last executing test programs: 28m8.869950034s ago: executing program 1 (id=419): r0 = openat$audio1(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) read$dsp(r0, &(0x7f0000000040)=""/78, 0x4e) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'ip6gre0\x00', r1, 0x4, 0x8, 0x7f, 0x5, 0x0, @rand_addr=' \x01\x00', @dev={0xfe, 0x80, '\x00', 0x2e}, 0x8, 0x40, 0xc4eb, 0xa}}) tee(r0, r0, 0xd, 0x3) r2 = openat$selinux_avc_hash_stats(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_INTERFACE(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x28, 0x0, 0x5, 0x70bd2b, 0x25dfdbfc, {{}, {@void, @val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_4ADDR={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x4800) close$binfmt(r2) r4 = dup2(r0, r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000340), r4) ioctl$SNDCTL_DSP_STEREO(r0, 0xc0045003, &(0x7f0000000380)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f00000003c0)={'icmp\x00'}, &(0x7f0000000400)=0x1e) ioctl$EVIOCSMASK(r4, 0x40104593, &(0x7f0000000540)={0x16, 0xee, &(0x7f0000000440)="7d5281a6bfdb307e76c34ebb8628a6ad5152b50cd950fc4ddedc35e1dbe284bfcf2cc9fd05dfad18e1fbdc3b4e599f0b5e6090c3264720bfbf4fae186f57c8eb94544a0a400ce1734c55c9d5edef7aabbe642213136e8457f56f2189d8c11dccba2c16b00493b950097db8b2f95deb7e15fb71794f1bef0b4836b9dbbd33fd738badb6dca6e1f99561417b98748793701fa56f20a98655682edec74c144bedda9023acefd65563f921d76edf3968e0f91483829848cbf925530e239c87936ab081423e5955e8b04c79414c16a62219a94b5c48782187cde87371091010d1a37a9f817716d1612fd34ee70ef1e1ad"}) sendmsg$NL80211_CMD_NEW_STATION(r4, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x480000}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0xd0, 0x0, 0x400, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x1, 0x2b}}}}, [@NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_STA_WME={0xc, 0x81, [@NL80211_STA_WME_MAX_SP={0x5, 0x2, 0x47}]}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x653}, @NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x744}, @NL80211_ATTR_MGMT_SUBTYPE={0x5, 0x29, 0xa}, @NL80211_ATTR_STA_EXT_CAPABILITY={0x5b, 0xac, "80c18d65c778a9a24185ef10b89eb760c93df2712fef1ea0bc2cb71e4341ff910a4ab960212ec7b4af8c7133e54885b66d8397ccc0342bd600c921bd3019b900f84b5a69fdabff05bb7a196e26e440edbfae428ef85332"}, @NL80211_ATTR_STA_AID={0x6, 0x10, 0x64}, @NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x2}]}, 0xd0}, 0x1, 0x0, 0x0, 0x4006000}, 0x4008810) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740), r2) sendmsg$TIPC_NL_NAME_TABLE_GET(r4, &(0x7f0000000940)={0xfffffffffffffffe, 0x0, &(0x7f0000000900)={&(0x7f0000000780)={0x178, r5, 0x100, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x9e00000}]}, @TIPC_NLA_BEARER={0x8c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}]}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6c89}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xff}]}, @TIPC_NLA_NODE={0x48, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x43, 0x4, {'gcm(aes)\x00', 0x1b, "4c22649f96835f583edc997078241d8a0793a267a0b2312e94e97a"}}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xcd46}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x4008880}, 0x8000) timer_create(0x3, &(0x7f0000000a40)={0x0, 0x2c, 0x2, @thr={&(0x7f0000000980)="f78e0457efb71d7d404c74eb4891e80d1166d310ba3e005b3f8a3b122f52bd5a4feb05f16357b703fc5397e9d3ffe353af506c4f1be55a4e433e4c5ad0289b024800246cb7fd4bb73c", &(0x7f0000000a00)="81ea3b62b408234c5ac68a3062515f45c6ed50910ff1bbf639df7ab86c4a460d4817"}}, &(0x7f0000000a80)=0x0) clock_gettime(0x0, &(0x7f0000000ac0)={0x0, 0x0}) timer_settime(r6, 0x0, &(0x7f0000000b00)={{0x0, 0x989680}, {r7, r8+10000000}}, &(0x7f0000000b40)) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000bc0), r2) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r2, &(0x7f0000000cc0)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000c00)={0x80, r9, 0x200, 0x70bd25, 0x25dfdbfc, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x11, 0x19a4}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffffc}, {0x6, 0x11, 0x8}}]}, 0x80}, 0x1, 0x0, 0x0, 0x10000817}, 0x8004) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000d00)={0x0, 0x5, [0xffffffff00000001, 0x0, 0x7ff, 0x0, 0x8000, 0x9]}) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000d40)=0x4) write$P9_ROPEN(r4, &(0x7f0000000d80)={0x18, 0x71, 0x2, {{0x40, 0x4, 0x6}, 0xffff}}, 0x18) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000dc0)) socket$nl_route(0x10, 0x3, 0x0) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000e40), r2) sendmsg$NL80211_CMD_SET_MPATH(r2, &(0x7f0000000f00)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e80)={0x40, r10, 0x400, 0x70bd2b, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x40}, 0x1, 0x0, 0x0, 0x8d1}, 0xa0) syz_open_procfs$userns(0x0, &(0x7f0000000f40)) 28m7.929914197s ago: executing program 1 (id=422): socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = inotify_init1(0x0) r3 = dup3(r1, r2, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x8, 0x11, 0x3}}}, 0x24}, 0x1, 0x0, 0x0, 0x48010}, 0x8010) r4 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[], 0x33fe0}}, 0x0) timer_create(0x0, &(0x7f0000000380)={0x0, 0x21}, &(0x7f0000000340)=0x0) sendmsg$nl_crypto(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000000) socket(0x1d, 0x2, 0x7) openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x10) timer_settime(r5, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000300)={'gre0\x00', 0x0}) 28m6.285112547s ago: executing program 1 (id=423): r0 = openat$vcs(0xffffff9c, &(0x7f0000000040), 0x2c02c1, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001cc0)={0x0}, 0x1, 0x0, 0x0, 0x20044040}, 0xc054) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$TIOCVHANGUP(r4, 0x5451, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ppoll(&(0x7f0000000140)=[{r4, 0x21}, {r4, 0x6061}, {r5, 0x2004}, {r3, 0x2000}, {r4, 0x5580}], 0x5, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0xf5f, 0x4]}, 0x8) openat$loop_ctrl(0xffffff9c, &(0x7f0000000000), 0x2000, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) 28m6.002994886s ago: executing program 1 (id=424): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x3, 0x6) ioctl$TIOCL_BLANKSCREEN(r1, 0x5450, 0x0) r2 = getpid() r3 = syz_pidfd_open(r2, 0x0) ioctl$UFFDIO_API(r3, 0xff03, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r6 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r8, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000008540)=0x80) close(r9) r10 = socket$unix(0x1, 0x1, 0x0) bind$unix(r10, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r10, 0x0) connect$unix(r7, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r11 = accept$packet(r9, 0x0, 0x0) write$tun(r11, 0x0, 0x0) mmap$snddsp_status(&(0x7f0000ff8000/0x3000)=nil, 0x1000, 0x0, 0x10, r6, 0x82000000) r12 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r12, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r5, 0x1, 0x0, 0x0, {{0x2}, {@void, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x9b4}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_NOACK_MAP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="00022bbd7000fcdbdf255700000008000300", @ANYRES32=r13, @ANYBLOB="060095000010000006009500ff03000006009500140800000600950004000000"], 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x20000080) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, 0x0) openat$rdma_cm(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 28m5.080329229s ago: executing program 1 (id=427): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = dup(r1) r3 = socket$netlink(0x10, 0x3, 0xf) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0x5452, &(0x7f0000000040)={r3}) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$cgroup_ro(r2, &(0x7f00000002c0)='rdma.current\x00', 0x0, 0x0) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000340), r2) sendmsg$MPTCP_PM_CMD_SET_FLAGS(r6, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r7, 0x1, 0x70bd2c, 0x7}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x88810) ioctl$PIO_FONTX(r5, 0x5450, 0x0) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), r4) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000480)={'erspan0\x00', 0x0, 0x16, 0x40, 0x134a, 0x9, {{0x25, 0x4, 0x0, 0x4, 0x94, 0x67, 0x0, 0x9, 0x29, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x33}, {[@rr={0x7, 0x17, 0xe7, [@private=0xa010102, @broadcast, @remote, @empty, @rand_addr=0x64010100]}, @noop, @end, @end, @timestamp_addr={0x44, 0x3c, 0xfa, 0x1, 0x8, [{@empty, 0x114}, {@multicast2, 0x7f}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@rand_addr=0x64010102, 0x26}, {@broadcast, 0x6}, {@multicast2, 0x6}, {@private=0xa010102, 0x3}]}, @noop, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x24, 0x3, [{0x6, 0x6, "2853aee9"}, {0x6, 0xd, "d40c44e94f218464535f9d"}, {0x6, 0xb, "1b861d257ecd29cc83"}]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'ip6tnl0\x00', 0x0, 0x2f, 0x80, 0xf, 0x2, 0x2, @local, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x20, 0x80, 0x3, 0x81}}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r5, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)={0x8c, r8, 0x8, 0x70bd2d, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x1}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8ce5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x207}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xf9}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x35}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r9}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r10}]}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x2c, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}]}]}, 0x8c}}, 0x8) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x1, 0x70bd27, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x24004005}, 0x4) ioctl$sock_inet_SIOCGIFADDR(r2, 0x5421, &(0x7f00000000c0)={'dvmrp0\x00'}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x8}) openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)={0x2040}, 0x18) 28m4.852171924s ago: executing program 1 (id=428): r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x272a80, 0x0) close(r0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0xd931d3864d39ddd8) close(r1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x20, 0x70bd2c, 0xfffffffe, {{}, {@void, @val={0xc, 0x99, {0x4, 0x3b}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24044044) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0xc000}, 0x4020804) 27m19.127642635s ago: executing program 32 (id=428): r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x272a80, 0x0) close(r0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0xd931d3864d39ddd8) close(r1) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x0, 0x20, 0x70bd2c, 0xfffffffe, {{}, {@void, @val={0xc, 0x99, {0x4, 0x3b}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24044044) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}, 0x1, 0x0, 0x0, 0xc000}, 0x4020804) 5.895100875s ago: executing program 0 (id=2225): io_pgetevents(0x0, 0x8000023, 0x0, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0), 0x8}) 5.655576321s ago: executing program 2 (id=2226): r0 = socket(0x10, 0x803, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x5}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000013c0)=@newtfilter={0x4e8, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r2, {0xf}, {}, {0xa, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x4bc, 0x2, [@TCA_U32_POLICE={0x444, 0x6, [@TCA_POLICE_RATE={0x404, 0x2, [0x2dbc04b6, 0x1, 0x10, 0xa, 0x4, 0x0, 0x3, 0x10, 0x7, 0x9, 0x0, 0xd, 0x8, 0x5, 0x7f, 0x9, 0x9, 0x4, 0x81, 0x5, 0x537d, 0x0, 0xfffffffa, 0x12000000, 0x6, 0x3, 0x4, 0x0, 0xffffffff, 0x8, 0x0, 0x1, 0x7, 0x7fff, 0x0, 0xffffffff, 0x10, 0x258, 0x5, 0x8, 0x4, 0x1d, 0x5, 0x1, 0xfffff173, 0x1, 0x401, 0x7, 0x8000, 0x10000, 0xe, 0x3, 0x1, 0xd, 0x8, 0x0, 0x0, 0x4, 0xa79, 0x5, 0xc, 0x2, 0x0, 0x30000, 0xd, 0x6, 0xfff, 0x40, 0xfffeffff, 0x7fff, 0x6b81102, 0x7f, 0xfffffffe, 0x800000, 0x6, 0x8, 0x0, 0xe, 0x20000, 0xffff, 0x80000001, 0x1, 0x9a0, 0x4, 0x8, 0x6, 0x7, 0xfffffffb, 0x1ff, 0x3ff, 0x0, 0x40, 0xfc5, 0x800000, 0xb422, 0x7, 0x1, 0x8, 0x1, 0xa0bd, 0x200, 0x400, 0x1, 0xc, 0xff, 0x3, 0x2, 0xffffffc0, 0x8, 0x8001, 0x3f3, 0x8, 0x9, 0xf, 0x4, 0x3, 0x0, 0x6, 0xd, 0x8, 0x9, 0x800, 0x0, 0x9, 0x3, 0x8, 0x2, 0xf4, 0x81, 0x0, 0x6, 0x200, 0xad07, 0x8001, 0x8, 0x9, 0x100, 0x1, 0xb10, 0x8, 0x7, 0xfff, 0xa, 0x4e, 0x80, 0xfec300, 0xe815, 0x1, 0xfffffff9, 0xfffff801, 0x9, 0x1, 0xff, 0x7, 0x7, 0x7, 0x8001, 0x7, 0x1ff, 0x401, 0x5, 0x2, 0x1ff, 0x4, 0x2, 0x5f, 0x2, 0x1, 0x1, 0xb, 0x7, 0xb, 0x7, 0x9, 0x9, 0x68, 0x8, 0x6, 0x4, 0x9ca, 0x100, 0x9, 0xfff, 0xfffffffd, 0x1, 0xf, 0x2, 0xfffffff8, 0x80000001, 0x4, 0x3, 0x8, 0x8, 0x9, 0x3, 0x1, 0x7, 0x8, 0x5, 0x4, 0xc, 0x0, 0xf, 0x80000000, 0x5, 0x5, 0xfffffff7, 0xd6f, 0x4, 0x38, 0x1, 0x6, 0x9bb, 0xd31d, 0xfff, 0xfff, 0x40, 0x101, 0x3, 0x4, 0x0, 0x1ff, 0x6, 0x0, 0x9, 0x1, 0x4, 0x0, 0x1000, 0x5, 0x1c000000, 0x1, 0x6, 0x9, 0x6, 0x3, 0x1, 0x0, 0x10000, 0x2, 0x7, 0x7, 0x6, 0xfffffff0, 0x2, 0x3, 0x8090, 0x7, 0x6d8, 0xfffffffb, 0x6, 0x400, 0x800, 0x8, 0x6, 0x76]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x6e8ccd9d, 0x8, 0x9, 0x9, 0x7fffffff, {0x8, 0x2, 0x92fd, 0x0, 0x1, 0x100}, {0x1, 0x2, 0xab11, 0x7, 0x6}, 0x3, 0x2, 0x6}}]}, @TCA_U32_SEL={0x74, 0x5, {0xf, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1000, 0xe, 0xfffff000, 0x9f6}, {0xdeb2, 0x3, 0x6, 0x3}, {0x1, 0xfffffffb, 0x100, 0x3ff}, {0x200, 0x3ff, 0x3, 0x4}, {0x9, 0x7, 0x40, 0x80}, {0x3ff, 0xb, 0x3, 0xa6d}]}}]}}]}, 0x4e8}, 0x1, 0x0, 0x0, 0xccd4ddef28b9e90e}, 0x40094) 5.261552277s ago: executing program 0 (id=2227): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x1c0002, 0x0) write$vga_arbiter(r0, &(0x7f0000000000)=@other={'lock', ' ', 'io+mem'}, 0xc) write$vga_arbiter(r0, &(0x7f0000000100)=@other={'unlock', ' ', 'io+mem'}, 0xe) 4.888591662s ago: executing program 2 (id=2228): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="60000000020605020000200000000000000000001400078008001340040000000800124000060000050001000700000013000300686173683a6e65742c696661636500000500044000000000090002"], 0x60}}, 0x0) 4.492619289s ago: executing program 0 (id=2229): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_DEL_KEY(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x34, r0, 0x1, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_KEY={0xc, 0x50, 0x0, 0x1, [@NL80211_KEY_IDX={0x5, 0x2, 0x2}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x818}, 0x4000) 3.511743085s ago: executing program 2 (id=2230): r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000580)=ANY=[@ANYBLOB="1201000083667d1040206402d14e0102030109021b000100000000090400000190f19c00090584"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, &(0x7f0000000300)={0x1c, &(0x7f0000000000)={0x0, 0xe}, 0x0, 0x0}) 2.52853838s ago: executing program 2 (id=2231): syz_emit_ethernet(0x86, &(0x7f0000000000)={@multicast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x8000000, 