last executing test programs: 8m22.171409644s ago: executing program 1 (id=11889): r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c) 8m21.833782701s ago: executing program 1 (id=11890): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc0106442, &(0x7f0000000040)) 8m21.304182568s ago: executing program 1 (id=11891): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000040)={0x40, r1, 0x1, 0x70bd28, 0x4, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x8, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP104={0x11, 0x7, "24842a09fd919a302142e6994b"}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x48005}, 0x0) 8m19.593331715s ago: executing program 1 (id=11895): r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000002f00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002d80)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xffffffffffffffff, 0xee00}}}], 0x20, 0x20048801}}], 0x1, 0x0) 8m19.284227871s ago: executing program 1 (id=11896): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000000)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_UNMAP(r0, 0x3b86, &(0x7f0000000100)={0x18, r1, 0x7, 0x8}) 8m18.92119142s ago: executing program 1 (id=11897): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setns(0xffffffffffffffff, 0x24020000) r3 = openat$iommufd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r3, 0x3b81, &(0x7f0000000400)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r3, 0x3b85, &(0x7f0000000140)={0x28, 0x6, r4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x800}) ioctl$IOMMU_IOAS_COPY(r3, 0x3b83, &(0x7f0000000040)={0x28, 0x5, r4, r4, 0x3, 0x1, 0x3fff}) 7m33.230633538s ago: executing program 32 (id=11897): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setns(0xffffffffffffffff, 0x24020000) r3 = openat$iommufd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r3, 0x3b81, &(0x7f0000000400)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r3, 0x3b85, &(0x7f0000000140)={0x28, 0x6, r4, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x800}) ioctl$IOMMU_IOAS_COPY(r3, 0x3b83, &(0x7f0000000040)={0x28, 0x5, r4, r4, 0x3, 0x1, 0x3fff}) 6m15.254844751s ago: executing program 2 (id=12007): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x18, &(0x7f0000000100)=0xfefffff9, 0x4) 6m15.143571306s ago: executing program 2 (id=12008): sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) syz_usb_connect(0x1, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000014da2108ab12a390eb1e00000001"], 0x0) 6m15.023873652s ago: executing program 2 (id=12009): bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000400)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="1200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="88b9538225"], 0x20) 6m14.894994269s ago: executing program 2 (id=12010): r0 = syz_usb_connect(0x3, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="9f01000083667d1040206402d14e0102030109021b000100000000090400000190f19c000905f3ed"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000001840)={0x84, &(0x7f0000001340)={0x20, 0x3, 0x63, "6e812891baf00ff056c8d9b664ade4b8359cac7d2f4c2927254bdaf6870ce6b05ca1295287b676c2b271ee5964de0835ed838d493cb6fd31133188cbc8cde357d73e895856bad34c5d8521a9127de34d19a1436ace62648339731f318971653c3d947b"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={0x40, 0xb, 0x2, "009d"}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001780)={0x40, 0x1c, 0x1, 0x6}, 0x0, &(0x7f0000001800)={0x40, 0x21, 0x1, 0x7f}}) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000840)={0x84, &(0x7f0000000040)={0x40, 0x17}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) 6m14.714549358s ago: executing program 2 (id=12011): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="11000000040000000400000009"], 0x50) r0 = syz_open_procfs(0x0, &(0x7f00000006c0)='fdinfo/3\x00') pread64(r0, &(0x7f0000000140)=""/116, 0x74, 0x4) 6m14.514783009s ago: executing program 2 (id=12012): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f00000000c0)={0x1d, r4}, 0x10) sendmsg$can_bcm(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="0100000003ece1e40ad8871461ab0800", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="3bf81bb9f9"], 0x20000600}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 5m28.929188411s ago: executing program 33 (id=12012): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r3, &(0x7f00000000c0)={0x1d, r4}, 0x10) sendmsg$can_bcm(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="0100000003ece1e40ad8871461ab0800", @ANYRES64=0x0, @ANYRES64=r3, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="3bf81bb9f9"], 0x20000600}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 14.444161134s ago: executing program 0 (id=12353): clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f00000001c0)=ANY=[@ANYBLOB="026b0000000000000200000000000085", @ANYRES64=r0, @ANYRES64=r1/1000+60000, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0000004001000000030000c018010000edd6702f0415bc068173ab7660ad8f5d5a5e239dfd42f5dd9429e789ee0d991d42acdf9fbd047189019455e87127fa19306abe7b853ee4bc7a240a307bf4c64f"], 0x80}, 0x1, 0x0, 0x0, 0x2004c091}, 0x20000000) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f00000000c0)={0x1, 0x2, 0x0, 0x80000000}) epoll_pwait2(0xffffffffffffffff, &(0x7f0000000280)=[{}], 0x1, &(0x7f0000000300), &(0x7f0000000340)={[0x401]}, 0x8) syz_usb_control_io$hid(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000140), 0x4) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x20000000ec071, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000600)=0x1, 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x303}, "0f78fbc54b6c106c", "75fd7583f127c5c356354c80ea765edaa15f377fb214e20fda1b0241bed67dc4", "b1726789", "fb442565fb00"}, 0x38) r6 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r6, 0xfffffffffffffffe, r6, 0x0) sendto$inet6(r5, &(0x7f00000001c0), 0xffffffffffffff13, 0x0, 0x0, 0x3000137) prctl$PR_SET_IO_FLUSHER(0x39, 0x0) 8.702883897s ago: executing program 3 (id=12367): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) open(&(0x7f0000000000)='./file0\x00', 0x60840, 0xa8) 8.574740943s ago: executing program 3 (id=12368): socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x4}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) ptrace(0x10, r0) 1.903416763s ago: executing program 3 (id=12369): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'hash\x00', 0x0, 0x0, 'blake2b-256\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be", 0x9}], 0x1}], 0x1, 0x40800) 1.646796886s ago: executing program 3 (id=12370): r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4b) close(r0) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000300)={0x0, 0xfffffffffffffe7a, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000600)={r2, 0xd, 0x0, 0x0, 0x0, [], [0x800000], [0x4, 0x1001000, 0x3], [0x7, 0xfffffffffffffffd, 0x7, 0x1]}) 1.492386694s ago: executing program 3 (id=12371): r0 = syz_usb_connect(0x0, 0x3f, &(0x7f00000001c0)=ANY=[@ANYBLOB="120100004366b408c70b0800c84f0102030109022d00010000000009040000032eb47d000905f9ffffff00"], 0x0) syz_usb_ep_read(r0, 0xf, 0x0, 0x0) 1.352779131s ago: executing program 3 (id=12372): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x2, 0x8, 0x0, 0x3}, 0x0) ioprio_get$uid(0x3, 0x0) 1.253762386s ago: executing program 0 (id=12373): r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000200)={0x10}) 1.125719693s ago: executing program 0 (id=12374): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0/file0/file0\x00', 0x0, 0x4000, 0x0) write$FUSE_INIT(r0, &(0x7f0000000340)={0x50, 0x0, r1, {0x7, 0x29, 0x0, 0x809000}}, 0x50) read$FUSE(r0, &(0x7f0000004180)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_ATTR(r0, &(0x7f0000000200)={0x78, 0x0, r4, {0x0, 0x9c9, 0x0, {0x6, 0x2, 0x5, 0x1, 0x1, 0x4, 0x5, 0x3, 0xbf, 0xa000, 0x4, r2, r3, 0xff, 0x400}}}, 0x78) 493.595985ms ago: executing program 0 (id=12375): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000c40)=@filter={'filter\x00', 0x42, 0x4, 0xb20, 0xffffffff, 0x0, 0x9e0, 0x0, 0xffffffff, 0xffffffff, 0xa88, 0xa88, 0xa88, 0xffffffff, 0x5, 0x0, {[{{@uncond, 0x74000002, 0x878, 0x8d8, 0x1ba, {0x46010000, 0x2c000000000000}, [@common=@unspec=@u32={{0x7e0}, {[{[{0x3, 0x3}, {0x7, 0x2}, {0x9, 0x1}, {0xfffffffc}, {0xfffffff7, 0x2}, {0x8, 0x2}, {0xfffffff0, 0x3}, {0xfffffffd}, {0x8000, 0x2}, {}, {0x8, 0x2}], [{0x43ee, 0x1ff}, {0x4, 0x6}, {0x3, 0x9}, {0x8, 0x2}, {0x4}, {0x4, 0x90}, {0xf7d, 0x2}, {0x7, 0x341}, {0x2780, 0x7fffffff}, {0xfffffc00, 0x3}, {0x401, 0x3b1}], 0x0, 0xb}, {[{0x0, 0x2}, {0x5, 0x2}, {0x6, 0x2}, {0x7fff, 0x1}, {0x7, 0x2}, {0x80000000, 0x1}, {0x9, 0x3}, {0x1, 0x1}, {0x1, 0x3}, {0x4e, 0x3}, {0x80000000}], [{0x3, 0x5}, {0x5, 0xfffffffa}, {0x1000, 0x400}, {0x71a, 0x1}, {0x0, 0xfffffff9}, {0x3, 0x6}, {0xfb99}, {0x7fff, 0x3f8000}, {0x26, 0x80000000}, {0xd, 0x1da}, {0x8, 0x6}], 0xa, 0xa}, {[{0x7, 0x1}, {0x7, 0x1}, {0xfffffff8, 0x1}, {0x546, 0x3}, {0x8, 0x1}, {0x0, 0x2}, {0x9, 0x2}, {0x9, 0x1}, {0x7f, 0x2}, {0x0, 0x2}, {0xf6, 0x2}], [{0xc0000000, 0xffffffff}, {0x0, 0x3}, {0x9, 0x309b68d6}, {0x2, 0xb0}, {0x0, 0x5ac}, {0x5, 0x8000}, {0x7ff, 0x7ff}, {0x2, 0x7}, {0x9, 0x81}, {0x41, 0x1}, {0xfffffffb, 0x7ff}], 0x0, 0x4}, {[{0x2, 0x1}, {0x6, 0x2}, {0x15}, {0x40}, {0x5, 0x1}, {0xf, 0x2}, {0x1, 0x3}, {0x3, 0x1}, {0xffff8000, 0x1}, {0x0, 0x2}, {0x81, 0x2}], [{0xfffff000, 0x1c1}, {0x7f1, 0xdfd9}, {0x8001, 0x9}, {0x4, 0xcde6}, {0x8f77, 0x1ff}, {0xffffff80, 0x1}, {0x9, 0x6}, {0x7fffffff, 0xe000000}, {0x3, 0x7}, {0xd9, 0x9}, {0x1, 0x400}], 0x4, 0x6}, {[{0x1, 0x3}, {0x5, 0x1}, {0x5, 0x1}, {0x1, 0x3}, {0x2fd, 0x1}, {0x8a5, 0x1}, {0x9}, {0xd}, {0x6, 0x3}, {0x2, 0x2}, {0x6, 0x2}], [{0x2, 0x4}, {0xc, 0x2}, {0x6, 0x1000}, {0xda0a, 0xf855}, {0x0, 0xfff}, {0x2, 0x9}, {0x68, 0x100}, {0x3, 0x2}, {0x4, 0x3ff}, {0xee2}, {0x9, 0x9}], 0x5, 0x9}, {[{0x2, 0x3}, {0x8, 0x1}, {0x95872047, 0x1}, {0x2, 0x1}, {0x1}, {0x2}, {0x40}, {0x6, 0x3}, {0x7}, {0x3, 0x1}, {0x17, 0x1}], [{0x32a6, 0x6}, {0x7}, {0x7, 0x56bde36a}, {0x15, 0x401}, {0x9, 0x200}, {0x9, 0x1000}, {0x1, 0x401}, {0x7}, {0x7, 0x2}, {0xb, 0x7d}, {0x41, 0x6}], 0x5, 0x2}, {[{0xfffff45f}, {0x2}, {0x800, 0x1}, {0x7fff}, {0x7fffffff}, {0x81, 0x2}, {0x5, 0x3}, {0xff}, {0x7}, {0x3ff, 0x3}, {0x100}], [{0x8a50, 0x3}, {0x1, 0x6d}, {0x6, 0x7fff}, {0x1, 0x3}, {0x6, 0xfff}, {0x4000000, 0x7}, {0x400}, {0x1}, {0xb65, 0x9}, {0x5f8, 0x5}, {0x1, 0xd4}], 0x2, 0x6}, {[{0x101, 0x2}, {0x9}, {0x4, 0x2}, {0x8, 0x2}, {0x80000000}, {0x4}, {0x6, 0x2}, {0x6}, {0x6, 0x3}, {0x767, 0x3}, {0x3, 0x3}], [{0xffff7ba7, 0x2}, {0x9, 0x8}, {0x4, 0x9}, {0x9, 0x101}, {0x69, 0x1}, {0x1, 0x5}, {0x9, 0x3}, {0x5, 0x8}, {0x3, 0xb29d}, {0x40, 0x2}, {0x4, 0x1}], 0x5, 0xa}, {[{0x8, 0x1}, {0x4, 0x3}, {0xffffffff, 0x2}, {0x2, 0x3}, {0x9}, {0x7, 0x3}, {0x6, 0x1}, {0x6}, {0x3, 0x3}, {0x3, 0x1}, {0x9, 0x3}], [{0x8001, 0x1}, {0xfffffff8, 0x7fffffff}, {0x4, 0x1000}, {0x0, 0xeb}, {0x3, 0x6}, {}, {0x200, 0x7ff}, {0x112, 0xd}, {0x81, 0x3}, {0x8, 0x53c}, {0x8, 0x7}], 0x9, 0xa}, {[{0x6, 0x1}, {0x1, 0x2}, {0x2, 0x2}, {0x1, 0x2}, {0x200}, {0x7, 0x2}, {0x4, 0x3}, {0x6, 0x2}, {0x9}, {0x3c8, 0x3}, {0x2a, 0x1}], [{0x7}, {0x0, 0x1ff}, {0x8000, 0xec1}, {0x9, 0x5d5}, {0x1}, {0x9183, 0x2}, {0x8, 0x9bc}, {0x12d, 0x7}, {0x97, 0x7}, {0xffffffff, 0x7}, {0x1, 0xc934}], 0x8, 0x7}, {[{0xa22, 0x1}, {0x6da, 0x1}, {0xb2fe}, {0x9, 0x2}, {0x5, 0x2}, {0x7, 0x3}, {0x400}, {}, {0xff0, 0x3}, {0x80000001, 0x1}, {0xffffffff, 0x2}], [{0x20, 0x101}, {0x4, 0xf}, {0x81, 0x9}, {0x10000, 0x5}, {0x9, 0x2}, {0x9, 0x122}, {0x9, 0x1}, {0xb0ab, 0x8}, {0x438, 0x1f6}, {0x5, 0x1e2}, {0x2, 0xffffffff}], 0x0, 0x5}], 0x4, 0x1}}, @common=@unspec=@connlabel={{0x28}, {0x5, 0x3}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x0, 0x6, 0x6, 0x0, 0x6, 0x4], 0x6, 0x1}, {0x0, [0x8, 0xa, 0x0, 0x6, 0x7, 0x5], 0x1}}}}, {{@uncond, 0x287, 0xe0, 0x108, 0x0, {}, [@common=@unspec=@cpu={{0x28}}, @common=@unspec=@limit={{0x48}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff, 0x2, 0x4}, {0x0, 0x4, 0x1}, {0xffffffffffffffff, 0x6, 0x1}, 0x3, 0xa}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0xb80) gettid() add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 220.330989ms ago: executing program 0 (id=12376): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/comedi4\x00', 0x1, 0x0) ioctl$COMEDI_INSNLIST(r0, 0x8010640b, &(0x7f0000000080)={0x2, &(0x7f0000000880)=[{0xa000006, 0x0, 0x0, 0xb, 0x10}, {0xc000003, 0x0, 