336 comm="cmp" name="resolv.conf.eth1.dhcp" dev="tmpfs" ino=43 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1034.315703][ T40] usb 2-1: new full-speed USB device number 25 using dummy_hcd [ 1034.664791][ T40] usb 2-1: device descriptor read/64, error -71 [ 1035.014284][ T40] usb 2-1: new full-speed USB device number 26 using dummy_hcd [ 1035.448339][ T40] usb 2-1: device descriptor read/64, error -71 [ 1035.612455][ T40] usb usb2-port1: attempt power cycle [ 1036.024986][ T40] usb 2-1: new full-speed USB device number 27 using dummy_hcd [ 1036.380985][ T40] usb 2-1: device descriptor read/8, error -71 [ 1036.704955][ T40] usb 2-1: new full-speed USB device number 28 using dummy_hcd [ 1037.052826][ T40] usb 2-1: device descriptor read/8, error -71 [ 1037.215141][ T40] usb usb2-port1: unable to enumerate USB device [ 1038.430570][ T8329] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1038.442869][ T8329] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1038.753863][ T28] kauditd_printk_skb: 234 callbacks suppressed [ 1038.757896][ T28] audit: type=1400 audit(1038.670:10131): avc: denied { sys_module } for pid=8329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1038.758300][ T28] audit: type=1400 audit(1038.670:10132): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1038.951595][ T28] audit: type=1400 audit(1038.860:10133): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1039.165300][ T28] audit: type=1400 audit(1039.080:10134): avc: denied { sys_module } for pid=8329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1039.167720][ T28] audit: type=1400 audit(1039.080:10135): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1039.446825][ T28] audit: type=1400 audit(1039.360:10136): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1039.569184][ T28] audit: type=1400 audit(1039.480:10137): avc: denied { sys_module } for pid=8329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1039.570717][ T28] audit: type=1400 audit(1039.480:10138): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1039.707987][ T28] audit: type=1400 audit(1039.620:10139): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1039.880029][ T28] audit: type=1400 audit(1039.790:10140): avc: denied { sys_module } for pid=8329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1040.207925][ T8329] hsr_slave_0: entered promiscuous mode [ 1040.209402][ T8329] hsr_slave_1: entered promiscuous mode [ 1040.213464][ T8329] debugfs: 'hsr0' already exists in 'hsr' [ 1040.213743][ T8329] Cannot create hsr debugfs directory [ 1040.651674][ T8329] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1040.799463][ T8329] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1040.976183][ T8329] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1041.239819][ T8329] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1041.430569][ T8329] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1041.437035][ T8329] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 1041.446844][ T8329] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1041.455881][ T8329] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 1041.465760][ T8329] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1041.471756][ T8329] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 1041.500802][ T8329] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1041.507284][ T8329] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 1043.245427][ T8329] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1043.778238][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 1043.778665][ T28] audit: type=1400 audit(1043.680:10172): avc: denied { sys_module } for pid=8329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1043.787235][ T28] audit: type=1400 audit(1043.680:10173): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1044.046574][ T28] audit: type=1400 audit(1043.940:10174): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1044.107107][ T28] audit: type=1400 audit(1044.010:10175): avc: denied { read write } for pid=7870 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1044.113209][ T28] audit: type=1400 audit(1044.030:10176): avc: denied { read write open } for pid=7870 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1044.124858][ T28] audit: type=1400 audit(1044.030:10177): avc: denied { ioctl } for pid=7870 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1044.340486][ T8638] netlink: 132 bytes leftover after parsing attributes in process `syz.1.1218'. [ 1044.357734][ T28] audit: type=1400 audit(1044.260:10178): avc: denied { sys_module } for pid=8329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1044.382783][ T28] audit: type=1400 audit(1044.290:10179): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1044.447071][ T28] audit: type=1400 audit(1044.350:10180): avc: denied { read write } for pid=7870 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1044.465488][ T28] audit: type=1400 audit(1044.370:10181): avc: denied { read write open } for pid=7870 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1046.213672][ T3094] usb 2-1: new full-speed USB device number 29 using dummy_hcd [ 1046.560260][ T3094] usb 2-1: device descriptor read/64, error -71 [ 1046.903927][ T3094] usb 2-1: new full-speed USB device number 30 using dummy_hcd [ 1047.256550][ T3094] usb 2-1: device descriptor read/64, error -71 [ 1047.425472][ T3094] usb usb2-port1: attempt power cycle [ 1047.861484][ T3094] usb 2-1: new full-speed USB device number 31 using dummy_hcd [ 1048.211692][ T3094] usb 2-1: device descriptor read/8, error -71 [ 1048.561994][ T3094] usb 2-1: new full-speed USB device number 32 using dummy_hcd [ 1048.829659][ T28] kauditd_printk_skb: 69 callbacks suppressed [ 1048.830085][ T28] audit: type=1400 audit(1048.740:10251): avc: denied { sys_module } for pid=8329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1048.830362][ T28] audit: type=1400 audit(1048.740:10252): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1048.847871][ T28] audit: type=1400 audit(1048.740:10253): avc: denied { ioctl } for pid=8648 comm="syz.1.1221" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1048.915338][ T3094] usb 2-1: device descriptor read/8, error -71 [ 1048.917654][ T28] audit: type=1400 audit(1048.830:10254): avc: denied { ioctl } for pid=8648 comm="syz.1.1221" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1049.048971][ T28] audit: type=1400 audit(1048.910:10255): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1049.083817][ T3094] usb usb2-port1: unable to enumerate USB device [ 1049.093634][ T28] audit: type=1400 audit(1049.000:10256): avc: denied { ioctl } for pid=8648 comm="syz.1.1221" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1049.210365][ T28] audit: type=1400 audit(1049.080:10257): avc: denied { sys_module } for pid=8329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1049.215615][ T28] audit: type=1400 audit(1049.080:10258): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1049.374403][ T28] audit: type=1400 audit(1049.240:10259): avc: denied { module_request } for pid=8329 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1049.526881][ T28] audit: type=1400 audit(1049.400:10260): avc: denied { sys_module } for pid=8329 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1049.813806][ T8329] veth0_vlan: entered promiscuous mode [ 1049.884644][ T8329] veth1_vlan: entered promiscuous mode [ 1050.081652][ T8329] veth0_macvtap: entered promiscuous mode [ 1050.133756][ T8329] veth1_macvtap: entered promiscuous mode [ 1050.283763][ T7160] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1050.284202][ T7160] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1050.284691][ T7160] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1050.284806][ T7160] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1053.023515][ T8692] random: crng reseeded on system resumption [ 1054.368565][ T28] kauditd_printk_skb: 65 callbacks suppressed [ 1054.368885][ T28] audit: type=1400 audit(1054.280:10326): avc: denied { name_bind } for pid=8693 comm="syz.0.1228" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1054.394359][ T28] audit: type=1400 audit(1054.280:10327): avc: denied { node_bind } for pid=8693 comm="syz.0.1228" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1054.439795][ T28] audit: type=1400 audit(1054.350:10328): avc: denied { read write } for pid=8693 comm="syz.0.1228" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1054.445021][ T28] audit: type=1400 audit(1054.350:10329): avc: denied { read write open } for pid=8693 comm="syz.0.1228" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1054.486866][ T28] audit: type=1400 audit(1054.370:10330): avc: denied { module_request } for pid=8693 comm="syz.0.1228" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1054.960563][ T28] audit: type=1400 audit(1054.860:10331): avc: denied { sys_module } for pid=8693 comm="syz.0.1228" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1054.965817][ T28] audit: type=1400 audit(1054.860:10332): avc: denied { module_request } for pid=8693 comm="syz.0.1228" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1055.040078][ T28] audit: type=1400 audit(1054.900:10333): avc: denied { prog_load } for pid=8693 comm="syz.0.1228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1055.070396][ T28] audit: type=1400 audit(1054.980:10334): avc: denied { bpf } for pid=8693 comm="syz.0.1228" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1056.059121][ T28] audit: type=1400 audit(1055.950:10335): avc: denied { read write } for pid=7870 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1062.220892][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 1062.221533][ T28] audit: type=1400 audit(1062.110:10344): avc: denied { read write } for pid=7870 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1062.237849][ T28] audit: type=1400 audit(1062.110:10345): avc: denied { read write open } for pid=7870 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1062.250543][ T28] audit: type=1400 audit(1062.150:10346): avc: denied { ioctl } for pid=7870 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1062.607363][ T28] audit: type=1400 audit(1062.520:10347): avc: denied { append } for pid=8709 comm="syz.1.1231" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1062.631700][ T28] audit: type=1400 audit(1062.540:10348): avc: denied { append open } for pid=8709 comm="syz.1.1231" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1062.708026][ T28] audit: type=1400 audit(1062.600:10349): avc: denied { read write } for pid=7870 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1062.710544][ T28] audit: type=1400 audit(1062.600:10350): avc: denied { read write open } for pid=7870 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1062.715694][ T28] audit: type=1400 audit(1062.600:10351): avc: denied { ioctl } for pid=7870 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1062.925569][ T28] audit: type=1400 audit(1062.840:10352): avc: denied { prog_load } for pid=8711 comm="syz.1.1232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1062.931716][ T28] audit: type=1400 audit(1062.840:10353): avc: denied { bpf } for pid=8711 comm="syz.1.1232" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1065.726698][ T8718] netlink: 68 bytes leftover after parsing attributes in process `syz.1.1234'. [ 1067.399643][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 1067.400072][ T28] audit: type=1400 audit(1067.290:10391): avc: denied { name_bind } for pid=8724 comm="syz.1.1238" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1067.400302][ T28] audit: type=1400 audit(1067.290:10392): avc: denied { node_bind } for pid=8724 comm="syz.1.1238" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1068.366162][ T8727] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=8727 comm=syz.0.1237 [ 1068.418852][ T28] audit: type=1400 audit(1068.330:10393): avc: denied { read write } for pid=8329 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1068.433408][ T28] audit: type=1400 audit(1068.330:10394): avc: denied { read write open } for pid=8329 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1068.436867][ T28] audit: type=1400 audit(1068.330:10395): avc: denied { ioctl } for pid=8329 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1068.664833][ T28] audit: type=1400 audit(1068.570:10396): avc: denied { bpf } for pid=8728 comm="syz.0.1239" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1068.673374][ T28] audit: type=1400 audit(1068.570:10397): avc: denied { prog_load } for pid=8728 comm="syz.0.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1068.688186][ T28] audit: type=1400 audit(1068.570:10398): avc: denied { bpf } for pid=8728 comm="syz.0.1239" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1068.734900][ T28] audit: type=1400 audit(1068.630:10399): avc: denied { bpf } for pid=8728 comm="syz.0.1239" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1068.786941][ T28] audit: type=1400 audit(1068.690:10400): avc: denied { read write } for pid=8329 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1069.744847][ T8737] random: crng reseeded on system resumption [ 1071.475440][ T8749] vcan0: tx drop: invalid sa for name 0x0000000000000001 [ 1072.557533][ T28] kauditd_printk_skb: 103 callbacks suppressed [ 1072.557980][ T28] audit: type=1400 audit(1072.450:10504): avc: denied { map_create } for pid=8754 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1072.570464][ T28] audit: type=1400 audit(1072.450:10505): avc: denied { map_create } for pid=8754 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1072.572593][ T28] audit: type=1400 audit(1072.450:10506): avc: denied { map_read map_write } for pid=8754 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1073.027583][ T28] audit: type=1400 audit(1072.930:10507): avc: denied { read write } for pid=8329 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1073.030125][ T28] audit: type=1400 audit(1072.930:10508): avc: denied { read write open } for pid=8329 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1073.032971][ T28] audit: type=1400 audit(1072.930:10509): avc: denied { ioctl } for pid=8329 