0xe0, "00000001390403040101000000000001000000efffffffff00", "93a0bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a13bd5b6cc6a9471314a1d8c69"}}}}}}}, 0x0) 1.682381717s ago: executing program 2 (id=2232): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, 0x0, 0x0, 0x4}, 0x20) 1.64069696s ago: executing program 0 (id=2233): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @xfrm={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_XFRM_DREG={0x8, 0x1, 0x1, 0x0, 0x12}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x4}, @NFTA_XFRM_DIR={0x5, 0x3, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x84}}, 0x0) 1.19559455s ago: executing program 0 (id=2234): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) close(0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x4d, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001300)=@newqdisc={0x24, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r3, {0x10}, {}, {0x2, 0x3}}}, 0x24}, 0x1, 0x0, 0x0, 0x40098}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) 966.265865ms ago: executing program 2 (id=2235): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) connect$can_bcm(r0, &(0x7f0000000140), 0x10) recvmmsg(r0, &(0x7f0000007140)=[{{0x0, 0x0, 0x0}, 0x6}], 0x1, 0x40010000, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000180)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=@getchain={0x24, 0x11, 0x839, 0x70bd25, 0x0, {0x0, 0x0, 0x0, r3, {0xb, 0x6}, {0x3, 0xfff9}, {0x2}}}, 0x24}}, 0x0) 0s ago: executing program 0 (id=2236): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x1f, 0x10000, 0x4, 0x5, 0xcc7, 0x8, 0x7, 0xa, 0x100, 0x2, 0x1, 0x2, 0x1, 0x6, 0x101, 0x0, 0x1a449, 0x3, 0x40000003, 0x89, 0xcaa7, 0x0, 0x20001e58, 0xb, 0xe69, 0x3c, 0x8, 0x6, 0x0, 0xfffffff8]}) kernel console output (not intermixed with test programs): tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1591.338933][ T29] audit: type=1400 audit(2000000101.520:8935): avc: denied { read } for pid=11812 comm="syz.0.1969" name="controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1591.339359][ T29] audit: type=1400 audit(2000000101.530:8936): avc: denied { read open } for pid=11812 comm="syz.0.1969" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1591.346401][ T29] audit: type=1400 audit(2000000101.530:8937): avc: denied { ioctl } for pid=11812 comm="syz.0.1969" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x4dff scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1591.511747][ T29] audit: type=1400 audit(2000000101.710:8938): avc: denied { prog_load } for pid=11814 comm="syz.0.1970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1591.515209][ T29] audit: type=1400 audit(2000000101.710:8939): avc: denied { bpf } for pid=11814 comm="syz.0.1970" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1591.530705][ T29] audit: type=1400 audit(2000000101.720:8940): avc: denied { perfmon } for pid=11814 comm="syz.0.1970" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1591.537301][ T29] audit: type=1400 audit(2000000101.730:8941): avc: denied { perfmon } for pid=11814 comm="syz.0.1970" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1591.547154][ T29] audit: type=1400 audit(2000000101.740:8942): avc: denied { perfmon } for pid=11814 comm="syz.0.1970" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1591.560008][ T29] audit: type=1400 audit(2000000101.760:8943): avc: denied { perfmon } for pid=11814 comm="syz.0.1970" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1591.569939][ T29] audit: type=1400 audit(2000000101.770:8944): avc: denied { perfmon } for pid=11814 comm="syz.0.1970" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1598.322684][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 1598.329240][ T29] audit: type=1400 audit(2000000108.520:8960): avc: denied { prog_load } for pid=11823 comm="syz.2.1973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1598.331557][ T29] audit: type=1400 audit(2000000108.520:8961): avc: denied { bpf } for pid=11823 comm="syz.2.1973" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1598.333497][ T29] audit: type=1400 audit(2000000108.530:8962): avc: denied { perfmon } for pid=11823 comm="syz.2.1973" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1598.336169][ T29] audit: type=1400 audit(2000000108.530:8963): avc: denied { perfmon } for pid=11823 comm="syz.2.1973" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1598.337232][ T29] audit: type=1400 audit(2000000108.530:8964): avc: denied { perfmon } for pid=11823 comm="syz.2.1973" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1598.347685][ T29] audit: type=1400 audit(2000000108.540:8965): avc: denied { perfmon } for pid=11823 comm="syz.2.1973" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1598.358757][ T29] audit: type=1400 audit(2000000108.540:8966): avc: denied { perfmon } for pid=11823 comm="syz.2.1973" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1598.361050][ T29] audit: type=1400 audit(2000000108.540:8967): avc: denied { bpf } for pid=11823 comm="syz.2.1973" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1598.363169][ T29] audit: type=1400 audit(2000000108.550:8968): avc: denied { bpf } for pid=11823 comm="syz.2.1973" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1598.364997][ T29] audit: type=1400 audit(2000000108.550:8969): avc: denied { prog_run } for pid=11823 comm="syz.2.1973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1604.569958][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 1604.587251][ T29] audit: type=1400 audit(2000000114.770:8976): avc: denied { read append } for pid=11843 comm="syz.0.1982" name="sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1604.599725][ T29] audit: type=1400 audit(2000000114.770:8977): avc: denied { ioctl open } for pid=11843 comm="syz.0.1982" path="/dev/sequencer2" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1604.634276][ T29] audit: type=1400 audit(2000000114.830:8978): avc: denied { ioctl } for pid=11843 comm="syz.0.1982" path="/dev/sequencer2" dev="devtmpfs" ino=722 ioctlcmd=0x5112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1605.230827][ T29] audit: type=1400 audit(2000000115.420:8979): avc: denied { read write } for pid=11847 comm="syz.0.1984" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1605.249559][ T29] audit: type=1400 audit(2000000115.430:8980): avc: denied { read write open } for pid=11847 comm="syz.0.1984" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1605.251824][ T29] audit: type=1400 audit(2000000115.430:8981): avc: denied { ioctl } for pid=11847 comm="syz.0.1984" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1605.695359][ T29] audit: type=1400 audit(2000000115.890:8982): avc: denied { write } for pid=11856 comm="syz.0.1986" name="midiC2D0" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1605.699039][ T29] audit: type=1400 audit(2000000115.890:8983): avc: denied { write open } for pid=11856 comm="syz.0.1986" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1605.729967][ T29] audit: type=1400 audit(2000000115.920:8984): avc: denied { ioctl } for pid=11856 comm="syz.0.1986" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=740 ioctlcmd=0x5710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1605.861055][ T29] audit: type=1400 audit(2000000116.060:8985): avc: denied { bpf } for pid=11858 comm="syz.2.1987" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1606.895119][T11869] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1991'. [ 1610.015851][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 1610.026329][ T29] audit: type=1400 audit(2000000120.210:9030): avc: denied { read } for pid=11895 comm="syz.0.1998" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1610.028558][ T29] audit: type=1400 audit(2000000120.220:9031): avc: denied { read open } for pid=11895 comm="syz.0.1998" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1610.030383][ T29] audit: type=1400 audit(2000000120.220:9032): avc: denied { create } for pid=11895 comm="syz.0.1998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1610.050110][ T29] audit: type=1400 audit(2000000120.250:9033): avc: denied { create } for pid=11896 comm="syz.2.1999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1610.077400][ T29] audit: type=1400 audit(2000000120.270:9034): avc: denied { write } for pid=11896 comm="syz.2.1999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1610.559461][ T29] audit: type=1400 audit(2000000120.750:9035): avc: denied { mount } for pid=11900 comm="syz.2.2001" name="/" dev="configfs" ino=1068 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1611.299682][ T29] audit: type=1400 audit(2000000121.480:9036): avc: denied { create } for pid=11905 comm="syz.0.2002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1611.709083][ T29] audit: type=1400 audit(2000000121.870:9037): avc: denied { prog_load } for pid=11900 comm="syz.2.2001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1611.752751][ T29] audit: type=1400 audit(2000000121.900:9038): avc: denied { bpf } for pid=11900 comm="syz.2.2001" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1611.755788][ T29] audit: type=1400 audit(2000000121.950:9039): avc: denied { perfmon } for pid=11900 comm="syz.2.2001" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1615.049376][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 1615.057957][ T29] audit: type=1400 audit(2000000125.230:9112): avc: denied { getattr } for pid=11916 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1615.063026][ T29] audit: type=1400 audit(2000000125.240:9113): avc: denied { search } for pid=11916 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1615.064711][ T29] audit: type=1400 audit(2000000125.240:9114): avc: denied { search } for pid=11916 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1615.066390][ T29] audit: type=1400 audit(2000000125.240:9115): avc: denied { search } for pid=11916 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1615.068443][ T29] audit: type=1400 audit(2000000125.240:9116): avc: denied { search } for pid=11916 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1615.072478][ T29] audit: type=1400 audit(2000000125.270:9117): avc: denied { search } for pid=11916 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1615.074378][ T29] audit: type=1400 audit(2000000125.270:9118): avc: denied { search } for pid=11916 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1615.077841][ T29] audit: type=1400 audit(2000000125.270:9119): avc: denied { search } for pid=11916 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1615.128657][ T29] audit: type=1400 audit(2000000125.310:9120): avc: denied { read open } for pid=11916 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1615.130170][ T29] audit: type=1400 audit(2000000125.310:9121): avc: denied { getattr } for pid=11916 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1627.573677][ T29] kauditd_printk_skb: 145 callbacks suppressed [ 1627.575014][ T29] audit: type=1400 audit(2000000137.770:9267): avc: denied { read } for pid=11930 comm="syz.2.2009" name="event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1627.602012][ T29] audit: type=1400 audit(2000000137.800:9268): avc: denied { read open } for pid=11930 comm="syz.2.2009" path="/dev/input/event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1628.197422][ T29] audit: type=1400 audit(2000000138.390:9269): avc: denied { create } for pid=11932 comm="syz.2.2010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1628.207983][ T29] audit: type=1400 audit(2000000138.400:9270): avc: denied { getopt } for pid=11932 comm="syz.2.2010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1628.589482][ T29] audit: type=1400 audit(2000000138.780:9271): avc: denied { create } for pid=11934 comm="syz.2.2011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1628.616052][ T29] audit: type=1400 audit(2000000138.800:9272): avc: denied { execmem } for pid=11934 comm="syz.2.2011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1631.486387][ T29] audit: type=1400 audit(2000000141.680:9273): avc: denied { write } for pid=11934 comm="syz.2.2011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1632.265873][ T29] audit: type=1400 audit(2000000142.460:9274): avc: denied { create } for pid=11938 comm="syz.0.2012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1633.351335][ T29] audit: type=1400 audit(2000000143.540:9275): avc: denied { prog_load } for pid=11938 comm="syz.0.2012" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1633.351749][ T29] audit: type=1400 audit(2000000143.550:9276): avc: denied { bpf } for pid=11938 comm="syz.0.2012" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.375001][ T29] audit: type=1400 audit(2000000143.570:9277): avc: denied { perfmon } for pid=11938 comm="syz.0.2012" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.406126][ T29] audit: type=1400 audit(2000000143.600:9278): avc: denied { perfmon } for pid=11938 comm="syz.0.2012" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.421965][ T29] audit: type=1400 audit(2000000143.620:9279): avc: denied { perfmon } for pid=11938 comm="syz.0.2012" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.441596][ T29] audit: type=1400 audit(2000000143.640:9280): avc: denied { perfmon } for pid=11938 comm="syz.0.2012" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.458974][ T29] audit: type=1400 audit(2000000143.640:9281): avc: denied { perfmon } for pid=11938 comm="syz.0.2012" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.492632][ T29] audit: type=1400 audit(2000000143.690:9282): avc: denied { bpf } for pid=11938 comm="syz.0.2012" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.504383][ T29] audit: type=1400 audit(2000000143.700:9283): avc: denied { bpf } for pid=11938 comm="syz.0.2012" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1633.523841][ T29] audit: type=1400 audit(2000000143.720:9284): avc: denied { perfmon } for pid=11938 comm="syz.0.2012" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1646.029851][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 1646.034547][ T29] audit: type=1400 audit(2000000156.230:9304): avc: denied { map_create } for pid=11945 comm="syz.2.2013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1646.057471][ T29] audit: type=1400 audit(2000000156.250:9305): avc: denied { prog_load } for pid=11945 comm="syz.2.2013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1646.065340][ T29] audit: type=1400 audit(2000000156.260:9306): avc: denied { bpf } for pid=11945 comm="syz.2.2013" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1646.079202][ T29] audit: type=1400 audit(2000000156.270:9307): avc: denied { perfmon } for pid=11945 comm="syz.2.2013" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1646.099580][ T29] audit: type=1400 audit(2000000156.280:9308): avc: denied { perfmon } for pid=11945 comm="syz.2.2013" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1646.103812][ T29] audit: type=1400 audit(2000000156.300:9309): avc: denied { perfmon } for pid=11945 comm="syz.2.2013" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1646.123022][ T29] audit: type=1400 audit(2000000156.310:9310): avc: denied { perfmon } for pid=11945 comm="syz.2.2013" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1646.141032][ T29] audit: type=1400 audit(2000000156.340:9311): avc: denied { perfmon } for pid=11945 comm="syz.2.2013" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1646.163548][ T29] audit: type=1400 audit(2000000156.360:9312): avc: denied { bpf } for pid=11945 comm="syz.2.2013" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1646.189312][ T29] audit: type=1400 audit(2000000156.380:9313): avc: denied { bpf } for pid=11945 comm="syz.2.2013" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1648.802710][T11954] netlink: 'syz.2.2013': attribute type 10 has an invalid length. [ 1649.518888][T11961] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2017'. [ 1660.024843][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 1660.026376][ T29] audit: type=1400 audit(2000000170.220:9354): avc: denied { read write } for pid=11977 comm="syz.2.2020" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1660.034624][ T29] audit: type=1400 audit(2000000170.230:9355): avc: denied { read write open } for pid=11977 comm="syz.2.2020" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1660.059715][ T29] audit: type=1400 audit(2000000170.250:9356): avc: denied { execmem } for pid=11977 comm="syz.2.2020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1661.028127][ T29] audit: type=1400 audit(2000000171.220:9357): avc: denied { prog_load } for pid=11982 comm="syz.0.2021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1661.032556][ T29] audit: type=1400 audit(2000000171.230:9358): avc: denied { bpf } for pid=11982 comm="syz.0.2021" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1661.043947][ T29] audit: type=1400 audit(2000000171.240:9359): avc: denied { perfmon } for pid=11982 comm="syz.0.2021" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1661.055806][ T29] audit: type=1400 audit(2000000171.250:9360): avc: denied { perfmon } for pid=11982 comm="syz.0.2021" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1661.059184][ T29] audit: type=1400 audit(2000000171.250:9361): avc: denied { perfmon } for pid=11982 comm="syz.0.2021" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1661.073195][ T29] audit: type=1400 audit(2000000171.270:9362): avc: denied { perfmon } for pid=11982 comm="syz.0.2021" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1661.075951][ T29] audit: type=1400 audit(2000000171.270:9363): avc: denied { bpf } for pid=11982 comm="syz.0.2021" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1665.366426][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 1665.371174][ T29] audit: type=1400 audit(2000000175.560:9386): avc: denied { module_request } for pid=11977 comm="syz.2.2020" kmod="crypto-hmac(rmd160)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1665.927159][ T29] audit: type=1400 audit(2000000176.120:9387): avc: denied { create } for pid=11998 comm="syz.0.2024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1665.961645][ T29] audit: type=1400 audit(2000000176.160:9388): avc: denied { bind } for pid=11998 comm="syz.0.2024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1665.977923][ T29] audit: type=1400 audit(2000000176.170:9389): avc: denied { module_request } for pid=11998 comm="syz.0.2024" kmod="crypto-cbc-camellia-asm" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1666.171592][ T29] audit: type=1400 audit(2000000176.370:9390): avc: denied { module_request } for pid=11977 comm="syz.2.2020" kmod="crypto-hmac(rmd160)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1666.284213][ T29] audit: type=1400 audit(2000000176.480:9391): avc: denied { module_request } for pid=11977 comm="syz.2.2020" kmod="crypto-xcbc(aes)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1666.331643][ T29] audit: type=1400 audit(2000000176.530:9392): avc: denied { module_request } for pid=11977 comm="syz.2.2020" kmod="crypto-xcbc(aes)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1666.347394][ T29] audit: type=1400 audit(2000000176.530:9393): avc: denied { module_request } for pid=11977 comm="syz.2.2020" kmod="crypto-cmac(aes)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1666.384487][ T29] audit: type=1400 audit(2000000176.580:9394): avc: denied { module_request } for pid=11977 comm="syz.2.2020" kmod="crypto-cmac(aes)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1666.549885][ T29] audit: type=1400 audit(2000000176.740:9395): avc: denied { setopt } for pid=11998 comm="syz.0.2024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1670.566330][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 1670.568020][ T29] audit: type=1400 audit(2000000180.760:9424): avc: denied { read } for pid=12062 comm="syz.0.2025" name="event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1670.659770][ T29] audit: type=1400 audit(2000000180.850:9425): avc: denied { read open } for pid=12062 comm="syz.0.2025" path="/dev/input/event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1670.768959][ T29] audit: type=1400 audit(2000000180.960:9426): avc: denied { read write } for pid=12062 comm="syz.0.2025" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1670.830849][ T29] audit: type=1400 audit(2000000181.030:9427): avc: denied { read write open } for pid=12062 comm="syz.0.2025" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1670.850768][ T29] audit: type=1400 audit(2000000181.030:9428): avc: denied { ioctl } for pid=12062 comm="syz.0.2025" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1670.851208][ T29] audit: type=1400 audit(2000000181.040:9429): avc: denied { ioctl } for pid=12062 comm="syz.0.2025" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1670.937573][ T29] audit: type=1400 audit(2000000181.130:9430): avc: denied { ioctl } for pid=12062 comm="syz.0.2025" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1671.050451][ T29] audit: type=1400 audit(2000000181.250:9431): avc: denied { ioctl } for pid=12062 comm="syz.0.2025" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1678.573976][ T29] audit: type=1400 audit(2000000188.770:9432): avc: denied { create } for pid=12069 comm="syz.2.2027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1678.583669][ T29] audit: type=1400 audit(2000000188.780:9433): avc: denied { ioctl } for pid=12069 comm="syz.2.2027" path="socket:[28496]" dev="sockfs" ino=28496 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1678.589570][ T29] audit: type=1400 audit(2000000188.790:9434): avc: denied { connect } for pid=12069 comm="syz.2.2027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1678.595599][ T29] audit: type=1400 audit(2000000188.790:9435): avc: denied { read } for pid=12069 comm="syz.2.2027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1681.174727][ T29] audit: type=1400 audit(2000000191.370:9436): avc: denied { create } for pid=12076 comm="syz.0.2029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1681.181390][ T29] audit: type=1400 audit(2000000191.380:9437): avc: denied { write } for pid=12076 comm="syz.0.2029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1681.186878][ T29] audit: type=1400 audit(2000000191.380:9438): avc: denied { module_request } for pid=12076 comm="syz.0.2029" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1681.330860][ T29] audit: type=1400 audit(2000000191.530:9439): avc: denied { create } for pid=12079 comm="syz.2.2030" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1681.419618][ T29] audit: type=1400 audit(2000000191.620:9440): avc: denied { read } for pid=12076 comm="syz.0.2029" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1681.440693][ T29] audit: type=1400 audit(2000000191.640:9441): avc: denied { read write } for pid=12076 comm="syz.0.2029" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1687.346873][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 1687.347533][ T29] audit: type=1400 audit(2000000197.540:9449): avc: denied { unlink } for pid=10944 comm="syz-executor" name="file0" dev="tmpfs" ino=602 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 1687.639916][ T29] audit: type=1400 audit(2000000197.830:9450): avc: denied { read } for pid=12085 comm="syz.2.2031" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1687.646091][ T29] audit: type=1400 audit(2000000197.840:9451): avc: denied { read open } for pid=12085 comm="syz.2.2031" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1687.667270][ T29] audit: type=1400 audit(2000000197.860:9452): avc: denied { ioctl } for pid=12085 comm="syz.2.2031" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1687.737003][ T29] audit: type=1400 audit(2000000197.930:9453): avc: denied { module_request } for pid=12085 comm="syz.2.2031" kmod="ematch-kind-8" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1688.265200][ T29] audit: type=1400 audit(2000000198.460:9454): avc: denied { read } for pid=12092 comm="syz.2.2032" name="event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1688.267523][ T29] audit: type=1400 audit(2000000198.460:9455): avc: denied { read open } for pid=12092 comm="syz.2.2032" path="/dev/input/event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1688.285268][ T29] audit: type=1400 audit(2000000198.480:9456): avc: denied { read write } for pid=12092 comm="syz.2.2032" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1688.292605][ T29] audit: type=1400 audit(2000000198.480:9457): avc: denied { read write open } for pid=12092 comm="syz.2.2032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1688.301957][T12093] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1688.304935][T12093] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1688.315492][ T29] audit: type=1400 audit(2000000198.490:9458): avc: denied { ioctl } for pid=12092 comm="syz.2.2032" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1692.770740][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 1692.771594][ T29] audit: type=1400 audit(2000000202.950:9480): avc: denied { read } for pid=12107 comm="syz.0.2037" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1692.795133][ T29] audit: type=1400 audit(2000000202.990:9481): avc: denied { read open } for pid=12107 comm="syz.0.2037" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1692.831700][ T29] audit: type=1400 audit(2000000203.030:9482): avc: denied { ioctl } for pid=12107 comm="syz.0.2037" path="/dev/fb0" dev="devtmpfs" ino=616 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1693.766488][ T29] audit: type=1400 audit(2000000203.960:9483): avc: denied { create } for pid=12109 comm="syz.0.2038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1693.782115][ T29] audit: type=1400 audit(2000000203.980:9484): avc: denied { ioctl } for pid=12109 comm="syz.0.2038" path="socket:[27574]" dev="sockfs" ino=27574 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1694.758919][ T29] audit: type=1400 audit(2000000204.950:9485): avc: denied { prog_load } for pid=12111 comm="syz.0.2039" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1694.791866][ T29] audit: type=1400 audit(2000000204.970:9486): avc: denied { bpf } for pid=12111 comm="syz.0.2039" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1694.793831][ T29] audit: type=1400 audit(2000000204.980:9487): avc: denied { perfmon } for pid=12111 comm="syz.0.2039" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1694.815920][ T29] audit: type=1400 audit(2000000205.010:9488): avc: denied { perfmon } for pid=12111 comm="syz.0.2039" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1694.839774][ T29] audit: type=1400 audit(2000000205.030:9489): avc: denied { perfmon } for pid=12111 comm="syz.0.2039" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1699.855742][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1699.856455][ T29] audit: type=1400 audit(2000000210.050:9501): avc: denied { create } for pid=12118 comm="syz.0.2042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1699.941030][ T29] audit: type=1400 audit(2000000210.140:9502): avc: denied { ioctl } for pid=12118 comm="syz.0.2042" path="socket:[27588]" dev="sockfs" ino=27588 ioctlcmd=0x8918 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1700.498437][ T29] audit: type=1400 audit(2000000210.690:9503): avc: denied { read write } for pid=12120 comm="syz.0.2043" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1700.498688][ T29] audit: type=1400 audit(2000000210.690:9504): avc: denied { read write open } for pid=12120 comm="syz.0.2043" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1700.553718][ T29] audit: type=1400 audit(2000000210.720:9505): avc: denied { prog_load } for pid=12120 comm="syz.0.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1700.556996][ T29] audit: type=1400 audit(2000000210.740:9506): avc: denied { bpf } for pid=12120 comm="syz.0.2043" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1700.557265][ T29] audit: type=1400 audit(2000000210.740:9507): avc: denied { perfmon } for pid=12120 comm="syz.0.2043" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1700.557332][ T29] audit: type=1400 audit(2000000210.740:9508): avc: denied { perfmon } for pid=12120 comm="syz.0.2043" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1700.580989][ T29] audit: type=1400 audit(2000000210.780:9509): avc: denied { perfmon } for pid=12120 comm="syz.0.2043" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1700.583049][ T29] audit: type=1400 audit(2000000210.780:9510): avc: denied { perfmon } for pid=12120 comm="syz.0.2043" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1706.337866][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 1706.339038][ T29] audit: type=1400 audit(2000000216.530:9528): avc: denied { map_create } for pid=12120 comm="syz.0.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1706.372365][ T29] audit: type=1400 audit(2000000216.570:9529): avc: denied { create } for pid=12120 comm="syz.0.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1706.402510][ T29] audit: type=1400 audit(2000000216.590:9530): avc: denied { setopt } for pid=12120 comm="syz.0.2043" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1706.428827][ T29] audit: type=1400 audit(2000000216.620:9531): avc: denied { read } for pid=12120 comm="syz.0.2043" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1706.519413][ T29] audit: type=1400 audit(2000000216.710:9532): avc: denied { read open } for pid=12120 comm="syz.0.2043" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1706.549768][ T29] audit: type=1400 audit(2000000216.730:9533): avc: denied { create } for pid=12120 comm="syz.0.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1706.646377][ T29] audit: type=1400 audit(2000000216.840:9534): avc: denied { connect } for pid=12120 comm="syz.0.