0x0, 0x5, 0xfffffffd}]}) 0s ago: executing program 0 (id=12377): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, 0x0, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x5, 0x4, 0x4, 0x5, 0x6, 0x6, 0x7, 0xa, 0x100, 0x2, 0x80000, 0x1, 0x8, 0x1e, 0x1, 0x0, 0x1a449, 0x3, 0x6, 0x81, 0xcaa7, 0x4, 0x1e58, 0xb, 0x3, 0x3c, 0x8, 0x6, 0x0, 0x5]}) kernel console output (not intermixed with test programs): ext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6268.144760][ T31] audit: type=1400 audit(134224252.036:30883): avc: denied { module_request } for pid=3117 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6268.579752][ T3117] hsr_slave_0: entered promiscuous mode [ 6268.583233][ T3117] hsr_slave_1: entered promiscuous mode [ 6269.107569][ T3117] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 6269.126601][ T3117] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 6269.148187][ T3117] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 6269.160268][ T3117] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 6270.478154][ T3117] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6272.318617][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 6272.318971][ T31] audit: type=1400 audit(134224256.216:30921): avc: denied { sys_module } for pid=3117 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6272.322466][ T31] audit: type=1400 audit(134224256.216:30922): avc: denied { module_request } for pid=3117 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6272.500253][ T31] audit: type=1400 audit(134224256.396:30923): avc: denied { module_request } for pid=3117 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6272.633857][ T31] audit: type=1400 audit(134224256.516:30924): avc: denied { sys_module } for pid=3117 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6272.638576][ T31] audit: type=1400 audit(134224256.536:30925): avc: denied { module_request } for pid=3117 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6272.827725][ T31] audit: type=1400 audit(134224256.726:30926): avc: denied { module_request } for pid=3117 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6273.000408][ T31] audit: type=1400 audit(134224256.896:30927): avc: denied { sys_module } for pid=3117 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6273.003002][ T31] audit: type=1400 audit(134224256.896:30928): avc: denied { module_request } for pid=3117 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6273.133761][ T31] audit: type=1400 audit(134224257.026:30929): avc: denied { module_request } for pid=3117 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6273.280400][ T31] audit: type=1400 audit(134224257.176:30930): avc: denied { sys_module } for pid=3117 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6274.579315][ T3117] veth0_vlan: entered promiscuous mode [ 6274.612510][ T3117] veth1_vlan: entered promiscuous mode [ 6274.739953][ T3117] veth0_macvtap: entered promiscuous mode [ 6274.765136][ T3117] veth1_macvtap: entered promiscuous mode [ 6274.840559][ T3117] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6274.841039][ T3117] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6274.841424][ T3117] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6274.841599][ T3117] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6274.936164][T32759] usb 1-1: new high-speed USB device number 35 using dummy_hcd [ 6275.166297][T32759] usb 1-1: Using ep0 maxpacket: 16 [ 6275.189867][T32759] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 6275.191146][T32759] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 6275.192630][T32759] usb 1-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 6275.209535][T32759] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 6275.210878][T32759] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6275.211865][T32759] usb 1-1: Product: syz [ 6275.212581][T32759] usb 1-1: Manufacturer: syz [ 6275.213332][T32759] usb 1-1: SerialNumber: syz [ 6275.447340][T32759] usb 1-1: 2:1 : format type 0 is detected, processed as PCM [ 6275.456216][T32759] usb 1-1: 2:1 : invalid UAC_FORMAT_TYPE desc [ 6275.497854][T32759] usb 1-1: USB disconnect, device number 35 [ 6275.967088][T32759] usb 1-1: new high-speed USB device number 36 using dummy_hcd [ 6276.116189][T32759] usb 1-1: Using ep0 maxpacket: 32 [ 6276.146169][T32759] usb 1-1: unable to get BOS descriptor or descriptor too short [ 6276.158917][T32759] usb 1-1: config 7 has an invalid descriptor of length 0, skipping remainder of the config [ 6276.173911][T32759] usb 1-1: New USB device found, idVendor=18d1, idProduct=1eaf, bcdDevice=5a.bb [ 6276.175042][T32759] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6276.176785][T32759] usb 1-1: Product: syz [ 6276.177510][T32759] usb 1-1: Manufacturer: syz [ 6276.180064][T32759] usb 1-1: SerialNumber: syz [ 6276.418641][T32759] usb 1-1: Limiting number of CPorts to U8_MAX [ 6276.428254][T32759] usb 1-1: Not enough endpoints found in device, aborting! [ 6276.650751][ T764] usb 1-1: USB disconnect, device number 36 [ 6277.330871][ T31] kauditd_printk_skb: 78 callbacks suppressed [ 6277.334022][ T31] audit: type=1400 audit(134224261.226:31009): avc: denied { prog_load } for pid=3515 comm="syz.0.12041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6277.337306][ T31] audit: type=1400 audit(134224261.226:31010): avc: denied { bpf } for pid=3515 comm="syz.0.12041" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6277.341934][ T31] audit: type=1400 audit(134224261.226:31011): avc: denied { perfmon } for pid=3515 comm="syz.0.12041" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6277.363068][ T31] audit: type=1400 audit(134224261.256:31012): avc: denied { execmem } for pid=3515 comm="syz.0.12041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6278.218223][ T31] audit: type=1400 audit(134224262.116:31013): avc: denied { map_create } for pid=3518 comm="syz.3.12042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6278.402888][ T31] audit: type=1400 audit(134224262.296:31014): avc: denied { create } for pid=3520 comm="syz.3.12043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6278.409499][ T31] audit: type=1400 audit(134224262.306:31015): avc: denied { write } for pid=3520 comm="syz.3.12043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6278.413799][ T31] audit: type=1400 audit(134224262.306:31016): avc: denied { module_request } for pid=3520 comm="syz.3.12043" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6278.686853][ T31] audit: type=1400 audit(134224262.586:31017): avc: denied { read } for pid=3523 comm="syz.3.12044" name="pcmC0D0p" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6278.687145][ T31] audit: type=1400 audit(134224262.586:31018): avc: denied { open } for pid=3523 comm="syz.3.12044" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6283.238945][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 6283.239325][ T31] audit: type=1400 audit(134224267.136:31022): avc: denied { prog_load } for pid=3525 comm="syz.3.12045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6283.239627][ T31] audit: type=1400 audit(134224267.136:31023): avc: denied { bpf } for pid=3525 comm="syz.3.12045" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6283.239884][ T31] audit: type=1400 audit(134224267.136:31024): avc: denied { perfmon } for pid=3525 comm="syz.3.12045" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6283.268243][ T31] audit: type=1400 audit(134224267.166:31025): avc: denied { prog_run } for pid=3525 comm="syz.3.12045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6294.289607][T24477] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6294.369852][T24477] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6294.437943][T24477] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6294.510576][T24477] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6294.866825][T24477] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6294.874644][T24477] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6294.889909][T24477] bond0 (unregistering): Released all slaves [ 6294.976099][T24477] hsr_slave_0: left promiscuous mode [ 6294.978885][T24477] hsr_slave_1: left promiscuous mode [ 6294.992001][T24477] veth1_macvtap: left promiscuous mode [ 6294.992981][T24477] veth0_macvtap: left promiscuous mode [ 6294.994103][T24477] veth1_vlan: left promiscuous mode [ 6294.995500][T24477] veth0_vlan: left promiscuous mode [ 6295.943653][ T31] audit: type=1400 audit(134224279.836:31026): avc: denied { write } for pid=3547 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6295.944157][ T31] audit: type=1400 audit(134224279.836:31027): avc: denied { write open } for pid=3547 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6296.188458][ T31] audit: type=1400 audit(134224280.086:31028): avc: denied { write } for pid=3548 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6296.189853][ T31] audit: type=1400 audit(134224280.086:31029): avc: denied { write open } for pid=3548 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6296.209841][ T31] audit: type=1400 audit(134224280.106:31030): avc: denied { search } for pid=3548 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6296.210785][ T31] audit: type=1400 audit(134224280.106:31031): avc: denied { search } for pid=3548 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6296.211207][ T31] audit: type=1400 audit(134224280.106:31032): avc: denied { search } for pid=3548 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6296.211522][ T31] audit: type=1400 audit(134224280.106:31033): avc: denied { search } for pid=3548 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6296.273626][ T31] audit: type=1400 audit(134224280.166:31034): avc: denied { search } for pid=3549 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6296.274065][ T31] audit: type=1400 audit(134224280.166:31035): avc: denied { search } for pid=3549 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6301.035190][ T31] kauditd_printk_skb: 186 callbacks suppressed [ 6301.055791][ T31] audit: type=1400 audit(134224284.926:31222): avc: denied { search } for pid=3583 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6301.057910][ T31] audit: type=1400 audit(134224284.926:31223): avc: denied { search } for pid=3583 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6301.059847][ T31] audit: type=1400 audit(134224284.926:31224): avc: denied { search } for pid=3583 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6301.331248][ T31] audit: type=1400 audit(134224285.226:31225): avc: denied { write } for pid=3584 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6301.336237][ T31] audit: type=1400 audit(134224285.236:31226): avc: denied { open } for pid=3584 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6301.694130][ T31] audit: type=1400 audit(134224285.586:31227): avc: denied { write } for pid=3585 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6301.719450][ T31] audit: type=1400 audit(134224285.606:31228): avc: denied { open } for pid=3585 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6302.421946][ T31] audit: type=1400 audit(134224286.306:31229): avc: denied { write } for pid=3586 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6302.433282][ T31] audit: type=1400 audit(134224286.316:31230): avc: denied { open } for pid=3586 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6302.688959][ T31] audit: type=1400 audit(134224286.586:31231): avc: denied { prog_load } for pid=3573 comm="syz.3.12049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6308.781135][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 6308.784926][ T31] audit: type=1400 audit(134224292.676:31244): avc: denied { create } for pid=3593 comm="syz.3.12050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 6308.789114][ T31] audit: type=1400 audit(134224292.676:31245): avc: denied { module_request } for pid=3593 comm="syz.3.12050" kmod="net-pf-37" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6310.288092][ T31] audit: type=1400 audit(134224294.156:31246): avc: denied { map_create } for pid=3593 comm="syz.3.12050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6310.288576][ T31] audit: type=1400 audit(134224294.156:31247): avc: denied { prog_load } for pid=3593 comm="syz.3.12050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6310.288918][ T31] audit: type=1400 audit(134224294.156:31248): avc: denied { bpf } for pid=3593 comm="syz.3.12050" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6310.289165][ T31] audit: type=1400 audit(134224294.156:31249): avc: denied { perfmon } for pid=3593 comm="syz.3.12050" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6313.355977][ T31] audit: type=1400 audit(134224297.246:31250): avc: denied { write } for pid=3602 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6313.369529][ T31] audit: type=1400 audit(134224297.266:31251): avc: denied { write open } for pid=3602 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6313.409010][ T31] audit: type=1400 audit(134224297.306:31252): avc: denied { search } for pid=3602 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6313.413446][ T31] audit: type=1400 audit(134224297.306:31253): avc: denied { search } for pid=3602 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6313.800927][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 6313.801676][ T31] audit: type=1400 audit(134224297.696:31274): avc: denied { write } for pid=3602 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6313.817275][ T31] audit: type=1400 audit(134224297.696:31275): avc: denied { open } for pid=3602 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6313.828311][ T31] audit: type=1400 audit(134224297.706:31276): avc: denied { getattr } for pid=3602 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6313.828430][ T31] audit: type=1400 audit(134224297.706:31277): avc: denied { ioctl } for pid=3602 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6314.065739][ T31] audit: type=1400 audit(134224297.956:31278): avc: denied { search } for pid=3604 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6314.066012][ T31] audit: type=1400 audit(134224297.956:31279): avc: denied { read } for pid=3604 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6314.066251][ T31] audit: type=1400 audit(134224297.956:31280): avc: denied { open } for pid=3604 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6314.066396][ T31] audit: type=1400 audit(134224297.956:31281): avc: denied { search } for pid=3604 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6314.066520][ T31] audit: type=1400 audit(134224297.956:31282): avc: denied { search } for pid=3604 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6314.066567][ T31] audit: type=1400 audit(134224297.956:31283): avc: denied { search } for pid=3604 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6317.862632][ T3631] fuse: Bad value for 'fd' [ 6318.872487][ T31] kauditd_printk_skb: 162 callbacks suppressed [ 6318.873673][ T31] audit: type=1400 audit(134224302.766:31446): avc: denied { read write } for pid=3637 comm="syz.0.12056" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6318.878234][ T31] audit: type=1400 audit(134224302.766:31447): avc: denied { open } for pid=3637 comm="syz.0.12056" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6318.880418][ T31] audit: type=1400 audit(134224302.776:31448): avc: denied { ioctl } for pid=3637 comm="syz.0.12056" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6318.896250][ T31] audit: type=1400 audit(134224302.786:31449): avc: denied { ioctl } for pid=3637 comm="syz.0.12056" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6318.989277][ T31] audit: type=1400 audit(134224302.886:31450): avc: denied { ioctl } for pid=3637 comm="syz.0.12056" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6319.116602][ T1241] usb 1-1: new high-speed USB device number 37 using dummy_hcd [ 6319.267247][ T1241] usb 1-1: Using ep0 maxpacket: 8 [ 6319.300657][ T1241] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 6319.301090][ T1241] usb 1-1: New USB device found, idVendor=07c0, idProduct=1512, bcdDevice=30.22 [ 6319.301405][ T1241] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6319.315875][ T31] audit: type=1400 audit(134224303.206:31451): avc: denied { ioctl } for pid=3637 comm="syz.0.12056" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6319.326069][ T1241] usb 1-1: config 0 descriptor?? [ 6319.337305][ T31] audit: type=1400 audit(134224303.226:31452): avc: denied { ioctl } for pid=3637 comm="syz.0.12056" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6319.577378][ T31] audit: type=1400 audit(134224303.476:31453): avc: denied { read write } for pid=3637 comm="syz.0.12056" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6319.583300][ T31] audit: type=1400 audit(134224303.476:31454): avc: denied { open } for pid=3637 comm="syz.0.12056" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6319.599740][ T31] audit: type=1400 audit(134224303.486:31455): avc: denied { ioctl } for pid=3637 comm="syz.0.12056" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6319.637650][ T3638] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6319.641014][ T3638] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6319.712257][ T1241] iowarrior 1-1:0.0: IOWarrior product=0x1512, serial= interface=0 now attached to iowarrior0 [ 6320.142069][ T1241] usb 1-1: USB disconnect, device number 37 [ 6320.398199][ T3660] fuse: Bad value for 'fd' [ 6323.241651][ T3679] netlink: 12 bytes leftover after parsing attributes in process `syz.3.12065'. [ 6324.198443][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 6324.198873][ T31] audit: type=1400 audit(134224308.076:31499): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6324.199149][ T31] audit: type=1400 audit(134224308.076:31500): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6324.199422][ T31] audit: type=1400 audit(134224308.076:31501): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6324.555845][ T31] audit: type=1400 audit(134224308.446:31502): avc: denied { execmem } for pid=3680 comm="syz.0.12066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6325.139648][ T31] audit: type=1400 audit(134224309.036:31503): avc: denied { prog_load } for pid=3684 comm="syz.3.12068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6325.182608][ T31] audit: type=1400 audit(134224309.056:31504): avc: denied { bpf } for pid=3684 comm="syz.3.12068" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6325.187230][ T31] audit: type=1400 audit(134224309.086:31505): avc: denied { perfmon } for pid=3684 comm="syz.3.12068" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6325.192997][ T31] audit: type=1400 audit(134224309.086:31506): avc: denied { create } for pid=3684 comm="syz.3.12068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6325.207700][ T31] audit: type=1400 audit(134224309.106:31507): avc: denied { write } for pid=3684 comm="syz.3.12068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6325.456417][ T31] audit: type=1400 audit(134224309.326:31508): avc: denied { read write } for pid=3686 comm="syz.3.12069" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6325.486142][ T3687] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6325.487085][ T3687] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6329.427725][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 6329.428263][ T31] audit: type=1400 audit(134224313.326:31514): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6329.428485][ T31] audit: type=1400 audit(134224313.326:31515): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6329.430721][ T31] audit: type=1400 audit(134224313.326:31516): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6329.793761][ T31] audit: type=1400 audit(134224313.686:31517): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6329.794421][ T31] audit: type=1400 audit(134224313.686:31518): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6329.794570][ T31] audit: type=1400 audit(134224313.686:31519): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6330.169158][ T31] audit: type=1400 audit(134224314.066:31520): avc: denied { create } for pid=3694 comm="syz.0.12071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6330.203294][ T31] audit: type=1400 audit(134224314.096:31521): avc: denied { write } for pid=3694 comm="syz.0.12071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6330.316394][ T31] audit: type=1400 audit(134224314.206:31522): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6330.319293][ T31] audit: type=1400 audit(134224314.216:31523): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6332.996303][ T2085] usb 1-1: new high-speed USB device number 38 using dummy_hcd [ 6333.287614][ T2085] usb 1-1: Using ep0 maxpacket: 32 [ 6333.293142][ T2085] usb 1-1: config 0 has an invalid interface number: 88 but max is 0 [ 6333.293530][ T2085] usb 1-1: config 0 has no interface number 0 [ 6333.293832][ T2085] usb 1-1: config 0 interface 88 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 6333.323168][ T2085] usb 1-1: New USB device found, idVendor=0c45, idProduct=6270, bcdDevice=43.7c [ 6333.323586][ T2085] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6333.358470][ T2085] usb 1-1: Product: syz [ 6333.358797][ T2085] usb 1-1: Manufacturer: syz [ 6333.358995][ T2085] usb 1-1: SerialNumber: syz [ 6333.458544][ T2085] usb 1-1: config 0 descriptor?? [ 6333.459111][ T2085] usb 1-1: Interface #88 referenced by multiple IADs [ 6333.702513][ T2085] usb 1-1: USB disconnect, device number 38 [ 6334.698873][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 6334.699240][ T31] audit: type=1400 audit(134224318.596:31576): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6334.717206][ T31] audit: type=1400 audit(134224318.606:31577): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6334.720278][ T31] audit: type=1400 audit(134224318.606:31578): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6334.794768][ T31] audit: type=1400 audit(134224318.686:31579): avc: denied { read } for pid=3727 comm="syz.0.12079" name="fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6334.799805][ T31] audit: type=1400 audit(134224318.696:31580): avc: denied { open } for pid=3727 comm="syz.0.12079" path="/dev/fb0" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6334.806909][ T31] audit: type=1400 audit(134224318.696:31581): avc: denied { ioctl } for pid=3727 comm="syz.0.12079" path="/dev/fb0" dev="devtmpfs" ino=615 ioctlcmd=0x4601 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6334.854583][ T31] audit: type=1400 audit(134224318.746:31582): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6334.858379][ T31] audit: type=1400 audit(134224318.746:31583): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6334.863751][ T31] audit: type=1400 audit(134224318.746:31584): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6334.969596][ T31] audit: type=1400 audit(134224318.866:31585): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6335.995887][T25016] usb 1-1: new high-speed USB device number 39 using dummy_hcd [ 6336.182225][T25016] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 6336.182590][T25016] usb 1-1: config 27 interface 0 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 6336.182920][T25016] usb 1-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 6336.183006][T25016] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6336.283722][T25016] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 6336.284404][T25016] usb 1-1: invalid MIDI out EP 0 [ 6336.351223][T25016] snd-usb-audio 1-1:27.0: probe with driver snd-usb-audio failed with error -22 [ 6336.821677][T32546] usb 1-1: USB disconnect, device number 39 [ 6339.708907][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 6339.717299][ T31] audit: type=1400 audit(134224323.606:31623): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6339.717806][ T31] audit: type=1400 audit(134224323.606:31624): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6339.865051][ T31] audit: type=1400 audit(134224323.756:31625): avc: denied { prog_load } for pid=3770 comm="syz.0.12084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6339.869813][ T31] audit: type=1400 audit(134224323.766:31626): avc: denied { bpf } for pid=3770 comm="syz.0.12084" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6339.877805][ T31] audit: type=1400 audit(134224323.776:31627): avc: denied { perfmon } for pid=3770 comm="syz.0.12084" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6339.983957][ T31] audit: type=1400 audit(134224323.876:31628): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6339.988776][ T31] audit: type=1400 audit(134224323.876:31629): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6339.994052][ T31] audit: type=1400 audit(134224323.876:31630): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6340.120045][ T31] audit: type=1400 audit(134224324.016:31631): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6340.120526][ T31] audit: type=1400 audit(134224324.016:31632): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6342.896187][ T3808] syz.0.12101 (3808): drop_caches: 2 [ 6345.015498][ T31] kauditd_printk_skb: 122 callbacks suppressed [ 6345.015813][ T31] audit: type=1400 audit(134224328.906:31755): avc: denied { create } for pid=3824 comm="syz.3.12105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6345.061990][ T31] audit: type=1400 audit(134224328.956:31756): avc: denied { write } for pid=3824 comm="syz.3.12105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6345.299818][ T31] audit: type=1400 audit(134224329.196:31757): avc: denied { read write } for pid=3826 comm="syz.3.12106" name="rdma_cm" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6345.300353][ T31] audit: type=1400 audit(134224329.196:31758): avc: denied { open } for pid=3826 comm="syz.3.12106" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6345.889867][ T31] audit: type=1400 audit(134224329.786:31759): avc: denied { read append } for pid=3828 comm="syz.3.12107" name="rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6345.890354][ T31] audit: type=1400 audit(134224329.786:31760): avc: denied { open } for pid=3828 comm="syz.3.12107" path="/dev/rtc0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6345.916837][ T31] audit: type=1400 audit(134224329.816:31761): avc: denied { create } for pid=3828 comm="syz.3.12107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6345.924300][ T31] audit: type=1400 audit(134224329.816:31762): avc: denied { ioctl } for pid=3828 comm="syz.3.12107" path="/dev/rtc0" dev="devtmpfs" ino=697 ioctlcmd=0x7014 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6346.217978][ T31] audit: type=1400 audit(134224330.116:31763): avc: denied { write } for pid=3830 comm="syz.3.12108" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6346.231834][ T31] audit: type=1400 audit(134224330.126:31764): avc: denied { open } for pid=3830 comm="syz.3.12108" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6351.514031][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 6351.514791][ T31] audit: type=1400 audit(134224335.326:31783): avc: denied { map_create } for pid=3962 comm="syz.3.12110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6351.516920][ T31] audit: type=1400 audit(134224335.336:31784): avc: denied { perfmon } for pid=3962 comm="syz.3.12110" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6351.518320][ T31] audit: type=1400 audit(134224335.346:31785): avc: denied { map_read map_write } for pid=3962 comm="syz.3.12110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6351.522178][ T31] audit: type=1400 audit(134224335.406:31786): avc: denied { module_request } for pid=3962 comm="syz.3.12110" kmod="fs-autofs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6352.042294][ T31] audit: type=1400 audit(134224335.906:31787): avc: denied { prog_load } for pid=3962 comm="syz.3.12110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6352.047067][ T31] audit: type=1400 audit(134224335.916:31788): avc: denied { bpf } for pid=3962 comm="syz.3.12110" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6352.052637][ T31] audit: type=1400 audit(134224335.916:31789): avc: denied { perfmon } for pid=3962 comm="syz.3.12110" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6356.890334][ T31] audit: type=1400 audit(134224340.786:31790): avc: denied { read write } for pid=3969 comm="syz.3.12111" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6356.892796][ T31] audit: type=1400 audit(134224340.786:31791): avc: denied { open } for pid=3969 comm="syz.3.12111" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6356.894905][ T3970] fuse: Bad value for 'group_id' [ 6356.896031][ T3970] fuse: Bad value for 'group_id' [ 6356.898962][ T31] audit: type=1400 audit(134224340.786:31792): avc: denied { mounton } for pid=3969 comm="syz.3.12111" path="/28/file0" dev="tmpfs" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6357.103127][ T3974] netlink: 4 bytes leftover after parsing attributes in process `syz.3.12113'. [ 6357.199175][ T31] audit: type=1400 audit(134224341.096:31793): avc: denied { name_bind } for pid=3975 comm="syz.3.12114" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 6357.206251][ T31] audit: type=1400 audit(134224341.096:31794): avc: denied { node_bind } for pid=3975 comm="syz.3.12114" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 6357.423634][ T31] audit: type=1400 audit(134224341.316:31795): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6357.429203][ T31] audit: type=1400 audit(134224341.326:31796): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6357.433035][ T31] audit: type=1400 audit(134224341.326:31797): avc: denied { read write } for pid=3979 comm="syz.3.12116" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6357.434888][ T31] audit: type=1400 audit(134224341.326:31798): avc: denied { open } for pid=3979 comm="syz.3.12116" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6357.440599][ T31] audit: type=1400 audit(134224341.336:31799): avc: denied { mounton } for pid=3979 comm="syz.3.12116" path="/33/file0" dev="tmpfs" ino=186 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6357.443257][ T3980] fuse: Bad value for 'group_id' [ 6357.443625][ T3980] fuse: Bad value for 'group_id' [ 6357.921110][ T3992] fuse: Bad value for 'group_id' [ 6357.922065][ T3992] fuse: Bad value for 'group_id' [ 6362.072062][ T31] kauditd_printk_skb: 101 callbacks suppressed [ 6362.072875][ T31] audit: type=1400 audit(134224345.966:31901): avc: denied { write } for pid=4099 comm="syz.3.12171" name="dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6362.073094][ T31] audit: type=1400 audit(134224345.966:31902): avc: denied { open } for pid=4099 comm="syz.3.12171" path="/dev/dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6362.258337][ T31] audit: type=1400 audit(134224346.156:31903): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6362.258834][ T31] audit: type=1400 audit(134224346.156:31904): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6362.259414][ T31] audit: type=1400 audit(134224346.156:31905): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6362.389318][ T31] audit: type=1400 audit(134224346.276:31906): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6362.391419][ T31] audit: type=1400 audit(134224346.286:31907): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6362.393533][ T31] audit: type=1400 audit(134224346.286:31908): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6362.467163][ T31] audit: type=1400 audit(134224346.366:31909): avc: denied { allowed } for pid=4104 comm="syz.0.12173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6362.474414][ T31] audit: type=1400 audit(134224346.366:31910): avc: denied { create } for pid=4104 comm="syz.0.12173" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6364.188050][ T4135] syz.3.12188 (4135): /proc/4134/oom_adj is deprecated, please use /proc/4134/oom_score_adj instead. [ 6364.449888][ T4140] fuse: Unknown parameter 'grou00000000000000000000' [ 6365.563923][ T4163] fuse: Unknown parameter 'group_i00000000000000000000' [ 6368.464228][ T31] kauditd_printk_skb: 86 callbacks suppressed [ 6368.464646][ T31] audit: type=1400 audit(134224352.356:31997): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6368.472055][ T31] audit: type=1400 audit(134224352.366:31998): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6368.488600][ T31] audit: type=1400 audit(134224352.366:31999): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6368.621208][ T31] audit: type=1400 audit(134224352.516:32000): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6368.621785][ T31] audit: type=1400 audit(134224352.516:32001): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6368.622252][ T31] audit: type=1400 audit(134224352.516:32002): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6368.789513][ T31] audit: type=1400 audit(134224352.686:32003): avc: denied { read write } for pid=4179 comm="syz.0.12209" name="adsp1" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6368.790000][ T31] audit: type=1400 audit(134224352.686:32004): avc: denied { open } for pid=4179 comm="syz.0.12209" path="/dev/adsp1" dev="devtmpfs" ino=735 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6368.802536][ T31] audit: type=1400 audit(134224352.696:32005): avc: denied { ioctl } for pid=4179 comm="syz.0.12209" path="/dev/adsp1" dev="devtmpfs" ino=735 ioctlcmd=0x5012 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6368.936082][ T31] audit: type=1400 audit(134224352.826:32006): avc: denied { create } for pid=4181 comm="syz.3.12210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 6370.159692][ T4182] netlink: 4 bytes leftover after parsing attributes in process `syz.3.12210'. [ 6372.941737][ T764] usb 1-1: new high-speed USB device number 40 using dummy_hcd [ 6373.189779][ T764] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 6373.201309][ T764] usb 1-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 6373.206321][ T764] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6373.218906][ T764] usb 1-1: config 0 descriptor?? [ 6373.475844][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 6373.476913][ T31] audit: type=1400 audit(134224357.366:32055): avc: denied { unmount } for pid=3117 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6373.759356][ T31] audit: type=1400 audit(134224357.656:32056): avc: denied { prog_load } for pid=4212 comm="syz.3.12216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6373.761564][ T31] audit: type=1400 audit(134224357.656:32057): avc: denied { bpf } for pid=4212 comm="syz.3.12216" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6373.772229][ T31] audit: type=1400 audit(134224357.666:32058): avc: denied { allowed } for pid=4212 comm="syz.3.12216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6373.807421][ T31] audit: type=1400 audit(134224357.706:32059): avc: denied { create } for pid=4212 comm="syz.3.12216" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6373.818255][ T31] audit: type=1400 audit(134224357.716:32060): avc: denied { map } for pid=4212 comm="syz.3.12216" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=96933 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6373.818385][ T31] audit: type=1400 audit(134224357.716:32061): avc: denied { read write } for pid=4212 comm="syz.3.12216" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=96933 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6373.850054][ T31] audit: type=1400 audit(134224357.746:32062): avc: denied { execute } for pid=4212 comm="syz.3.12216" path="/106/cpu.stat" dev="tmpfs" ino=570 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6374.217720][ T31] audit: type=1400 audit(134224358.116:32063): avc: denied { create } for pid=4214 comm="syz.3.12217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6374.258494][ T31] audit: type=1400 audit(134224358.156:32064): avc: denied { ioctl } for pid=4214 comm="syz.3.12217" path="socket:[96942]" dev="sockfs" ino=96942 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6380.419487][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 6380.419826][ T31] audit: type=1400 audit(134224364.316:32085): avc: denied { map_create } for pid=4229 comm="syz.3.12221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6380.431318][ T31] audit: type=1400 audit(134224364.326:32086): avc: denied { map_read map_write } for pid=4229 comm="syz.3.12221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6380.450089][ T31] audit: type=1400 audit(134224364.346:32087): avc: denied { create } for pid=4229 comm="syz.3.12221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6380.469226][ T31] audit: type=1400 audit(134224364.366:32089): avc: denied { write } for pid=4229 comm="syz.3.12221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6380.469712][ T31] audit: type=1400 audit(134224364.356:32088): avc: denied { ioctl } for pid=4203 