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1073.154619][ T28] audit: type=1400 audit(1073.050:10510): avc: denied { create } for pid=8754 comm="syz.1.1252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1073.311629][ T28] audit: type=1400 audit(1073.170:10511): avc: denied { read write } for pid=7870 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1073.314980][ T28] audit: type=1400 audit(1073.230:10512): avc: denied { read write open } for pid=7870 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1073.318548][ T28] audit: type=1400 audit(1073.230:10513): avc: denied { ioctl } for pid=7870 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1077.546079][ T28] kauditd_printk_skb: 163 callbacks suppressed [ 1077.546502][ T28] audit: type=1400 audit(1077.460:10677): avc: denied { module_request } for pid=8781 comm="syz.1.1263" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1077.560047][ T28] audit: type=1400 audit(1077.460:10678): avc: denied { create } for pid=8784 comm="syz.0.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1077.565554][ T28] audit: type=1400 audit(1077.460:10679): avc: denied { create } for pid=8784 comm="syz.0.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1077.571868][ T28] audit: type=1400 audit(1077.460:10680): avc: denied { write } for pid=8784 comm="syz.0.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1077.590985][ T28] audit: type=1400 audit(1077.460:10681): avc: denied { write } for pid=8784 comm="syz.0.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1077.591225][ T28] audit: type=1400 audit(1077.460:10682): avc: denied { write } for pid=8781 comm="syz.1.1263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1077.591422][ T28] audit: type=1400 audit(1077.460:10683): avc: denied { write } for pid=8784 comm="syz.0.1264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1077.825182][ T28] audit: type=1400 audit(1077.700:10684): avc: denied { read write } for pid=8329 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1077.825500][ T28] audit: type=1400 audit(1077.700:10685): avc: denied { read write open } for pid=8329 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1077.826902][ T28] audit: type=1400 audit(1077.700:10686): avc: denied { ioctl } for pid=8329 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1080.145555][ T8795] ------------[ cut here ]------------ [ 1080.146001][ T8795] WARNING: kernel/signal.c:2174 at do_notify_parent+0x37c/0x384, CPU#1: syz.0.1267/8795 [ 1080.148952][ T8795] Modules linked in: [ 1080.150056][ T8795] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1080.150710][ T8795] CPU: 1 UID: 0 PID: 8795 Comm: syz.0.1267 Not tainted syzkaller #0 PREEMPT [ 1080.151129][ T8795] Hardware name: ARM-Versatile Express [ 1080.151393][ T8795] Call trace: [ 1080.151583][ T8795] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1080.151971][ T8795] r7:82a1e7b8 r6:00000000 r5:8231c340 r4:00000001 [ 1080.152238][ T8795] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 1080.152581][ T8795] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 1080.152965][ T8795] r7:82a1e7b8 r6:00000000 r5:84fc4980 r4:82c7bd3c [ 1080.153252][ T8795] [<8021e334>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 1080.153577][ T8795] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 1080.153904][ T8795] r7:80265f80 [ 1080.154109][ T8795] [<80202818>] (panic) from [<802506a8>] (get_taint+0x0/0x1c) [ 1080.154812][ T8795] r3:82a0b544 r2:00000001 r1:82302e28 r0:8230a708 [ 1080.155071][ T8795] [<80250630>] (check_panic_on_warn) from [<80250824>] (__warn+0x98/0x1ac) [ 1080.155476][ T8795] [<8025078c>] (__warn) from [<80250ab0>] (warn_slowpath_fmt+0x178/0x1f4) [ 1080.155828][ T8795] r8:00000009 r7:8230b904 r6:df8f9ebc r5:84fc4980 r4:00000000 [ 1080.156108][ T8795] [<8025093c>] (warn_slowpath_fmt) from [<80265f80>] (do_notify_parent+0x37c/0x384) [ 1080.156505][ T8795] r10:84fc5074 r9:00000000 r8:df8f9f68 r7:84fc5250 r6:00000080 r5:84fc4980 [ 1080.156862][ T8795] r4:84fc4980 [ 1080.157054][ T8795] [<80265c04>] (do_notify_parent) from [<80257a90>] (do_exit+0x798/0xae4) [ 1080.157428][ T8795] r8:df8f9f68 r7:84fc5250 r6:83141c00 r5:84fc4980 r4:839d4980 [ 1080.157791][ T8795] [<802572f8>] (do_exit) from [<80257f68>] (do_group_exit+0x0/0x8c) [ 1080.158163][ T8795] r7:00000001 [ 1080.158337][ T8795] [<80257f50>] (sys_exit) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1080.158665][ T8795] Exception stack(0xdf8f9fa8 to 0xdf8f9ff0) [ 1080.158949][ T8795] 9fa0: 00000000 00000000 00000000 00000000 00000000 00000000 [ 1080.159295][ T8795] 9fc0: 00000000 00000000 00000000 00000001 003462d8 00000000 003d0f00 76f760dc [ 1080.159669][ T8795] 9fe0: 76f75e60 76f75e50 000193b4 001307a0 [ 1080.163237][ T8795] Rebooting in 86400 seconds..