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1706.734766][ T29] audit: type=1400 audit(2000000216.930:9535): avc: denied { connect } for pid=12120 comm="syz.0.2043" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1706.843357][ T29] audit: type=1400 audit(2000000217.040:9536): avc: denied { write } for pid=12120 comm="syz.0.2043" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1706.947119][ T29] audit: type=1400 audit(2000000217.110:9537): avc: denied { create } for pid=12120 comm="syz.0.2043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1711.888265][ T29] audit: type=1400 audit(2000000222.080:9538): avc: denied { read } for pid=12124 comm="syz.2.2044" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1711.971395][ T29] audit: type=1400 audit(2000000222.110:9539): avc: denied { read open } for pid=12124 comm="syz.2.2044" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1712.000804][ T29] audit: type=1400 audit(2000000222.200:9540): avc: denied { read write } for pid=12124 comm="syz.2.2044" name="midiC2D0" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1712.011745][ T29] audit: type=1400 audit(2000000222.210:9541): avc: denied { read write open } for pid=12124 comm="syz.2.2044" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1712.696717][ T29] audit: type=1400 audit(2000000222.890:9542): avc: denied { allowed } for pid=12124 comm="syz.2.2044" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1712.749205][ T29] audit: type=1400 audit(2000000222.940:9543): avc: denied { create } for pid=12124 comm="syz.2.2044" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1712.762919][ T29] audit: type=1400 audit(2000000222.960:9544): avc: denied { map } for pid=12124 comm="syz.2.2044" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28563 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1712.844713][ T29] audit: type=1400 audit(2000000223.040:9545): avc: denied { read write } for pid=12124 comm="syz.2.2044" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28563 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1712.892210][ T29] audit: type=1400 audit(2000000223.090:9546): avc: denied { map } for pid=12124 comm="syz.2.2044" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28563 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1712.919598][ T29] audit: type=1400 audit(2000000223.110:9547): avc: denied { read write } for pid=12124 comm="syz.2.2044" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28563 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1716.476813][T12132] could not allocate digest TFM handle sha384-generic [ 1720.848040][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 1720.856586][ T29] audit: type=1400 audit(2000000231.040:9553): avc: denied { mounton } for pid=12140 comm="syz.2.2049" path="/126" dev="tmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1720.858049][ T29] audit: type=1400 audit(2000000231.050:9554): avc: denied { mount } for pid=12140 comm="syz.2.2049" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1720.973952][ T29] audit: type=1400 audit(2000000231.170:9555): avc: denied { unmount } for pid=10944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1721.516659][ T29] audit: type=1400 audit(2000000231.710:9556): avc: denied { allowed } for pid=12142 comm="syz.0.2050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1721.530472][ T29] audit: type=1400 audit(2000000231.730:9557): avc: denied { sqpoll } for pid=12142 comm="syz.0.2050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1721.543986][ T29] audit: type=1400 audit(2000000231.740:9558): avc: denied { create } for pid=12143 comm="syz.2.2051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1721.561452][ T29] audit: type=1400 audit(2000000231.760:9559): avc: denied { create } for pid=12142 comm="syz.0.2050" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1721.565130][ T29] audit: type=1400 audit(2000000231.760:9560): avc: denied { map } for pid=12142 comm="syz.0.2050" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1721.578760][ T29] audit: type=1400 audit(2000000231.760:9561): avc: denied { read write } for pid=12142 comm="syz.0.2050" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1721.583597][ T29] audit: type=1400 audit(2000000231.780:9562): avc: denied { write } for pid=12143 comm="syz.2.2051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1729.121248][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 1729.121642][ T29] audit: type=1400 audit(2000000239.290:9627): avc: denied { prog_load } for pid=12155 comm="syz.0.2054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1729.121888][ T29] audit: type=1400 audit(2000000239.310:9628): avc: denied { bpf } for pid=12155 comm="syz.0.2054" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1729.215897][ T29] audit: type=1400 audit(2000000239.410:9629): avc: denied { read write } for pid=12155 comm="syz.0.2054" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1729.261075][ T29] audit: type=1400 audit(2000000239.460:9630): avc: denied { read write open } for pid=12155 comm="syz.0.2054" path="/dev/ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1729.314975][ T29] audit: type=1400 audit(2000000239.510:9631): avc: denied { read write } for pid=12155 comm="syz.0.2054" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1729.332740][ T29] audit: type=1400 audit(2000000239.530:9632): avc: denied { read write open } for pid=12155 comm="syz.0.2054" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1729.343680][ T29] audit: type=1400 audit(2000000239.540:9633): avc: denied { ioctl } for pid=12155 comm="syz.0.2054" path="/dev/ttynull" dev="devtmpfs" ino=609 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1731.304930][ T29] audit: type=1400 audit(2000000241.500:9634): avc: denied { map_create } for pid=12158 comm="syz.2.2055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1731.352362][ T29] audit: type=1400 audit(2000000241.550:9635): avc: denied { create } for pid=12158 comm="syz.2.2055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1731.381424][ T29] audit: type=1400 audit(2000000241.560:9636): avc: denied { setopt } for pid=12158 comm="syz.2.2055" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1746.665010][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 1746.666570][ T29] audit: type=1400 audit(2000000256.860:9641): avc: denied { execmem } for pid=12164 comm="syz.0.2056" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1746.674047][ T29] audit: type=1400 audit(2000000256.870:9642): avc: denied { execute } for pid=12164 comm="syz.0.2056" path="/131/cgroup.controllers" dev="tmpfs" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1747.056059][ T29] audit: type=1400 audit(2000000257.250:9643): avc: denied { module_request } for pid=12166 comm="syz.0.2057" kmod="fs-nfs4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1747.923299][ T29] audit: type=1400 audit(2000000258.120:9644): avc: denied { map_create } for pid=12171 comm="syz.0.2060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1747.927944][ T29] audit: type=1400 audit(2000000258.120:9645): avc: denied { bpf } for pid=12171 comm="syz.0.2060" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1747.938987][ T29] audit: type=1400 audit(2000000258.130:9646): avc: denied { map_read map_write } for pid=12171 comm="syz.0.2060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1747.941061][ T29] audit: type=1400 audit(2000000258.140:9647): avc: denied { prog_load } for pid=12171 comm="syz.0.2060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1747.945729][ T29] audit: type=1400 audit(2000000258.140:9648): avc: denied { bpf } for pid=12171 comm="syz.0.2060" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1747.951445][ T29] audit: type=1400 audit(2000000258.150:9649): avc: denied { prog_load } for pid=12171 comm="syz.0.2060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1747.960842][ T29] audit: type=1400 audit(2000000258.150:9650): avc: denied { bpf } for pid=12171 comm="syz.0.2060" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1748.539202][T12177] input: syz0 as /devices/virtual/input/input20 [ 1751.811139][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 1751.841601][ T29] audit: type=1400 audit(2000000262.010:9684): avc: denied { create } for pid=12192 comm="syz.0.2066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1751.920829][ T29] audit: type=1400 audit(2000000262.110:9685): avc: denied { ioctl } for pid=12192 comm="syz.0.2066" path="socket:[28634]" dev="sockfs" ino=28634 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1751.945257][ T29] audit: type=1400 audit(2000000262.140:9686): avc: denied { setopt } for pid=12192 comm="syz.0.2066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1751.964770][ T29] audit: type=1400 audit(2000000262.160:9687): avc: denied { write } for pid=12192 comm="syz.0.2066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1752.719211][ T29] audit: type=1400 audit(2000000262.910:9688): avc: denied { read write } for pid=12194 comm="syz.0.2067" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1752.731908][ T29] audit: type=1400 audit(2000000262.930:9689): avc: denied { read write open } for pid=12194 comm="syz.0.2067" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1752.780733][ T29] audit: type=1400 audit(2000000262.980:9690): avc: denied { mounton } for pid=12194 comm="syz.0.2067" path="/139/file0" dev="tmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1752.803812][ T29] audit: type=1400 audit(2000000263.000:9691): avc: denied { mount } for pid=12194 comm="syz.0.2067" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1752.901862][ T29] audit: type=1400 audit(2000000263.100:9692): avc: denied { unmount } for pid=10503 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1753.394254][ T29] audit: type=1400 audit(2000000263.590:9693): avc: denied { prog_load } for pid=12199 comm="syz.2.2069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1757.890225][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 1757.896756][ T29] audit: type=1400 audit(2000000268.090:9721): avc: denied { create } for pid=12217 comm="syz.0.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1757.899152][ T29] audit: type=1400 audit(2000000268.090:9722): avc: denied { bind } for pid=12217 comm="syz.0.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1757.920272][ T29] audit: type=1400 audit(2000000268.120:9723): avc: denied { module_request } for pid=12217 comm="syz.0.2075" kmod="crypto-crc32c" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1758.122225][ T29] audit: type=1400 audit(2000000268.320:9724): avc: denied { read } for pid=12220 comm="syz.2.2076" dev="nsfs" ino=4026532705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1758.127637][ T29] audit: type=1400 audit(2000000268.320:9725): avc: denied { read open } for pid=12220 comm="syz.2.2076" path="net:[4026532705]" dev="nsfs" ino=4026532705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1758.141962][ T29] audit: type=1400 audit(2000000268.340:9726): avc: denied { create } for pid=12220 comm="syz.2.2076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1758.163291][ T29] audit: type=1400 audit(2000000268.360:9727): avc: denied { write } for pid=12220 comm="syz.2.2076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1758.230397][ T29] audit: type=1400 audit(2000000268.430:9728): avc: denied { module_request } for pid=12220 comm="syz.2.2076" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1758.416768][ T29] audit: type=1400 audit(2000000268.610:9729): avc: denied { accept } for pid=12217 comm="syz.0.2075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1758.700336][ T29] audit: type=1400 audit(2000000268.900:9730): avc: denied { write } for pid=12220 comm="syz.2.2076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1765.124925][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 1765.126201][ T29] audit: type=1400 audit(2000000275.320:9763): avc: denied { read write } for pid=12238 comm="syz.0.2081" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1765.131130][ T29] audit: type=1400 audit(2000000275.330:9764): avc: denied { read write open } for pid=12238 comm="syz.0.2081" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1765.139253][ T29] audit: type=1400 audit(2000000275.330:9765): avc: denied { ioctl } for pid=12238 comm="syz.0.2081" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1765.151683][ T29] audit: type=1400 audit(2000000275.350:9766): avc: denied { ioctl } for pid=12238 comm="syz.0.2081" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1765.287708][ T29] audit: type=1400 audit(2000000275.480:9767): avc: denied { ioctl } for pid=12238 comm="syz.0.2081" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1765.292603][ T29] audit: type=1400 audit(2000000275.490:9768): avc: denied { ioctl } for pid=12238 comm="syz.0.2081" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1769.269961][ T29] audit: type=1400 audit(2000000279.460:9769): avc: denied { create } for pid=12234 comm="syz.2.2079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1769.307240][ T29] audit: type=1400 audit(2000000279.500:9770): avc: denied { prog_load } for pid=12234 comm="syz.2.2079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1769.321374][ T29] audit: type=1400 audit(2000000279.520:9771): avc: denied { bpf } for pid=12234 comm="syz.2.2079" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1769.336999][ T29] audit: type=1400 audit(2000000279.530:9772): avc: denied { perfmon } for pid=12234 comm="syz.2.2079" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1775.300136][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 1775.302492][ T29] audit: type=1400 audit(2000000285.490:9781): avc: denied { execmem } for pid=12248 comm="syz.0.2082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1777.984933][ T29] audit: type=1400 audit(2000000288.180:9782): avc: denied { create } for pid=12248 comm="syz.0.2082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1778.001620][ T29] audit: type=1400 audit(2000000288.200:9783): avc: denied { module_request } for pid=12248 comm="syz.0.2082" kmod="net-pf-10-proto-132-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1778.477782][ T29] audit: type=1400 audit(2000000288.670:9784): avc: denied { module_request } for pid=12248 comm="syz.0.2082" kmod="net-pf-10-proto-132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1780.742609][ T29] audit: type=1400 audit(2000000290.940:9785): avc: denied { name_bind } for pid=12257 comm="syz.2.2084" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1781.626064][ T29] audit: type=1400 audit(2000000291.820:9786): avc: denied { create } for pid=12260 comm="syz.2.2085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1781.636063][ T29] audit: type=1400 audit(2000000291.830:9787): avc: denied { ioctl } for pid=12260 comm="syz.2.2085" path="socket:[29717]" dev="sockfs" ino=29717 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1781.643153][ T29] audit: type=1400 audit(2000000291.840:9788): avc: denied { setopt } for pid=12260 