comm="syz.0.12215" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6380.492673][ T31] audit: type=1400 audit(134224364.386:32090): avc: denied { read write } for pid=4229 comm="syz.3.12221" name="uhid" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6380.507562][ T31] audit: type=1400 audit(134224364.406:32091): avc: denied { open } for pid=4229 comm="syz.3.12221" path="/dev/uhid" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6380.528756][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x4 [ 6380.529234][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.529385][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x2 [ 6380.529542][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.529697][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.529849][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.530029][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.530228][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.530360][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.530485][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.530609][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.530734][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.530858][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.530983][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.531107][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.531238][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.531384][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.531587][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.531722][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.531851][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.554513][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.555030][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.557563][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.557958][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.558284][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.558583][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.558886][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.559030][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.559168][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.559290][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.559419][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.559541][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.559663][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.559785][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.559912][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.560035][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.560165][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.560288][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.560410][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.560529][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.560648][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: unknown main item tag 0x0 [ 6380.564130][ T2085] hid-generic 0000:007F:FFFFFFFE.000D: hidraw0: HID v0.00 Device [syz1] on syz0 [ 6380.607662][ T31] audit: type=1400 audit(134224364.506:32092): avc: denied { create } for pid=4229 comm="syz.3.12221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6380.622421][ T31] audit: type=1400 audit(134224364.516:32093): avc: denied { write } for pid=4229 comm="syz.3.12221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6380.624051][ T4233] netlink: 12 bytes leftover after parsing attributes in process `syz.3.12221'. [ 6383.473011][T30629] usb 1-1: USB disconnect, device number 40 [ 6383.519771][ T31] audit: type=1400 audit(134224367.416:32094): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6385.665631][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 6385.666030][ T31] audit: type=1400 audit(134224369.556:32100): avc: denied { prog_load } for pid=4247 comm="syz.0.12222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6385.666321][ T31] audit: type=1400 audit(134224369.556:32101): avc: denied { bpf } for pid=4247 comm="syz.0.12222" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6385.666424][ T31] audit: type=1400 audit(134224369.556:32102): avc: denied { map_create } for pid=4247 comm="syz.0.12222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6385.674060][ T31] audit: type=1400 audit(134224369.566:32103): avc: denied { prog_load } for pid=4247 comm="syz.0.12222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6385.679898][ T31] audit: type=1400 audit(134224369.576:32104): avc: denied { bpf } for pid=4247 comm="syz.0.12222" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6385.680167][ T31] audit: type=1400 audit(134224369.576:32105): avc: denied { perfmon } for pid=4247 comm="syz.0.12222" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6387.534437][ T31] audit: type=1400 audit(134224371.426:32106): avc: denied { prog_load } for pid=4251 comm="syz.3.12223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6387.534957][ T31] audit: type=1400 audit(134224371.426:32107): avc: denied { bpf } for pid=4251 comm="syz.3.12223" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6387.542877][ T31] audit: type=1400 audit(134224371.436:32108): avc: denied { perfmon } for pid=4251 comm="syz.3.12223" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6387.543390][ T31] audit: type=1400 audit(134224371.436:32109): avc: denied { bpf } for pid=4251 comm="syz.3.12223" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6390.848730][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 6390.849178][ T31] audit: type=1400 audit(134224374.746:32159): avc: denied { read write } for pid=4274 comm="syz.3.12232" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6390.849512][ T31] audit: type=1400 audit(134224374.746:32160): avc: denied { open } for pid=4274 comm="syz.3.12232" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6390.856953][ T31] audit: type=1400 audit(134224374.756:32161): avc: denied { mounton } for pid=4274 comm="syz.3.12232" path="/121/file0" dev="tmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 6390.856998][ T4275] fuse: blksize only supported for fuseblk [ 6390.952918][ T31] audit: type=1400 audit(134224374.846:32162): avc: denied { prog_load } for pid=4276 comm="syz.3.12233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6390.954902][ T31] audit: type=1400 audit(134224374.846:32163): avc: denied { bpf } for pid=4276 comm="syz.3.12233" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6390.956099][ T31] audit: type=1400 audit(134224374.846:32164): avc: denied { perfmon } for pid=4276 comm="syz.3.12233" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6390.959941][ T31] audit: type=1400 audit(134224374.856:32165): avc: denied { bpf } for pid=4276 comm="syz.3.12233" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6390.960526][ T31] audit: type=1400 audit(134224374.856:32166): avc: denied { prog_run } for pid=4276 comm="syz.3.12233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6391.142573][ T31] audit: type=1400 audit(134224375.036:32167): avc: denied { read write } for pid=4278 comm="syz.3.12234" name="uhid" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6391.142847][ T31] audit: type=1400 audit(134224375.036:32168): avc: denied { open } for pid=4278 comm="syz.3.12234" path="/dev/uhid" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6391.328366][ T4281] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6391.337052][ T4281] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6400.591688][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 6400.592102][ T31] audit: type=1400 audit(134224384.486:32179): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6400.592354][ T31] audit: type=1400 audit(134224384.486:32180): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6400.592441][ T31] audit: type=1400 audit(134224384.486:32181): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6400.907559][ T31] audit: type=1400 audit(134224384.806:32182): avc: denied { prog_load } for pid=4291 comm="syz.0.12238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6400.910134][ T31] audit: type=1400 audit(134224384.806:32183): avc: denied { bpf } for pid=4291 comm="syz.0.12238" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6400.910423][ T31] audit: type=1400 audit(134224384.806:32184): avc: denied { perfmon } for pid=4291 comm="syz.0.12238" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6400.932050][ T31] audit: type=1400 audit(134224384.826:32185): avc: denied { execmem } for pid=4291 comm="syz.0.12238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6403.588825][ T31] audit: type=1400 audit(134224387.486:32186): avc: denied { prog_load } for pid=4291 comm="syz.0.12238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6403.597192][ T31] audit: type=1400 audit(134224387.486:32187): avc: denied { bpf } for pid=4291 comm="syz.0.12238" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6403.614242][ T31] audit: type=1400 audit(134224387.506:32188): avc: denied { perfmon } for pid=4291 comm="syz.0.12238" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6406.427902][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 6406.428423][ T31] audit: type=1400 audit(134224390.326:32195): avc: denied { read } for pid=4296 comm="syz.3.12239" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6406.428767][ T31] audit: type=1400 audit(134224390.326:32196): avc: denied { open } for pid=4296 comm="syz.3.12239" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6406.440602][ T31] audit: type=1400 audit(134224390.336:32197): avc: denied { ioctl } for pid=4296 comm="syz.3.12239" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64ad scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6406.556233][ T31] audit: type=1400 audit(134224390.446:32198): avc: denied { create } for pid=4298 comm="syz.3.12240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6406.563504][ T31] audit: type=1400 audit(134224390.456:32199): avc: denied { write } for pid=4298 comm="syz.3.12240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6406.704472][ T31] audit: type=1400 audit(134224390.596:32200): avc: denied { read } for pid=4300 comm="syz.3.12241" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6406.707050][ T31] audit: type=1400 audit(134224390.596:32201): avc: denied { open } for pid=4300 comm="syz.3.12241" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6406.717032][ T31] audit: type=1400 audit(134224390.616:32202): avc: denied { ioctl } for pid=4300 comm="syz.3.12241" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6406.864859][ T31] audit: type=1400 audit(134224390.756:32203): avc: denied { read write } for pid=4302 comm="syz.3.12242" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6406.865300][ T31] audit: type=1400 audit(134224390.756:32204): avc: denied { open } for pid=4302 comm="syz.3.12242" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6406.876770][ T4303] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6406.877706][ T4303] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6422.462785][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 6422.463272][ T31] audit: type=1400 audit(134224406.356:32262): avc: denied { create } for pid=4344 comm="syz.3.12253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6422.486939][ T31] audit: type=1400 audit(134224406.386:32263): avc: denied { execmem } for pid=4344 comm="syz.3.12253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6423.398430][ T31] audit: type=1400 audit(134224407.296:32264): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6423.400699][ T31] audit: type=1400 audit(134224407.296:32265): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6423.404663][ T31] audit: type=1400 audit(134224407.296:32266): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6423.488666][ T31] audit: type=1400 audit(134224407.386:32267): avc: denied { create } for pid=4346 comm="syz.0.12254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6423.497707][ T31] audit: type=1400 audit(134224407.386:32268): avc: denied { write } for pid=4346 comm="syz.0.12254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6423.502329][ T31] audit: type=1400 audit(134224407.396:32269): avc: denied { module_request } for pid=4346 comm="syz.0.12254" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6423.664680][ T31] audit: type=1400 audit(134224407.556:32270): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6423.670313][ T31] audit: type=1400 audit(134224407.566:32271): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6427.510412][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 6427.510862][ T31] audit: type=1400 audit(134224411.406:32303): avc: denied { prog_load } for pid=4371 comm="syz.0.12259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6427.514248][ T31] audit: type=1400 audit(134224411.406:32304): avc: denied { bpf } for pid=4371 comm="syz.0.12259" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6427.514525][ T31] audit: type=1400 audit(134224411.406:32305): avc: denied { perfmon } for pid=4371 comm="syz.0.12259" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6429.760416][ T31] audit: type=1400 audit(134224413.656:32306): avc: denied { prog_load } for pid=4371 comm="syz.0.12259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6429.760705][ T31] audit: type=1400 audit(134224413.656:32307): avc: denied { bpf } for pid=4371 comm="syz.0.12259" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6429.760884][ T31] audit: type=1400 audit(134224413.656:32308): avc: denied { perfmon } for pid=4371 comm="syz.0.12259" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6429.761037][ T31] audit: type=1400 audit(134224413.656:32309): avc: denied { prog_run } for pid=4371 comm="syz.0.12259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6433.757723][ T31] audit: type=1400 audit(134224417.636:32310): avc: denied { read write } for pid=4375 comm="syz.3.12260" name="virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6433.772401][ T31] audit: type=1400 audit(134224417.656:32311): avc: denied { open } for pid=4375 comm="syz.3.12260" path="/dev/virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6434.475792][ T31] audit: type=1400 audit(134224418.356:32312): avc: denied { create } for pid=4386 comm="syz.3.12262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6434.483900][ T31] audit: type=1400 audit(134224418.376:32313): avc: denied { write } for pid=4386 comm="syz.3.12262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6434.504654][ T31] audit: type=1400 audit(134224418.396:32314): avc: denied { module_request } for pid=4386 comm="syz.3.12262" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6435.006127][ T31] audit: type=1400 audit(134224418.896:32315): avc: denied { read write } for pid=4389 comm="syz.3.12263" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6435.019162][ T31] audit: type=1400 audit(134224418.916:32316): avc: denied { read write open } for pid=4389 comm="syz.3.12263" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6435.022579][ T31] audit: type=1400 audit(134224418.916:32317): avc: denied { ioctl } for pid=4389 comm="syz.3.12263" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6435.036872][ T4390] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6435.040674][ T4390] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6435.052393][ T31] audit: type=1400 audit(134224418.946:32318): avc: denied { read write } for pid=4389 comm="syz.3.12263" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6435.052932][ T31] audit: type=1400 audit(134224418.946:32319): avc: denied { open } for pid=4389 comm="syz.3.12263" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6441.267721][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 6441.268196][ T31] audit: type=1400 audit(134224425.166:32336): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6441.268541][ T31] audit: type=1400 audit(134224425.166:32337): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6441.276916][ T31] audit: type=1400 audit(134224425.176:32338): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6441.442984][ T31] audit: type=1401 audit(134224425.336:32339): op=fscreate invalid_context=2321202E2F6367726F75702F66696C653061616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161616161 [ 6441.488974][ T31] audit: type=1400 audit(134224425.386:32340): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6441.490514][ T31] audit: type=1400 audit(134224425.386:32341): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6441.502763][ T31] audit: type=1400 audit(134224425.386:32342): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6441.668329][ T31] audit: type=1400 audit(134224425.566:32343): avc: denied { allowed } for pid=4413 comm="syz.0.12269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6441.698139][ T31] audit: type=1400 audit(134224425.596:32344): avc: denied { create } for pid=4413 comm="syz.0.12269" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6441.703020][ T31] audit: type=1400 audit(134224425.596:32345): avc: denied { read } for pid=4413 comm="syz.0.12269" dev="nsfs" ino=4026532821 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6444.259201][T25016] usb 1-1: new high-speed USB device number 41 using dummy_hcd [ 6444.446647][T25016] usb 1-1: Using ep0 maxpacket: 8 [ 6444.483098][T25016] usb 1-1: New USB device found, idVendor=0ccd, idProduct=0039, bcdDevice=90.7b [ 6444.487858][T25016] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6448.260629][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 6448.289265][ T31] audit: type=1400 audit(134224432.156:32390): avc: denied { read append } for pid=4431 comm="syz.0.12274" name="i2c-1" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6448.289808][ T31] audit: type=1400 audit(134224432.166:32391): avc: denied { open } for pid=4431 comm="syz.0.12274" path="/dev/i2c-1" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6448.289967][ T31] audit: type=1400 audit(134224432.176:32392): avc: denied { ioctl } for pid=4431 comm="syz.0.12274" path="/dev/i2c-1" dev="devtmpfs" ino=698 ioctlcmd=0x707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6453.713267][ T31] audit: type=1400 audit(134224437.606:32393): avc: denied { read write } for pid=4440 comm="syz.3.12275" name="virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6453.713869][ T31] audit: type=1400 audit(134224437.606:32394): avc: denied { open } for pid=4440 comm="syz.3.12275" path="/dev/virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6453.889597][ T31] audit: type=1400 audit(134224437.786:32395): avc: denied { create } for pid=4449 comm="syz.3.12276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6453.896307][ T31] audit: type=1400 audit(134224437.786:32396): avc: denied { create } for pid=4449 comm="syz.3.12276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6453.908581][ T31] audit: type=1400 audit(134224437.806:32397): avc: denied { create } for pid=4449 comm="syz.3.12276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6453.938180][ T31] audit: type=1400 audit(134224437.836:32398): avc: denied { execmem } for pid=4449 comm="syz.3.12276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6456.238435][ T31] audit: type=1400 audit(134224440.136:32399): avc: denied { prog_load } for pid=4449 comm="syz.3.12276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6456.238749][ T31] audit: type=1400 audit(134224440.136:32400): avc: denied { bpf } for pid=4449 comm="syz.3.12276" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6456.253371][ T31] audit: type=1400 audit(134224440.146:32401): avc: denied { mount } for pid=4449 comm="syz.3.12276" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 6456.269212][ T31] audit: type=1400 audit(134224440.166:32402): avc: denied { read } for pid=4449 comm="syz.3.12276" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 6458.951755][ T1241] usb 1-1: USB disconnect, device number 41 [ 6459.019466][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 6459.019915][ T31] audit: type=1400 audit(134224442.916:32408): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6459.020243][ T31] audit: type=1400 audit(134224442.916:32409): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6459.027887][ T31] audit: type=1400 audit(134224442.916:32410): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6459.257646][ T31] audit: type=1400 audit(134224443.156:32411): avc: denied { create } for pid=4459 comm="syz.0.12277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6459.283094][ T31] audit: type=1400 audit(134224443.166:32412): avc: denied { setopt } for pid=4459 comm="syz.0.12277" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6459.292893][ T31] audit: type=1400 audit(134224443.186:32413): avc: denied { create } for pid=4459 comm="syz.0.12277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6459.316419][ T31] audit: type=1400 audit(134224443.216:32414): avc: denied { connect } for pid=4459 comm="syz.0.12277" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6459.320633][ T31] audit: type=1400 audit(134224443.216:32415): avc: denied { bpf } for pid=4459 comm="syz.0.12277" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6459.329250][ T31] audit: type=1400 audit(134224443.226:32416): avc: denied { write } for pid=4459 comm="syz.0.12277" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6459.453434][ T31] audit: type=1400 audit(134224443.326:32417): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6460.366626][T32546] usb 1-1: new full-speed USB device number 42 using dummy_hcd [ 6460.547588][T32546] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 6460.548960][T32546] usb 1-1: New USB device found, idVendor=04d9, idProduct=a067, bcdDevice= 0.00 [ 6460.550164][T32546] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 6460.577602][T32546] usb 1-1: config 0 descriptor?? [ 6461.125062][T32546] holtek_mouse 0003:04D9:A067.000E: hidraw0: USB HID v0.01 Device [HID 04d9:a067] on usb-dummy_hcd.0-1/input0 [ 6461.376354][ T4262] usb 1-1: USB disconnect, device number 42 [ 6465.948014][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 6465.950241][ T31] audit: type=1400 audit(134224449.846:32443): avc: denied { prog_load } for pid=4494 comm="syz.0.12281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6465.954159][ T31] audit: type=1400 audit(134224449.846:32444): avc: denied { bpf } for pid=4494 comm="syz.0.12281" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6465.959714][ T31] audit: type=1400 audit(134224449.856:32445): avc: denied { perfmon } for pid=4494 comm="syz.0.12281" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6465.975995][ T31] audit: type=1400 audit(134224449.866:32446): avc: denied { perfmon } for pid=4494 comm="syz.0.12281" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6465.981637][ T31] audit: type=1400 audit(134224449.876:32447): avc: denied { perfmon } for pid=4494 comm="syz.0.12281" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6465.989825][ T31] audit: type=1400 audit(134224449.886:32448): avc: denied { bpf } for pid=4494 comm="syz.0.12281" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6466.000280][ T31] audit: type=1400 audit(134224449.896:32449): avc: denied { bpf } for pid=4494 comm="syz.0.12281" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6466.004137][ T31] audit: type=1400 audit(134224449.896:32450): avc: denied { perfmon } for pid=4494 comm="syz.0.12281" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6466.011019][ T31] audit: type=1400 audit(134224449.906:32451): avc: denied { bpf } for pid=4494 comm="syz.0.12281" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6466.016724][ T31] audit: type=1400 audit(134224449.906:32452): avc: denied { perfmon } for pid=4494 comm="syz.0.12281" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6474.829419][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 6474.832927][ T31] audit: type=1400 audit(134224458.726:32468): avc: denied { prog_load } for pid=4503 comm="syz.3.12284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6474.835682][ T31] audit: type=1400 audit(134224458.726:32469): avc: denied { bpf } for pid=4503 comm="syz.3.12284" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6474.866041][ T31] audit: type=1400 audit(134224458.756:32470): avc: denied { create } for pid=4503 comm="syz.3.12284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6474.881708][ T31] audit: type=1400 audit(134224458.776:32471): avc: denied { prog_load } for pid=4503 comm="syz.3.12284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6474.886166][ T31] audit: type=1400 