comm="syz.2.2085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1781.653040][ T29] audit: type=1400 audit(2000000291.850:9789): avc: denied { write } for pid=12260 comm="syz.2.2085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1781.943144][ T29] audit: type=1400 audit(2000000292.140:9790): avc: denied { prog_load } for pid=12262 comm="syz.2.2086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1781.945114][ T29] audit: type=1400 audit(2000000292.140:9791): avc: denied { bpf } for pid=12262 comm="syz.2.2086" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1781.949513][ T29] audit: type=1400 audit(2000000292.140:9792): avc: denied { perfmon } for pid=12262 comm="syz.2.2086" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1781.959344][ T29] audit: type=1400 audit(2000000292.150:9793): avc: denied { perfmon } for pid=12262 comm="syz.2.2086" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1781.959989][ T29] audit: type=1400 audit(2000000292.150:9794): avc: denied { perfmon } for pid=12262 comm="syz.2.2086" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1788.158654][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 1788.158927][ T29] audit: type=1400 audit(2000000298.350:9836): avc: denied { setattr } for pid=12268 comm="syz.2.2088" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1788.191932][ T29] audit: type=1400 audit(2000000298.390:9837): avc: denied { create } for pid=12268 comm="syz.2.2088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1788.369134][ T29] audit: type=1400 audit(2000000298.550:9838): avc: denied { module_request } for pid=12268 comm="syz.2.2088" kmod="fs-affs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1791.468001][ T29] audit: type=1400 audit(2000000301.660:9839): avc: denied { create } for pid=12276 comm="syz.0.2090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1791.538846][ T29] audit: type=1400 audit(2000000301.720:9840): avc: denied { ioctl } for pid=12276 comm="syz.0.2090" path="socket:[29731]" dev="sockfs" ino=29731 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1791.604252][ T29] audit: type=1400 audit(2000000301.800:9841): avc: denied { setopt } for pid=12276 comm="syz.0.2090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1791.642797][ T29] audit: type=1400 audit(2000000301.840:9842): avc: denied { write } for pid=12276 comm="syz.0.2090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1793.089459][ T29] audit: type=1400 audit(2000000303.280:9843): avc: denied { create } for pid=12280 comm="syz.0.2092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1793.094682][ T29] audit: type=1400 audit(2000000303.290:9844): avc: denied { write } for pid=12280 comm="syz.0.2092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1793.129815][ T29] audit: type=1400 audit(2000000303.330:9845): avc: denied { module_request } for pid=12280 comm="syz.0.2092" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1793.645346][ T29] audit: type=1400 audit(2000000303.840:9846): avc: denied { read } for pid=12280 comm="syz.0.2092" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1793.654360][ T29] audit: type=1400 audit(2000000303.850:9847): avc: denied { read open } for pid=12280 comm="syz.0.2092" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1793.729126][ T29] audit: type=1400 audit(2000000303.920:9848): avc: denied { create } for pid=12280 comm="syz.0.2092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1793.854172][ T29] audit: type=1400 audit(2000000304.050:9849): avc: denied { write } for pid=12280 comm="syz.0.2092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1794.206870][ T29] audit: type=1400 audit(2000000304.400:9850): avc: denied { read } for pid=12280 comm="syz.0.2092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1794.959090][ T29] audit: type=1400 audit(2000000305.150:9851): avc: denied { read write } for pid=12284 comm="syz.0.2093" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1794.980313][ T29] audit: type=1400 audit(2000000305.170:9852): avc: denied { read write open } for pid=12284 comm="syz.0.2093" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1794.996228][ T29] audit: type=1400 audit(2000000305.190:9853): avc: denied { allowed } for pid=12284 comm="syz.0.2093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1795.100033][ T29] audit: type=1400 audit(2000000305.220:9854): avc: denied { create } for pid=12284 comm="syz.0.2093" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1795.105278][ T29] audit: type=1400 audit(2000000305.300:9855): avc: denied { map } for pid=12284 comm="syz.0.2093" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=28834 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1797.855365][T12291] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2094'. [ 1799.932061][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1799.936942][ T29] audit: type=1400 audit(2000000310.130:9867): avc: denied { create } for pid=12292 comm="syz.0.2095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1799.985924][ T29] audit: type=1400 audit(2000000310.180:9868): avc: denied { ioctl } for pid=12292 comm="syz.0.2095" path="socket:[29739]" dev="sockfs" ino=29739 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1800.032718][ T29] audit: type=1400 audit(2000000310.230:9869): avc: denied { setopt } for pid=12292 comm="syz.0.2095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1800.039821][ T29] audit: type=1400 audit(2000000310.230:9870): avc: denied { write } for pid=12292 comm="syz.0.2095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1800.724229][ T29] audit: type=1400 audit(2000000310.920:9871): avc: denied { execmem } for pid=12294 comm="syz.0.2096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1805.147941][ T29] audit: type=1400 audit(2000000315.340:9872): avc: denied { create } for pid=12294 comm="syz.0.2096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1805.148497][ T29] audit: type=1400 audit(2000000315.340:9873): avc: denied { module_request } for pid=12294 comm="syz.0.2096" kmod="net-pf-10-proto-132-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1805.636217][ T29] audit: type=1400 audit(2000000315.830:9874): avc: denied { module_request } for pid=12294 comm="syz.0.2096" kmod="net-pf-10-proto-132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1806.597765][ T29] audit: type=1400 audit(2000000316.790:9875): avc: denied { create } for pid=12300 comm="syz.2.2097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1806.610868][ T29] audit: type=1400 audit(2000000316.810:9876): avc: denied { bind } for pid=12300 comm="syz.2.2097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1806.904454][ T29] audit: type=1400 audit(2000000317.100:9877): avc: denied { create } for pid=12302 comm="syz.2.2098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1806.919242][ T29] audit: type=1400 audit(2000000317.110:9878): avc: denied { write } for pid=12302 comm="syz.2.2098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1806.940822][ T29] audit: type=1400 audit(2000000317.140:9879): avc: denied { module_request } for pid=12302 comm="syz.2.2098" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1807.654286][ T29] audit: type=1400 audit(2000000317.850:9880): avc: denied { create } for pid=12305 comm="syz.2.2099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1807.664387][ T29] audit: type=1400 audit(2000000317.860:9881): avc: denied { ioctl } for pid=12305 comm="syz.2.2099" path="socket:[28867]" dev="sockfs" ino=28867 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1808.222638][T12307] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2099'. [ 1810.284452][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1810.285462][ T29] audit: type=1400 audit(2000000320.480:9884): avc: denied { create } for pid=12308 comm="syz.2.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1810.318877][ T29] audit: type=1400 audit(2000000320.510:9885): avc: denied { ioctl } for pid=12308 comm="syz.2.2100" path="socket:[28869]" dev="sockfs" ino=28869 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1810.327854][ T29] audit: type=1400 audit(2000000320.520:9886): avc: denied { setopt } for pid=12308 comm="syz.2.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1810.346874][ T29] audit: type=1400 audit(2000000320.540:9887): avc: denied { write } for pid=12308 comm="syz.2.2100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1810.590661][ T29] audit: type=1400 audit(2000000320.790:9888): avc: denied { create } for pid=12310 comm="syz.2.2101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1810.610437][ T29] audit: type=1400 audit(2000000320.790:9889): avc: denied { read } for pid=12310 comm="syz.2.2101" path="socket:[28872]" dev="sockfs" ino=28872 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1810.613612][ T29] audit: type=1400 audit(2000000320.810:9890): avc: denied { read } for pid=12310 comm="syz.2.2101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1810.624797][ T29] audit: type=1400 audit(2000000320.820:9891): avc: denied { read } for pid=12310 comm="syz.2.2101" path="socket:[28872]" dev="sockfs" ino=28872 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1810.629503][ T29] audit: type=1400 audit(2000000320.820:9892): avc: denied { read } for pid=12310 comm="syz.2.2101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1810.648816][ T29] audit: type=1400 audit(2000000320.840:9893): avc: denied { read } for pid=12310 comm="syz.2.2101" path="socket:[28872]" dev="sockfs" ino=28872 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1816.457289][ T29] kauditd_printk_skb: 419 callbacks suppressed [ 1816.459980][ T29] audit: type=1400 audit(2000000326.650:10313): avc: denied { create } for pid=12322 comm="syz.2.2105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1816.492118][ T29] audit: type=1400 audit(2000000326.690:10314): avc: denied { ioctl } for pid=12322 comm="syz.2.2105" path="socket:[28881]" dev="sockfs" ino=28881 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1816.504111][ T29] audit: type=1400 audit(2000000326.700:10315): avc: denied { setopt } for pid=12322 comm="syz.2.2105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1816.512330][ T29] audit: type=1400 audit(2000000326.710:10316): avc: denied { write } for pid=12322 comm="syz.2.2105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1816.792425][ T29] audit: type=1400 audit(2000000326.990:10317): avc: denied { create } for pid=12324 comm="syz.2.2106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1816.796352][ T29] audit: type=1400 audit(2000000326.990:10318): avc: denied { module_request } for pid=12324 comm="syz.2.2106" kmod="net-pf-10-proto-132-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1817.086108][ T29] audit: type=1400 audit(2000000327.280:10319): avc: denied { module_request } for pid=12324 comm="syz.2.2106" kmod="net-pf-10-proto-132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1817.594744][ T29] audit: type=1400 audit(2000000327.790:10320): avc: denied { read write } for pid=12328 comm="syz.2.2107" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1817.600780][ T29] audit: type=1400 audit(2000000327.790:10321): avc: denied { read write open } for pid=12328 comm="syz.2.2107" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1817.617232][ T29] audit: type=1400 audit(2000000327.810:10322): avc: denied { ioctl } for pid=12328 comm="syz.2.2107" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1817.624719][T12329] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1817.631228][T12329] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1819.071352][T12335] serio: Serial port ptm0 [ 1821.496600][ T29] kauditd_printk_skb: 188 callbacks suppressed [ 1821.497949][ T29] audit: type=1400 audit(2000000331.690:10511): avc: denied { search } for pid=12343 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1821.504560][ T29] audit: type=1400 audit(2000000331.700:10512): avc: denied { search } for pid=12343 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1821.506652][ T29] audit: type=1400 audit(2000000331.700:10513): avc: denied { search } for pid=12343 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1821.560600][ T29] audit: type=1400 audit(2000000331.760:10514): avc: denied { search } for pid=12336 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1823.234014][ T29] audit: type=1400 audit(2000000333.430:10515): avc: denied { create } for pid=12347 comm="syz.0.2109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1823.245047][ T29] audit: type=1400 audit(2000000333.440:10516): avc: denied { ioctl } for pid=12347 comm="syz.0.2109" path="socket:[29790]" dev="sockfs" ino=29790 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1823.255539][ T29] audit: type=1400 audit(2000000333.450:10517): avc: denied { module_request } for pid=12347 comm="syz.0.2109" kmod="netdev-vxcan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1823.543146][ T29] audit: type=1400 audit(2000000333.740:10518): avc: denied { sys_module } for pid=12347 comm="syz.0.2109" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1823.556595][ T29] audit: type=1400 audit(2000000333.750:10519): avc: denied { module_request } for pid=12347 comm="syz.0.2109" kmod="vxcan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1823.773762][ T29] audit: type=1400 audit(2000000333.970:10520): avc: denied { connect } for pid=12347 comm="syz.0.2109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1827.042853][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1827.049785][ T29] audit: type=1400 audit(2000000337.240:10532): avc: denied { read write } for pid=12361 comm="syz.0.2113" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1827.063458][ T29] audit: type=1400 audit(2000000337.260:10533): avc: denied { read write open } for pid=12361 comm="syz.0.2113" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1827.074720][ T29] audit: type=1400 audit(2000000337.270:10534): avc: denied { ioctl } for pid=12361 comm="syz.0.2113" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1827.093311][ T29] audit: type=1400 audit(2000000337.290:10535): avc: denied { ioctl } for pid=12361 comm="syz.0.2113" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1827.112190][ T29] audit: type=1400 audit(2000000337.310:10536): avc: denied { ioctl } for pid=12361 comm="syz.0.2113" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1827.130234][ T29] audit: type=1400 audit(2000000337.330:10537): avc: denied { ioctl } for pid=12361 comm="syz.0.2113" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1828.012167][ T29] audit: type=1400 audit(2000000338.210:10538): avc: denied { create } for pid=12366 comm="syz.2.2114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1828.034993][ T29] audit: type=1400 audit(2000000338.230:10539): avc: denied { ioctl } for pid=12366 comm="syz.2.2114" path="socket:[29815]" dev="sockfs" ino=29815 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1828.041944][ T29] audit: type=1400 audit(2000000338.240:10540): avc: denied { connect } for