audit(134224458.776:32472): avc: denied { bpf } for pid=4503 comm="syz.3.12284" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6474.890860][ T31] audit: type=1400 audit(134224458.776:32473): avc: denied { perfmon } for pid=4503 comm="syz.3.12284" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6474.908496][ T31] audit: type=1400 audit(134224458.806:32474): avc: denied { bpf } for pid=4503 comm="syz.3.12284" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6474.911150][ T31] audit: type=1400 audit(134224458.806:32475): avc: denied { prog_run } for pid=4503 comm="syz.3.12284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6474.940540][ T31] audit: type=1400 audit(134224458.836:32476): avc: denied { ioctl } for pid=4503 comm="syz.3.12284" path="socket:[98320]" dev="sockfs" ino=98320 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 6474.944600][ T31] audit: type=1400 audit(134224458.836:32477): avc: denied { write } for pid=4503 comm="syz.3.12284" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 6479.906382][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 6479.906834][ T31] audit: type=1400 audit(134224463.756:32488): avc: denied { prog_load } for pid=4517 comm="syz.0.12286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6479.907281][ T31] audit: type=1400 audit(134224463.766:32489): avc: denied { bpf } for pid=4517 comm="syz.0.12286" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6479.908893][ T31] audit: type=1400 audit(134224463.766:32490): avc: denied { perfmon } for pid=4517 comm="syz.0.12286" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6479.909203][ T31] audit: type=1400 audit(134224463.766:32491): avc: denied { prog_run } for pid=4517 comm="syz.0.12286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6479.909294][ T31] audit: type=1400 audit(134224463.786:32492): avc: denied { execmem } for pid=4517 comm="syz.0.12286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6483.312337][ T31] audit: type=1400 audit(134224467.206:32493): avc: denied { prog_load } for pid=4517 comm="syz.0.12286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6483.312828][ T31] audit: type=1400 audit(134224467.206:32494): avc: denied { bpf } for pid=4517 comm="syz.0.12286" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6483.318796][ T31] audit: type=1400 audit(134224467.216:32495): avc: denied { perfmon } for pid=4517 comm="syz.0.12286" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6483.330128][ T31] audit: type=1400 audit(134224467.226:32496): avc: denied { prog_run } for pid=4517 comm="syz.0.12286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6483.341844][ T31] audit: type=1400 audit(134224467.236:32497): avc: denied { read } for pid=4517 comm="syz.0.12286" name="card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6487.833812][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 6487.834307][ T31] audit: type=1400 audit(134224471.726:32499): avc: denied { allowed } for pid=4522 comm="syz.3.12287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6487.838783][ T31] audit: type=1400 audit(134224471.736:32500): avc: denied { create } for pid=4522 comm="syz.3.12287" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6487.849855][ T31] audit: type=1400 audit(134224471.746:32501): avc: denied { allowed } for pid=4522 comm="syz.3.12287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6487.857624][ T31] audit: type=1400 audit(134224471.756:32502): avc: denied { create } for pid=4522 comm="syz.3.12287" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6487.872346][ T31] audit: type=1400 audit(134224471.766:32503): avc: denied { execute } for pid=4522 comm="syz.3.12287" path="/153/cpu.stat" dev="tmpfs" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 6488.131981][ T31] audit: type=1400 audit(134224472.026:32504): avc: denied { create } for pid=4524 comm="syz.3.12288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6488.148375][ T31] audit: type=1400 audit(134224472.046:32505): avc: denied { create } for pid=4524 comm="syz.3.12288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6488.154556][ T31] audit: type=1400 audit(134224472.046:32506): avc: denied { write } for pid=4524 comm="syz.3.12288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6488.159436][ T31] audit: type=1400 audit(134224472.056:32507): avc: denied { module_request } for pid=4524 comm="syz.3.12288" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6488.373517][ T31] audit: type=1400 audit(134224472.266:32508): avc: denied { read } for pid=4524 comm="syz.3.12288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6490.311137][ T4546] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6490.312938][ T4546] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6490.800125][ T4559] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6490.801089][ T4559] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6493.855613][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 6493.875604][ T31] audit: type=1400 audit(134224477.746:32539): avc: denied { execmem } for pid=4567 comm="syz.3.12299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6497.914740][ T31] audit: type=1400 audit(134224481.806:32540): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6497.919708][ T31] audit: type=1400 audit(134224481.816:32541): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6497.929503][ T31] audit: type=1400 audit(134224481.826:32542): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6498.022715][ T31] audit: type=1400 audit(134224481.916:32543): avc: denied { read write } for pid=4570 comm="syz.0.12300" name="virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6498.031465][ T31] audit: type=1400 audit(134224481.926:32544): avc: denied { open } for pid=4570 comm="syz.0.12300" path="/dev/virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6498.102557][ T31] audit: type=1400 audit(134224481.996:32545): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6498.117702][ T31] audit: type=1400 audit(134224482.006:32546): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6498.118170][ T31] audit: type=1400 audit(134224482.006:32547): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6498.194850][ T31] audit: type=1400 audit(134224482.086:32548): avc: denied { create } for pid=4576 comm="syz.0.12301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6499.691510][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 6499.694731][ T31] audit: type=1400 audit(134224483.586:32555): avc: denied { setopt } for pid=4582 comm="syz.0.12302" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6499.842120][ T31] audit: type=1400 audit(134224483.736:32556): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6499.849356][ T31] audit: type=1400 audit(134224483.736:32557): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6499.855097][ T31] audit: type=1400 audit(134224483.736:32558): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6499.978489][ T31] audit: type=1400 audit(134224483.876:32559): avc: denied { read write } for pid=4585 comm="syz.0.12303" name="vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6499.982814][ T31] audit: type=1400 audit(134224483.876:32560): avc: denied { open } for pid=4585 comm="syz.0.12303" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6499.991030][ T31] audit: type=1400 audit(134224483.876:32561): avc: denied { ioctl } for pid=4585 comm="syz.0.12303" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6500.241988][ T31] audit: type=1400 audit(134224484.136:32562): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6500.247420][ T31] audit: type=1400 audit(134224484.136:32563): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6500.247815][ T31] audit: type=1400 audit(134224484.136:32564): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6500.838368][ T4611] netlink: 232 bytes leftover after parsing attributes in process `syz.0.12305'. [ 6505.826992][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 6505.832207][ T31] audit: type=1400 audit(134224489.686:32579): avc: denied { write } for pid=4612 comm="syz.0.12306" name="fib_triestat" dev="proc" ino=4026532848 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 6508.816558][ T4617] netlink: 'syz.3.12307': attribute type 13 has an invalid length. [ 6509.220442][ T4617] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6509.221317][ T4617] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6509.221615][ T4617] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6509.221750][ T4617] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 6509.387278][ T31] audit: type=1400 audit(134224493.286:32580): avc: denied { map_create } for pid=4618 comm="syz.3.12308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6509.417683][ T31] audit: type=1400 audit(134224493.316:32581): avc: denied { execmem } for pid=4618 comm="syz.3.12308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6511.884350][ T31] audit: type=1400 audit(134224495.776:32582): avc: denied { map_create } for pid=4618 comm="syz.3.12308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6511.899499][ T31] audit: type=1400 audit(134224495.796:32583): avc: denied { map_read map_write } for pid=4618 comm="syz.3.12308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6511.921147][ T31] audit: type=1400 audit(134224495.816:32584): avc: denied { prog_load } for pid=4618 comm="syz.3.12308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6511.921800][ T31] audit: type=1400 audit(134224495.816:32585): avc: denied { bpf } for pid=4618 comm="syz.3.12308" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6511.928908][ T31] audit: type=1400 audit(134224495.816:32586): avc: denied { perfmon } for pid=4618 comm="syz.3.12308" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6511.932105][ T31] audit: type=1400 audit(134224495.816:32587): avc: denied { prog_run } for pid=4618 comm="syz.3.12308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6511.961893][ T31] audit: type=1326 audit(134224495.846:32588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4618 comm="syz.3.12308" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x7ffc0000 [ 6511.971680][ T31] audit: type=1326 audit(134224495.856:32589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4618 comm="syz.3.12308" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x7ffc0000 [ 6511.981322][ T31] audit: type=1326 audit(134224495.866:32590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4618 comm="syz.3.12308" exe="/syz-executor" sig=0 arch=40000028 syscall=43 compat=0 ip=0x131f40 code=0x7ffc0000 [ 6511.983195][ T31] audit: type=1326 audit(134224495.876:32591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4618 comm="syz.3.12308" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x7ffc0000 [ 6526.572484][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 6526.573008][ T31] audit: type=1400 audit(134224510.466:32635): avc: denied { read } for pid=4631 comm="syz.3.12311" name="card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6526.579478][ T31] audit: type=1400 audit(134224510.476:32636): avc: denied { open } for pid=4631 comm="syz.3.12311" path="/dev/dri/card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6526.596481][ T31] audit: type=1400 audit(134224510.496:32637): avc: denied { allowed } for pid=4631 comm="syz.3.12311" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6526.601544][ T31] audit: type=1400 audit(134224510.496:32638): avc: denied { create } for pid=4631 comm="syz.3.12311" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6526.607988][ T31] audit: type=1400 audit(134224510.496:32639): avc: denied { map } for pid=4631 comm="syz.3.12311" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=98495 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6526.610342][ T31] audit: type=1400 audit(134224510.506:32640): avc: denied { read write } for pid=4631 comm="syz.3.12311" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=98495 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6526.619309][ T31] audit: type=1400 audit(134224510.516:32641): avc: denied { map } for pid=4631 comm="syz.3.12311" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=98495 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6526.768249][ T31] audit: type=1400 audit(134224510.666:32642): avc: denied { map_create } for pid=4633 