pid=12366 comm="syz.2.2114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1828.049220][ T29] audit: type=1400 audit(2000000338.240:10541): avc: denied { read } for pid=12366 comm="syz.2.2114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1833.941430][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 1833.941852][ T29] audit: type=1400 audit(2000000344.140:10550): avc: denied { read write } for pid=12374 comm="syz.2.2117" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1833.965084][ T29] audit: type=1400 audit(2000000344.160:10551): avc: denied { read write open } for pid=12374 comm="syz.2.2117" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1834.004246][ T29] audit: type=1400 audit(2000000344.180:10552): avc: denied { ioctl } for pid=12374 comm="syz.2.2117" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1834.022934][T12375] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1834.024193][ T29] audit: type=1400 audit(2000000344.210:10553): avc: denied { ioctl } for pid=12374 comm="syz.2.2117" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1834.027255][T12375] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1837.184995][ T29] audit: type=1400 audit(2000000347.380:10554): avc: denied { create } for pid=12385 comm="syz.0.2119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1837.196020][ T29] audit: type=1400 audit(2000000347.390:10555): avc: denied { ioctl } for pid=12385 comm="syz.0.2119" path="socket:[29838]" dev="sockfs" ino=29838 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1837.204117][ T29] audit: type=1400 audit(2000000347.400:10556): avc: denied { module_request } for pid=12385 comm="syz.0.2119" kmod="netdev-vxcan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1837.452265][ T29] audit: type=1400 audit(2000000347.650:10557): avc: denied { sys_module } for pid=12385 comm="syz.0.2119" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1837.456790][ T29] audit: type=1400 audit(2000000347.650:10558): avc: denied { module_request } for pid=12385 comm="syz.0.2119" kmod="vxcan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1837.722346][ T29] audit: type=1400 audit(2000000347.920:10559): avc: denied { read } for pid=12385 comm="syz.0.2119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1838.667251][T12386] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2119'. [ 1839.424430][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 1839.425801][ T29] audit: type=1400 audit(2000000349.620:10565): avc: denied { create } for pid=12395 comm="syz.2.2120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1839.449291][ T29] audit: type=1400 audit(2000000349.640:10566): avc: denied { ioctl } for pid=12395 comm="syz.2.2120" path="socket:[28932]" dev="sockfs" ino=28932 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1839.466129][ T29] audit: type=1400 audit(2000000349.660:10567): avc: denied { setopt } for pid=12395 comm="syz.2.2120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1839.481488][ T29] audit: type=1400 audit(2000000349.670:10568): avc: denied { write } for pid=12395 comm="syz.2.2120" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1839.742598][ T29] audit: type=1400 audit(2000000349.940:10569): avc: denied { read write } for pid=12397 comm="syz.2.2121" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1839.746417][ T29] audit: type=1400 audit(2000000349.940:10570): avc: denied { read write open } for pid=12397 comm="syz.2.2121" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1839.769450][ T29] audit: type=1400 audit(2000000349.960:10571): avc: denied { ioctl } for pid=12397 comm="syz.2.2121" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1839.773317][ T29] audit: type=1400 audit(2000000349.970:10572): avc: denied { ioctl } for pid=12397 comm="syz.2.2121" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1839.810894][T12398] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1839.819975][T12398] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1839.843941][ T29] audit: type=1400 audit(2000000350.040:10573): avc: denied { read append } for pid=12397 comm="syz.2.2121" name="i2c-1" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="unconfined_u:system_r:insmod_t:s0-s0:c0.c1023" [ 1839.849235][ T29] audit: type=1400 audit(2000000350.040:10574): avc: denied { read append open } for pid=12397 comm="syz.2.2121" path="/dev/i2c-1" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="unconfined_u:system_r:insmod_t:s0-s0:c0.c1023" [ 1840.998857][T12398] i2c i2c-1: sendbytes: error -110 [ 1845.844346][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 1845.849197][ T29] audit: type=1400 audit(2000000356.040:10617): avc: denied { create } for pid=12414 comm="syz.2.2126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1845.907670][ T29] audit: type=1400 audit(2000000356.100:10618): avc: denied { ioctl } for pid=12414 comm="syz.2.2126" path="socket:[28957]" dev="sockfs" ino=28957 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1845.980458][ T29] audit: type=1400 audit(2000000356.180:10619): avc: denied { read } for pid=12414 comm="syz.2.2126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1846.586718][ T29] audit: type=1400 audit(2000000356.780:10620): avc: denied { create } for pid=12414 comm="syz.2.2126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1846.698826][ T29] audit: type=1400 audit(2000000356.890:10621): avc: denied { ioctl } for pid=12414 comm="syz.2.2126" path="socket:[28959]" dev="sockfs" ino=28959 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1846.817875][T12416] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2126'. [ 1848.445535][ T29] audit: type=1400 audit(2000000358.640:10622): avc: denied { read write } for pid=12425 comm="syz.2.2127" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1848.449110][ T29] audit: type=1400 audit(2000000358.640:10623): avc: denied { read write open } for pid=12425 comm="syz.2.2127" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1848.464148][ T29] audit: type=1400 audit(2000000358.660:10624): avc: denied { ioctl } for pid=12425 comm="syz.2.2127" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1848.467950][ T29] audit: type=1400 audit(2000000358.660:10625): avc: denied { ioctl } for pid=12425 comm="syz.2.2127" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1848.473714][T12426] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1848.475099][T12426] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1848.493222][ T29] audit: type=1400 audit(2000000358.690:10626): avc: denied { write } for pid=12425 comm="syz.2.2127" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1851.391387][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 1851.391897][ T29] audit: type=1400 audit(2000000361.570:10645): avc: denied { create } for pid=12441 comm="syz.2.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1851.484408][ T29] audit: type=1400 audit(2000000361.680:10646): avc: denied { ioctl } for pid=12441 comm="syz.2.2130" path="socket:[29873]" dev="sockfs" ino=29873 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1851.499149][ T29] audit: type=1400 audit(2000000361.690:10647): avc: denied { setopt } for pid=12441 comm="syz.2.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1851.532251][ T29] audit: type=1400 audit(2000000361.730:10648): avc: denied { write } for pid=12441 comm="syz.2.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1852.361987][ T29] audit: type=1400 audit(2000000362.560:10649): avc: denied { create } for pid=12446 comm="syz.2.2131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1852.381480][ T29] audit: type=1400 audit(2000000362.570:10650): avc: denied { ioctl } for pid=12446 comm="syz.2.2131" path="socket:[29882]" dev="sockfs" ino=29882 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1852.391762][ T29] audit: type=1400 audit(2000000362.590:10651): avc: denied { module_request } for pid=12446 comm="syz.2.2131" kmod="netdev-vxcan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1852.515270][ T29] audit: type=1400 audit(2000000362.710:10652): avc: denied { map_create } for pid=12449 comm="syz.0.2132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1852.547731][ T29] audit: type=1400 audit(2000000362.730:10653): avc: denied { map_read map_write } for pid=12449 comm="syz.0.2132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1852.548803][ T29] audit: type=1400 audit(2000000362.730:10654): avc: denied { prog_load } for pid=12449 comm="syz.0.2132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1854.123694][T12459] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2131'. [ 1858.001193][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 1858.014787][ T29] audit: type=1400 audit(2000000368.200:10687): avc: denied { prog_load } for pid=12460 comm="syz.2.2133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1858.022425][ T29] audit: type=1400 audit(2000000368.220:10688): avc: denied { bpf } for pid=12460 comm="syz.2.2133" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1858.054778][ T29] audit: type=1400 audit(2000000368.250:10689): avc: denied { perfmon } for pid=12460 comm="syz.2.2133" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1858.074493][ T29] audit: type=1400 audit(2000000368.270:10690): avc: denied { perfmon } for pid=12460 comm="syz.2.2133" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1858.095119][ T29] audit: type=1400 audit(2000000368.290:10691): avc: denied { perfmon } for pid=12460 comm="syz.2.2133" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1858.112003][ T29] audit: type=1400 audit(2000000368.310:10692): avc: denied { perfmon } for pid=12460 comm="syz.2.2133" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1858.117654][ T29] audit: type=1400 audit(2000000368.310:10693): avc: denied { bpf } for pid=12460 comm="syz.2.2133" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1858.145983][ T29] audit: type=1400 audit(2000000368.330:10694): avc: denied { bpf } for pid=12460 comm="syz.2.2133" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1858.165060][ T29] audit: type=1400 audit(2000000368.360:10695): avc: denied { prog_run } for pid=12460 comm="syz.2.2133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1858.180621][ T29] audit: type=1400 audit(2000000368.370:10696): avc: denied { map_create } for pid=12460 comm="syz.2.2133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1863.524837][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 1863.526409][ T29] audit: type=1400 audit(2000000373.720:10700): avc: denied { create } for pid=12468 comm="syz.0.2134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1863.649143][ T29] audit: type=1400 audit(2000000373.840:10701): avc: denied { create } for pid=12468 comm="syz.0.2134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1863.653218][ T29] audit: type=1400 audit(2000000373.850:10702): avc: denied { write } for pid=12468 comm="syz.0.2134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1863.659678][ T29] audit: type=1400 audit(2000000373.850:10703): avc: denied { module_request } for pid=12468 comm="syz.0.2134" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1864.194425][ T29] audit: type=1400 audit(2000000374.390:10704): avc: denied { ioctl } for pid=12468 comm="syz.0.2134" path="socket:[29896]" dev="sockfs" ino=29896 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1864.250394][ T29] audit: type=1400 audit(2000000374.440:10705): avc: denied { module_request } for pid=12468 comm="syz.0.2134" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1864.433024][ T29] audit: type=1400 audit(2000000374.630:10706): avc: denied { read } for pid=12468 comm="syz.0.2134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1864.713888][ T29] audit: type=1400 audit(2000000374.910:10707): avc: denied { prog_load } for pid=12468 comm="syz.0.2134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1864.716602][ T29] audit: type=1400 audit(2000000374.910:10708): avc: denied { bpf } for pid=12468 comm="syz.0.2134" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1864.811359][ T29] audit: type=1400 audit(2000000375.010:10709): avc: denied { perfmon } for pid=12468 comm="syz.0.2134" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1874.355003][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 1874.356384][ T29] audit: type=1400 audit(2000000384.550:10736): avc: denied { create } for pid=12481 comm="syz.2.2137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1874.366279][ T29] audit: type=1400 audit(2000000384.560:10737): avc: denied { connect } for pid=12481 comm="syz.2.2137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1874.372945][ T29] audit: type=1400 audit(2000000384.570:10738): avc: denied { read } for pid=12481 comm="syz.2.2137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1874.892715][ T29] audit: type=1400 audit(2000000385.090:10739): avc: denied { create } for pid=12481 comm="syz.2.2137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1874.903346][ T29] audit: type=1400 audit(2000000385.090:10740): avc: denied { ioctl } for pid=12481 comm="syz.2.2137" path="socket:[29009]" dev="sockfs" ino=29009 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1874.904510][ T29] audit: type=1400 audit(2000000385.100:10741): avc: denied { module_request } for pid=12481 comm="syz.2.2137" kmod="netdev-vxcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1875.121227][ T29] audit: type=1400 audit(2000000385.320:10742): avc: denied { sys_module } for pid=12481 comm="syz.2.2137" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1875.123754][ T29] audit: type=1400 audit(2000000385.320:10743): avc: denied { module_request } for pid=12481 comm="syz.2.2137" kmod="vxcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1875.341955][T12483] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2137'. [ 1877.116542][ T29] audit: type=1400 audit(2000000387.310:10744): avc: denied { module_request } for pid=12486 comm="syz.2.2138" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1877.371081][ T29] audit: type=1400 audit(2000000387.570:10745): avc: denied { write } for pid=12492 comm="syz.0.2139" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1878.463758][T12505] tmpfs: Unsupported parameter 'mpol' [ 1879.124730][T12516] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2142'. [ 1879.359102][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 1879.360502][ T29] audit: type=1400 audit(2000000389.550:10777): avc: denied { ioctl } for pid=12513 comm="syz.2.2148" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x55c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1879.369766][ T29] audit: type=1400 audit(2000000389.560:10778): avc: denied { ioctl } for pid=12513 comm="syz.2.2148" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1879.381855][ T29] audit: type=1400 audit(2000000389.580:10779): avc: denied { sys_module } for pid=12513 comm="syz.2.2148" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1879.391050][ T29] audit: type=1400 audit(2000000389.590:10780): avc: denied { module_request } for pid=12513 comm="syz.2.2148" kmod="tty-ldisc-20" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1880.053772][ T29] audit: type=1400 audit(2000000390.250:10781): avc: denied { map_create } for pid=12520 comm="syz.2.2150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1880.062899][ T29] audit: type=1400 audit(2000000390.260:10782): avc: denied { map_read map_write } for pid=12520 comm="syz.2.2150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1880.354508][ T29] audit: type=1400 audit(2000000390.550:10783): avc: denied { create } for pid=12522 comm="syz.2.2151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1880.367727][ T29] audit: type=1400 audit(2000000390.560:10784): avc: denied { ioctl } for pid=12522 comm="syz.2.2151" path="socket:[29933]" dev="sockfs" ino=29933 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1880.389715][ T29] audit: type=1400 audit(2000000390.580:10785): avc: denied { setopt } for pid=12522 comm="syz.2.2151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1880.393503][ T29] audit: type=1400 audit(2000000390.590:10786): avc: denied { write } for pid=12522 comm="syz.2.2151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1883.536822][T12575] netlink: 4 bytes leftover after parsing attributes in process `syz.0.2157'. [ 1884.555827][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 1884.556955][ T29] audit: type=1400 audit(2000000394.750:10849): avc: denied { prog_load } for pid=12588 comm="syz.2.2165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1884.562600][ T29] audit: type=1400 audit(2000000394.760:10850): avc: denied { bpf } for pid=12588 comm="syz.2.2165" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1884.574952][ T29] audit: type=1400 audit(2000000394.770:10851): avc: denied { map_create } for pid=12588 comm="syz.2.2165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1884.584217][ T29] audit: type=1400 audit(2000000394.780:10852): avc: denied { bpf } for pid=12588 comm="syz.2.2165" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1884.593247][ T29] audit: type=1400 audit(2000000394.790:10853): avc: denied { map_read map_write } for pid=12588 comm="syz.2.2165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1884.605505][ T29] audit: type=1400 audit(2000000394.800:10854): avc: denied { prog_load } for pid=12588 comm="syz.2.2165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1884.613988][ T29] audit: type=1400 audit(2000000394.810:10855): avc: denied { bpf } for pid=12588 comm="syz.2.2165" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1884.623657][ T29] audit: type=1400 audit(2000000394.820:10856): avc: denied { prog_load } for pid=12588 comm="syz.2.2165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1884.631617][ T29] audit: type=1400 audit(2000000394.830:10857): avc: denied { bpf } for pid=12588 comm="syz.2.2165" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1884.637845][ T29] audit: type=1400 audit(2000000394.830:10858): avc: denied { perfmon } for pid=12588 comm="syz.2.2165" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1893.592043][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 1893.594077][ T29] audit: type=1400 audit(2000000403.790:10893): avc: denied { module_request } for pid=12601 comm="syz.0.2169" kmod="fs-befs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1899.795245][ T29] audit: type=1400 audit(2000000409.990:10894): avc: denied { create } for pid=12606 comm="syz.2.2170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1899.797975][ T29] audit: type=1400 audit(2000000409.990:10895): avc: denied { ioctl } for pid=12606 comm="syz.2.2170" path="socket:[29969]" dev="sockfs" ino=29969 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1899.810498][ T29] audit: type=1400 audit(2000000410.010:10896): avc: denied { module_request } for pid=12606 comm="syz.2.2170" kmod="netdev-vxcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1899.979582][ T29] audit: type=1400 audit(2000000410.180:10897): avc: denied { sys_module } for pid=12606 comm="syz.2.2170" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1899.982249][ T29] audit: type=1400 audit(2000000410.180:10898): avc: denied { module_request } for pid=12606 comm="syz.2.2170" kmod="vxcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1900.173006][T12607] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2170'. [ 1900.751530][ T29] audit: type=1400 audit(2000000410.950:10899): avc: denied { create } for pid=12612 comm="syz.2.2172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1900.774154][ T29] audit: type=1400 audit(2000000410.970:10900): avc: denied { ioctl } for pid=12612 comm="syz.2.2172" path="socket:[29970]" dev="sockfs" ino=29970 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1901.051599][ T29] audit: type=1400 audit(2000000411.250:10901): avc: denied { create } for pid=12614 comm="syz.2.2173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1901.060565][ T29] audit: type=1400 audit(2000000411.260:10902): avc: denied { module_request } for pid=12614 comm="syz.2.2173" kmod="net-pf-10-proto-0-type-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1901.398048][ T29] audit: type=1400 audit(2000000411.590:10903): avc: denied { module_request } for pid=12614 comm="syz.2.2173" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1904.842851][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 1904.845001][ T29] audit: type=1400 audit(2000000415.040:10941): avc: denied { accept } for pid=12631 comm="syz.2.2180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1905.111431][ T29] audit: type=1400 audit(2000000415.310:10942): avc: denied { module_request } for pid=12631 comm="syz.2.2180" kmod="crypto-cbc-twofish-3way-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1906.200806][ T29] audit: type=1400 audit(2000000416.400:10943): avc: denied { create } for pid=12640 comm="syz.2.2182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1906.217760][ T29] audit: type=1400 audit(2000000416.410:10944): avc: denied { ioctl } for pid=12640 comm="syz.2.2182" path="socket:[30003]" dev="sockfs" ino=30003 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1907.729675][ T29] audit: type=1400 audit(2000000417.930:10945): avc: denied { create } for pid=12645 comm="syz.2.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1907.734865][ T29] audit: type=1400 audit(2000000417.930:10946): avc: denied { write } for pid=12645 comm="syz.2.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1908.278459][ T29] audit: type=1400 audit(2000000418.470:10947): avc: denied { create } for pid=12647 comm="syz.2.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1908.304448][ T29] audit: type=1400 audit(2000000418.500:10948): avc: denied { write } for pid=12647 comm="syz.2.2185" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1909.143175][ T29] audit: type=1400 audit(2000000419.340:10949): avc: denied { prog_load } for pid=12649 comm="syz.2.2186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1909.169273][ T29] audit: type=1400 audit(2000000419.360:10950): avc: denied { bpf } for pid=12649 comm="syz.2.2186" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1913.795637][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 1913.796001][ T29] audit: type=1400 audit(2000000423.990:10972): avc: denied { create } for pid=12649 comm="syz.2.2186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1913.924034][ T29] audit: type=1400 audit(2000000424.120:10973): avc: denied { read write } for pid=12649 comm="syz.2.2186" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1913.941105][ T29] audit: type=1400 audit(2000000424.140:10974): avc: denied { read write open } for pid=12649 comm="syz.2.2186" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1921.692397][ T29] audit: type=1400 audit(2000000431.880:10975): avc: denied { create } for pid=12653 comm="syz.0.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1921.704681][ T29] audit: type=1400 audit(2000000431.900:10976): avc: denied { create } for pid=12653 comm="syz.0.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1921.739315][ T29] audit: type=1400 audit(2000000431.930:10977): avc: denied { map_create } for pid=12653 comm="syz.0.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1921.746569][ T29] audit: type=1400 audit(2000000431.940:10978): avc: denied { bpf } for pid=12653 comm="syz.0.2187" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1921.770742][ T29] audit: type=1400 audit(2000000431.970:10979): avc: denied { map_read map_write } for pid=12653 comm="syz.0.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1921.802001][ T29] audit: type=1400 audit(2000000431.990:10980): avc: denied { prog_load } for pid=12653 comm="syz.0.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1921.812928][ T29] audit: type=1400 audit(2000000432.010:10981): avc: denied { bpf } for pid=12653 comm="syz.0.2187" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1921.847114][ T29] audit: type=1400 audit(2000000432.040:10982): avc: denied { prog_load } for pid=12653 comm="syz.0.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1921.869350][ T29] audit: type=1400 audit(2000000432.060:10983): avc: denied { bpf } for pid=12653 comm="syz.0.2187" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1921.869775][ T29] audit: type=1400 audit(2000000432.060:10984): avc: denied { perfmon } for pid=12653 comm="syz.0.2187" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1926.719154][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 1926.722859][ T29] audit: type=1400 audit(2000000436.900:11000): avc: denied { create } for pid=12663 comm="syz.0.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1926.729493][ T29] audit: type=1400 audit(2000000436.930:11001): avc: denied { ioctl } for pid=12663 comm="syz.0.2192" path="socket:[30044]" dev="sockfs" ino=30044 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1926.735408][ T29] audit: type=1400 audit(2000000436.930:11002): avc: denied { module_request } for pid=12663 comm="syz.0.2192" kmod="netdev-vcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1927.310289][ T29] audit: type=1400 audit(2000000437.510:11003): avc: denied { ioctl } for pid=12663 comm="syz.0.2192" path="socket:[30044]" dev="sockfs" ino=30044 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1927.317416][ T29] audit: type=1400 audit(2000000437.510:11004): avc: denied { module_request } for pid=12663 comm="syz.0.2192" kmod="netdev-vxcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1927.417037][ T29] audit: type=1400 audit(2000000437.610:11005): avc: denied { sys_module } for pid=12663 comm="syz.0.2192" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1927.429705][ T29] audit: type=1400 audit(2000000437.630:11006): avc: denied { module_request } for pid=12663 comm="syz.0.2192" kmod="vcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1927.941926][ T29] audit: type=1400 audit(2000000438.140:11007): avc: denied { bind } for pid=12663 comm="syz.0.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1927.990409][ T29] audit: type=1400 audit(2000000438.140:11008): avc: denied { bind } for pid=12663 comm="syz.0.2192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1928.326764][ T29] audit: type=1400 audit(2000000438.520:11009): avc: denied { sys_module } for pid=12663 comm="syz.0.2192" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1931.852074][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 1931.854629][ T29] audit: type=1400 audit(2000000442.050:11039): avc: denied { sys_module } for pid=12681 comm="syz.0.2198" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1931.863447][ T29] audit: type=1400 audit(2000000442.060:11040): avc: denied { module_request } for pid=12681 comm="syz.0.2198" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1932.056785][ T29] audit: type=1400 audit(2000000442.250:11041): avc: denied { execmem } for pid=12681 comm="syz.0.2198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1933.723723][ T29] audit: type=1400 audit(2000000443.920:11042): avc: denied { read } for pid=12677 comm="syz.2.2196" dev="nsfs" ino=4026532705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1933.752190][ T29] audit: type=1400 audit(2000000443.950:11043): avc: denied { read open } for pid=12677 comm="syz.2.2196" path="net:[4026532705]" dev="nsfs" ino=4026532705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1933.756815][ T29] audit: type=1400 audit(2000000443.950:11044): avc: denied { create } for pid=12677 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1933.796201][ T29] audit: type=1400 audit(2000000443.990:11045): avc: denied { bind } for pid=12677 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1933.821232][ T29] audit: type=1400 audit(2000000444.000:11046): avc: denied { create } for pid=12677 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1933.839232][ T29] audit: type=1400 audit(2000000444.010:11047): avc: denied { bind } for pid=12677 comm="syz.2.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1933.839702][ T29] audit: type=1400 audit(2000000444.020:11048): avc: denied { module_request } for pid=12677 comm="syz.2.2196" kmod="crypto-cbc-twofish-3way" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1941.045061][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 1941.045921][ T29] audit: type=1400 audit(2000000451.240:11067): avc: denied { create } for pid=12695 comm="syz.0.2199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1941.053921][ T29] audit: type=1400 audit(2000000451.250:11068): avc: denied { write } for pid=12695 comm="syz.0.2199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1941.058745][ T29] audit: type=1400 audit(2000000451.260:11069): avc: denied { nlmsg_write } for pid=12695 comm="syz.0.2199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1941.302361][ T29] audit: type=1400 audit(2000000451.500:11070): avc: denied { prog_load } for pid=12697 comm="syz.0.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1941.308967][ T29] audit: type=1400 audit(2000000451.500:11071): avc: denied { bpf } for pid=12697 comm="syz.0.2200" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1941.321207][ T29] audit: type=1400 audit(2000000451.520:11072): avc: denied { create } for pid=12697 comm="syz.0.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1941.331810][ T29] audit: type=1400 audit(2000000451.530:11073): avc: denied { create } for pid=12697 comm="syz.0.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1941.343173][ T29] audit: type=1400 audit(2000000451.540:11074): avc: denied { map_create } for pid=12697 comm="syz.0.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1941.351702][ T29] audit: type=1400 audit(2000000451.550:11075): avc: denied { map_read map_write } for pid=12697 comm="syz.0.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1941.361436][ T29] audit: type=1400 audit(2000000451.560:11076): avc: denied { prog_load } for pid=12697 comm="syz.0.2200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1955.227163][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 1955.231560][ T29] audit: type=1400 audit(2000000465.420:11097): avc: denied { read write } for pid=12713 comm="syz.0.2204" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1955.243702][ T29] audit: type=1400 audit(2000000465.440:11098): avc: denied { read write open } for pid=12713 comm="syz.0.2204" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1955.484677][ T29] audit: type=1400 audit(2000000465.680:11099): avc: denied { module_request } for pid=12715 comm="syz.0.2205" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1955.934636][ T29] audit: type=1400 audit(2000000466.130:11100): avc: denied { execmem } for pid=12718 comm="syz.0.2206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1956.608694][ T29] audit: type=1400 audit(2000000466.800:11101): avc: denied { create } for pid=12720 comm="syz.2.2207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1956.627909][ T29] audit: type=1400 audit(2000000466.820:11102): avc: denied { getopt } for pid=12720 comm="syz.2.2207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1956.875575][ T29] audit: type=1400 audit(2000000467.070:11103): avc: denied { read } for pid=12722 comm="syz.2.2208" name="controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1956.889093][ T29] audit: type=1400 audit(2000000467.080:11104): avc: denied { read open } for pid=12722 comm="syz.2.2208" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1956.889692][ T29] audit: type=1400 audit(2000000467.080:11105): avc: denied { ioctl } for pid=12722 comm="syz.2.2208" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 ioctlcmd=0x551a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1957.068205][ T29] audit: type=1400 audit(2000000467.260:11106): avc: denied { execmem } for pid=12724 comm="syz.2.2209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1967.830738][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 1967.834751][ T29] audit: type=1400 audit(2000000478.030:11123): avc: denied { read } for pid=12737 comm="syz.0.2211" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1967.835407][ T29] audit: type=1400 audit(2000000478.030:11124): avc: denied { read open } for pid=12737 comm="syz.0.2211" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1967.842587][ T29] audit: type=1400 audit(2000000478.030:11125): avc: denied { create } for pid=12737 comm="syz.0.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1967.847584][ T29] audit: type=1400 audit(2000000478.040:11126): avc: denied { read write } for pid=12737 comm="syz.0.2211" name="midiC2D0" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1967.852153][ T29] audit: type=1400 audit(2000000478.050:11127): avc: denied { read write open } for pid=12737 comm="syz.0.2211" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1968.377127][ T29] audit: type=1400 audit(2000000478.570:11128): avc: denied { create } for pid=12737 comm="syz.0.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1968.396463][ T29] audit: type=1400 audit(2000000478.590:11129): avc: denied { bind } for pid=12737 comm="syz.0.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1968.420436][ T29] audit: type=1400 audit(2000000478.620:11130): avc: denied { setopt } for pid=12737 comm="syz.0.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1968.434570][ T29] audit: type=1400 audit(2000000478.630:11131): avc: denied { setopt } for pid=12737 comm="syz.0.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1968.456212][ T29] audit: type=1400 audit(2000000478.650:11132): avc: denied { create } for pid=12737 comm="syz.0.2211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1971.375232][T12752] input: syz1 as /devices/virtual/input/input22 [ 1972.844335][ T29] kauditd_printk_skb: 72 callbacks suppressed [ 1972.844744][ T29] audit: type=1400 audit(2000000483.040:11205): avc: denied { bpf } for pid=12761 comm="syz.2.2218" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1972.854390][ T29] audit: type=1400 audit(2000000483.050:11206): avc: denied { prog_run } for pid=12761 comm="syz.2.2218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1973.140200][ T29] audit: type=1400 audit(2000000483.320:11207): avc: denied { module_request } for pid=12763 comm="syz.0.2219" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1973.395629][ T29] audit: type=1400 audit(2000000483.590:11208): avc: denied { setopt } for pid=12761 comm="syz.2.2218" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1973.425837][ T29] audit: type=1400 audit(2000000483.620:11209): avc: denied { prog_load } for pid=12761 comm="syz.2.2218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1973.481082][ T29] audit: type=1400 audit(2000000483.680:11210): avc: denied { bpf } for pid=12761 comm="syz.2.2218" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1974.358964][ T29] audit: type=1400 audit(2000000484.550:11211): avc: denied { read write } for pid=12768 comm="syz.2.2220" name="ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1974.388725][ T29] audit: type=1400 audit(2000000484.580:11212): avc: denied { read write open } for pid=12768 comm="syz.2.2220" path="/dev/ttynull" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1974.540600][ T29] audit: type=1400 audit(2000000484.740:11213): avc: denied { create } for pid=12770 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1974.562169][ T29] audit: type=1400 audit(2000000484.760:11214): avc: denied { write } for pid=12770 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1977.986395][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1977.994997][ T29] audit: type=1400 audit(2000000488.180:11226): avc: denied { create } for pid=12787 comm="syz.0.2229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1978.022689][ T29] audit: type=1400 audit(2000000488.220:11227): avc: denied { ioctl } for pid=12787 comm="syz.0.2229" path="socket:[30180]" dev="sockfs" ino=30180 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1978.049881][ T29] audit: type=1400 audit(2000000488.230:11228): avc: denied { module_request } for pid=12787 comm="syz.0.2229" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1978.511256][ T29] audit: type=1400 audit(2000000488.710:11229): avc: denied { read } for pid=12787 comm="syz.0.2229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1978.534821][ T29] audit: type=1400 audit(2000000488.730:11230): avc: denied { read write } for pid=12792 comm="syz.2.2230" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1978.539067][ T29] audit: type=1400 audit(2000000488.730:11231): avc: denied { read write open } for pid=12792 comm="syz.2.2230" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1978.545100][ T29] audit: type=1400 audit(2000000488.740:11232): avc: denied { write } for pid=12787 comm="syz.0.2229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1978.642050][ T29] audit: type=1400 audit(2000000488.840:11233): avc: denied { ioctl } for pid=12792 comm="syz.2.2230" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1978.650419][T12793] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1978.660557][ T29] audit: type=1400 audit(2000000488.840:11234): avc: denied { ioctl } for pid=12792 comm="syz.2.2230" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1978.660937][T12793] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1979.034976][ T29] audit: type=1400 audit(2000000489.230:11235): avc: denied { sys_module } for pid=12787 comm="syz.0.2229" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1982.054368][T12814] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2235'. [ 1982.223854][T12815] genirq: Flags mismatch irq 31. 00200001 (comedi_parport) vs. 00200081 (virtio0) [ 1982.227311][T12815] 8<--- cut here --- [ 1982.229963][T12815] Unable to handle kernel paging request at virtual address fee04f27 when write [ 1982.231143][T12815] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 1982.239576][T12815] Internal error: Oops: a06 [#1] SMP ARM [ 1982.243666][T12815] Modules linked in: [ 1982.248308][T12815] CPU: 1 UID: 0 PID: 12815 Comm: syz.0.2236 Tainted: G L syzkaller #0 PREEMPT [ 1982.248850][T12815] Tainted: [L]=SOFTLOCKUP [ 1982.249063][T12815] Hardware name: ARM-Versatile Express [ 1982.249387][T12815] PC is at parport_attach+0x174/0x1d0 [ 1982.250044][T12815] LR is at parport_attach+0x164/0x1d0 [ 1982.250304][T12815] pc : [<81408900>] lr : [<814088f0>] psr: 60000013 [ 1982.250607][T12815] sp : dfb8dd28 ip : dfb8dd28 fp : dfb8dd4c [ 1982.250867][T12815] r10: 82b28ad8 r9 : 00000003 r8 : 83f76300 [ 1982.251167][T12815] r7 : dfb8dd88 r6 : 83f76300 r5 : 00000000 r4 : 00000000 [ 1982.251591][T12815] r3 : fee04f27 r2 : 81e1a338 r1 : 00000001 r0 : 81408570 [ 1982.254853][T12815] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1982.255523][T12815] Control: 30c5387d Table: 858ee280 DAC: 00000000 [ 1982.257243][T12815] Register r0 information: non-slab/vmalloc memory [ 1982.259455][T12815] Register r1 information: non-paged memory [ 1982.259871][T12815] Register r2 information: non-slab/vmalloc memory [ 1982.260176][T12815] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 1982.260817][T12815] Register r4 information: NULL pointer [ 1982.261099][T12815] Register r5 information: NULL pointer [ 1982.261485][T12815] Register r6 information: slab kmalloc-192 start 83f76300 pointer offset 0 size 192 [ 1982.262631][T12815] Register r7 information: 2-page vmalloc region starting at 0xdfb8c000 allocated at kernel_clone+0xac/0x3ec [ 1982.263119][T12815] Register r8 information: slab kmalloc-192 start 83f76300 pointer offset 0 size 192 [ 1982.263614][T12815] Register r9 information: non-paged memory [ 1982.263913][T12815] Register r10 information: non-slab/vmalloc memory [ 1982.264217][T12815] Register r11 information: 2-page vmalloc region starting at 0xdfb8c000 allocated at kernel_clone+0xac/0x3ec [ 1982.264701][T12815] Register r12 information: 2-page vmalloc region starting at 0xdfb8c000 allocated at kernel_clone+0xac/0x3ec [ 1982.265262][T12815] Process syz.0.2236 (pid: 12815, stack limit = 0xdfb8c000) [ 1982.265621][T12815] Stack: (0xdfb8dd28 to 0xdfb8e000) [ 1982.265908][T12815] dd20: 82432da0 83f76300 829d3f08 829d3f08 81e1a7f8 83f76344 [ 1982.266333][T12815] dd40: dfb8dd84 dfb8dd50 814045a8 81408798 83f76330 00000000 dfb8dd74 200000c0 [ 1982.266738][T12815] dd60: 83f76300 b5403587 83f76330 85956000 40946400 00000003 dfb8de44 dfb8dd88 [ 1982.267101][T12815] dd80: 813fff00 814044ac 656d6f63 705f6964 6f707261 00007472 00000000 00004f27 [ 1982.267442][T12815] dda0: 0000001f 00010000 00000004 00000005 00000cc7 00000008 00000007 0000000a [ 1982.267795][T12815] ddc0: 00000100 00000002 00000001 00000002 00000001 00000006 00000101 00000000 [ 1982.268261][T12815] dde0: 0001a449 00000003 40000003 00000089 0000caa7 00000000 20001e58 0000000b [ 1982.268954][T12815] de00: 00000e69 0000003c 00000008 00000006 00000000 fffffff8 00000000 ec886976 [ 1982.269335][T12815] de20: 00000000 85ffa480 83f76300 200000c0 83f76330 85956000 dfb8df14 dfb8de48 [ 1982.269695][T12815] de40: 81400ef4 813ffe0c 00000000 00000000 00000000 dfb8de54 dfb8de54 ec886976 [ 1982.270055][T12815] de60: 00000000 00000000 824a35ec 0000005f 84678448 00000064 845a16cc 85956000 [ 1982.270404][T12815] de80: dfb8dee4 dfb8de90 807b7da0 807ae2c4 00000064 00000001 00000000 dfb8deac [ 1982.270743][T12815] dea0: 84d723d0 834e8220 00006400 0000000b dfb8dea0 00000000 dfb8dd40 ec886976 [ 1982.271502][T12815] dec0: 85ffa480 40946400 200000c0 200000c0 85ffa480 00000003 dfb8def4 dfb8dee8 [ 1982.272490][T12815] dee0: 807b7ec0 ec886976 dfb8df14 40946400 00000000 85ffa481 200000c0 85ffa480 [ 1982.273362][T12815] df00: 00000003 85956000 dfb8dfa4 dfb8df18 8058553c 81400944 ecac8b10 85956000 [ 1982.273985][T12815] df20: dfb8df3c dfb8df30 81aaf3bc 81aaf28c dfb8df54 dfb8df40 8025bcbc 8028e0c4 [ 1982.274390][T12815] df40: dfb8dfb0 40000000 dfb8df84 dfb8df58 80221a38 8025bc78 00000000 8281d17c [ 1982.274749][T12815] df60: dfb8dfb0 0014c880 ecac8b10 8022198c 00000000 ec886976 dfb8dfac 00000000 [ 1982.275100][T12815] df80: 00000000 00316310 00000036 8020029c 85956000 00000036 00000000 dfb8dfa8 [ 1982.275478][T12815] dfa0: 80200060 80585418 00000000 00000000 00000003 40946400 200000c0 00000000 [ 1982.275856][T12815] dfc0: 00000000 00000000 00316310 00000036 00300000 00000000 00006364 76f050bc [ 1982.276218][T12815] dfe0: 76f04ec0 76f04eb0 0001929c 00132320 60000010 00000003 00000000 00000000 [ 1982.276644][T12815] Call trace: [ 1982.276896][T12815] [<8140878c>] (parport_attach) from [<814045a8>] (comedi_device_attach+0x108/0x250) [ 1982.277368][T12815] r6:83f76344 r5:81e1a7f8 r4:829d3f08 [ 1982.277623][T12815] [<814044a0>] (comedi_device_attach) from [<813fff00>] (do_devconfig_ioctl+0x100/0x220) [ 1982.278050][T12815] r10:00000003 r9:40946400 r8:85956000 r7:83f76330 r6:b5403587 r5:83f76300 [ 1982.280066][T12815] r4:200000c0 [ 1982.283995][T12815] [<813ffe00>] (do_devconfig_ioctl) from [<81400ef4>] (comedi_unlocked_ioctl+0x5bc/0x1c2c) [ 1982.284798][T12815] r8:85956000 r7:83f76330 r6:200000c0 r5:83f76300 r4:85ffa480 [ 1982.285242][T12815] [<81400938>] (comedi_unlocked_ioctl) from [<8058553c>] (sys_ioctl+0x130/0xba0) [ 1982.285859][T12815] r10:85956000 r9:00000003 r8:85ffa480 r7:200000c0 r6:85ffa481 r5:00000000 [ 1982.286207][T12815] r4:40946400 [ 1982.286475][T12815] [<8058540c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1982.286888][T12815] Exception stack(0xdfb8dfa8 to 0xdfb8dff0) [ 1982.287167][T12815] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 1982.287521][T12815] dfc0: 00000000 00000000 00316310 00000036 00300000 00000000 00006364 76f050bc [ 1982.287879][T12815] dfe0: 76f04ec0 76f04eb0 0001929c 00132320 [ 1982.288147][T12815] r10:00000036 r9:85956000 r8:8020029c r7:00000036 r6:00316310 r5:00000000 [ 1982.288726][T12815] r4:00000000 [ 1982.289269][T12815] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 1982.291783][T12815] ---[ end trace 0000000000000000 ]--- [ 1982.330763][T12815] Kernel panic - not syncing: Fatal exception [ 1982.334167][T12815] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:01:02 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000005 R03=81aafbf0 R04=00000006 R05=828f7f88 R06=00000000 R07=828f7f80 R08=84108c00 R09=00000028 R10=828f7f88 R11=df801d9c R12=df801da0 R13=df801d90 R14=80340cb0 R15=81aafc00 PSR=60070193 -ZC- A S svc32 s00=72697628 s01=306f6974 d00=306f697472697628 s02=63282031 s03=64656d6f d01=64656d6f63282031 s04=306e616c s05=63732022 d02=63732022306e616c s06=65746e6f s07=723d7478 d03=723d747865746e6f s08=3a746f6f s09=61737973 d04=617379733a746f6f s10=725f6d64 s11=7379733a d05=7379733a725f6d64 s12=5f6d6461 s13=63742074 d06=637420745f6d6461 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ddde41c0 R01=5b720000 R02=002c6189 R03=81aafbf0 R04=00000006 R05=828f7f88 R06=00000000 R07=828f7f80 R08=85956000 R09=00000028 R10=828f7f88 R11=dfb8da04 R12=dfb8da08 R13=dfb8d9f8 R14=80340cb0 R15=81aafc00 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000