comm="syz.3.12312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6526.769722][ T31] audit: type=1400 audit(134224510.666:32643): avc: denied { bpf } for pid=4633 comm="syz.3.12312" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6526.771175][ T31] audit: type=1400 audit(134224510.666:32644): avc: denied { map_read map_write } for pid=4633 comm="syz.3.12312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6528.567898][ T4639] comedi comedi0: no devices specified [ 6539.724694][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 6539.725061][ T31] audit: type=1400 audit(134224523.616:32665): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6539.726896][ T31] audit: type=1400 audit(134224523.626:32666): avc: denied { read write open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6539.728210][ T31] audit: type=1400 audit(134224523.626:32667): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6539.814325][ T31] audit: type=1400 audit(134224523.706:32668): avc: denied { create } for pid=4645 comm="syz.0.12316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6539.822956][ T31] audit: type=1400 audit(134224523.716:32669): avc: denied { prog_load } for pid=4645 comm="syz.0.12316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6539.824340][ T31] audit: type=1400 audit(134224523.716:32670): avc: denied { bpf } for pid=4645 comm="syz.0.12316" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6539.825078][ T31] audit: type=1400 audit(134224523.716:32671): avc: denied { perfmon } for pid=4645 comm="syz.0.12316" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6539.846161][ T31] audit: type=1400 audit(134224523.736:32672): avc: denied { execmem } for pid=4645 comm="syz.0.12316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6540.146965][ T31] audit: type=1400 audit(134224524.046:32673): avc: denied { module_request } for pid=4649 comm="syz.3.12318" kmod="fs-autofs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6540.343853][ T31] audit: type=1400 audit(134224524.236:32674): avc: denied { execmem } for pid=4652 comm="syz.3.12319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6548.946550][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 6548.947014][ T31] audit: type=1400 audit(134224531.832:32681): avc: denied { read write } for pid=4678 comm="syz.3.12320" name="nbd3" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6548.947363][ T31] audit: type=1400 audit(134224531.842:32682): avc: denied { read write open } for pid=4678 comm="syz.3.12320" path="/dev/nbd3" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6548.959669][ T31] audit: type=1400 audit(134224531.852:32683): avc: denied { ioctl } for pid=4678 comm="syz.3.12320" path="/dev/nbd3" dev="devtmpfs" ino=638 ioctlcmd=0xab07 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6549.162729][ T31] audit: type=1400 audit(134224532.052:32684): avc: denied { execmem } for pid=4683 comm="syz.3.12322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6549.272361][ T31] audit: type=1400 audit(134224532.162:32685): avc: denied { read write } for pid=4685 comm="syz.3.12323" name="vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6549.282351][ T31] audit: type=1400 audit(134224532.162:32686): avc: denied { open } for pid=4685 comm="syz.3.12323" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6549.292773][ T31] audit: type=1400 audit(134224532.182:32687): avc: denied { ioctl } for pid=4685 comm="syz.3.12323" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6549.342650][ T31] audit: type=1400 audit(134224532.232:32688): avc: denied { create } for pid=4685 comm="syz.3.12323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6549.363298][ T31] audit: type=1400 audit(134224532.252:32689): avc: denied { ioctl } for pid=4685 comm="syz.3.12323" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6549.381293][ T31] audit: type=1400 audit(134224532.272:32690): avc: denied { connect } for pid=4685 comm="syz.3.12323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6554.159326][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 6554.159834][ T31] audit: type=1400 audit(134224537.052:32727): avc: denied { create } for pid=4710 comm="syz.3.12334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6554.169015][ T31] audit: type=1400 audit(134224537.062:32728): avc: denied { write } for pid=4710 comm="syz.3.12334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6554.678049][ T31] audit: type=1400 audit(134224537.572:32729): avc: denied { allowed } for pid=4713 comm="syz.3.12335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6554.742000][ T31] audit: type=1400 audit(134224537.632:32730): avc: denied { create } for pid=4713 comm="syz.3.12335" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6554.746401][ T31] audit: type=1400 audit(134224537.632:32731): avc: denied { map } for pid=4713 comm="syz.3.12335" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=99543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6554.746941][ T31] audit: type=1400 audit(134224537.632:32732): avc: denied { read write } for pid=4713 comm="syz.3.12335" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=99543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6555.278624][ T31] audit: type=1400 audit(134224538.162:32733): avc: denied { prog_load } for pid=4692 comm="syz.0.12325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6555.280528][ T31] audit: type=1400 audit(134224538.162:32734): avc: denied { bpf } for pid=4692 comm="syz.0.12325" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6555.312862][ T31] audit: type=1400 audit(134224538.202:32735): avc: denied { perfmon } for pid=4692 comm="syz.0.12325" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6555.313400][ T31] audit: type=1400 audit(134224538.202:32736): avc: denied { bpf } for pid=4692 comm="syz.0.12325" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6557.390891][ T4727] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6557.394381][ T4727] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6557.602702][ T4731] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6557.647203][ T4731] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6559.030001][ T4741] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6559.031852][ T4741] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6559.406463][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 6559.406896][ T31] audit: type=1400 audit(134224542.282:32770): avc: denied { read } for pid=4744 comm="syz.3.12347" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:autofs_device_t:s0" [ 6559.407138][ T31] audit: type=1400 audit(134224542.302:32771): avc: denied { open } for pid=4744 comm="syz.3.12347" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:autofs_device_t:s0" [ 6559.417325][ T31] audit: type=1400 audit(134224542.312:32772): avc: denied { read write } for pid=4744 comm="syz.3.12347" name="udmabuf" dev="devtmpfs" ino=662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6559.417799][ T31] audit: type=1400 audit(134224542.312:32773): avc: denied { open } for pid=4744 comm="syz.3.12347" path="/dev/udmabuf" dev="devtmpfs" ino=662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6559.438754][ T31] audit: type=1400 audit(134224542.332:32774): avc: denied { ioctl } for pid=4744 comm="syz.3.12347" path="/dev/udmabuf" dev="devtmpfs" ino=662 ioctlcmd=0x7543 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6559.716013][ T31] audit: type=1400 audit(134224542.602:32775): avc: denied { prog_load } for pid=4746 comm="syz.3.12348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6559.716337][ T31] audit: type=1400 audit(134224542.602:32776): avc: denied { bpf } for pid=4746 comm="syz.3.12348" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6559.716550][ T31] audit: type=1400 audit(134224542.602:32777): avc: denied { perfmon } for pid=4746 comm="syz.3.12348" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6559.716767][ T31] audit: type=1400 audit(134224542.602:32778): avc: denied { prog_run } for pid=4746 comm="syz.3.12348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6559.759408][ T31] audit: type=1400 audit(134224542.652:32779): avc: denied { execmem } for pid=4746 comm="syz.3.12348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6573.778630][ T31] audit: type=1400 audit(134224556.672:32780): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6573.779025][ T31] audit: type=1400 audit(134224556.672:32781): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6573.782782][ T31] audit: type=1400 audit(134224556.672:32782): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6573.876397][ T31] audit: type=1400 audit(134224556.772:32783): avc: denied { create } for pid=4750 comm="syz.0.12349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6573.880230][ T31] audit: type=1400 audit(134224556.772:32784): avc: denied { write } for pid=4750 comm="syz.0.12349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6573.884667][ T31] audit: type=1400 audit(134224556.772:32785): avc: denied { nlmsg_write } for pid=4750 comm="syz.0.12349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6573.926795][ T31] audit: type=1400 audit(134224556.822:32786): avc: denied { read write } for pid=1304 comm="syz-executor" name="loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6573.927903][ T31] audit: type=1400 audit(134224556.822:32787): avc: denied { open } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6573.928828][ T31] audit: type=1400 audit(134224556.822:32788): avc: denied { ioctl } for pid=1304 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=849 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 6574.011118][ T31] audit: type=1400 audit(134224556.902:32789): avc: denied { prog_load } for pid=4752 comm="syz.0.12350" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6574.553595][ T1241] usb 1-1: new high-speed USB device number 43 using dummy_hcd [ 6574.735964][ T1241] usb 1-1: Using ep0 maxpacket: 8 [ 6574.782801][ T1241] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 6574.784195][ T1241] usb 1-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 6574.822012][ T1241] usb 1-1: New USB device found, idVendor=0bc7, idProduct=0008, bcdDevice=4f.c8 [ 6574.823406][ T1241] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 6574.826276][ T1241] usb 1-1: Product: syz [ 6574.827070][ T1241] usb 1-1: Manufacturer: syz [ 6574.827857][ T1241] usb 1-1: SerialNumber: syz [ 6574.838134][ T1241] usb 1-1: config 0 descriptor?? [ 6574.871638][ T1241] ati_remote 1-1:0.0: ati_remote_probe: Unexpected desc.bNumEndpoints [ 6575.087823][ T1241] usb 1-1: USB disconnect, device number 43 [ 6575.323796][ T4769] comedi: valid board names for 8255 driver are: [ 6575.327850][ T4769] 8255 [ 6575.336054][ T4769] comedi: valid board names for vmk80xx driver are: [ 6575.337389][ T4769] vmk80xx [ 6575.341113][ T4769] comedi: valid board names for usbduxsigma driver are: [ 6575.342336][ T4769] usbduxsigma [ 6575.342960][ T4769] comedi: valid board names for usbduxfast driver are: [ 6575.343732][ T4769] usbduxfast [ 6575.344343][ T4769] comedi: valid board names for usbdux driver are: [ 6575.345881][ T4769] usbdux [ 6575.346575][ T4769] comedi: valid board names for ni6501 driver are: [ 6575.347375][ T4769] ni6501 [ 6575.350804][ T4769] comedi: valid board names for dt9812 driver are: [ 6575.352646][ T4769] dt9812 [ 6575.353412][ T4769] comedi: valid board names for ni_labpc_cs driver are: [ 6575.354285][ T4769] ni_labpc_cs [ 6575.354939][ T4769] comedi: valid board names for ni_daq_700 driver are: [ 6575.359212][ T4769] ni_daq_700 [ 6575.367084][ T4769] comedi: valid board names for labpc_pci driver are: [ 6575.370820][ T4769] labpc_pci [ 6575.371714][ T4769] comedi: valid board names for adl_pci9118 driver are: [ 6575.373831][ T4769] pci9118dg [ 6575.374650][ T4769] pci9118hg [ 6575.380088][ T4769] pci9118hr [ 6575.380965][ T4769] comedi: valid board names for 8255_pci driver are: [ 6575.386335][ T4769] 8255_pci [ 6575.387315][ T4769] comedi: valid board names for comedi_parport driver are: [ 6575.388287][ T4769] comedi_parport [ 6575.388971][ T4769] comedi: valid board names for comedi_test driver are: [ 6575.390653][ T4769] comedi_test [ 6575.391355][ T4769] comedi: valid board names for comedi_bond driver are: [ 6575.392194][ T4769] comedi_bond [ 6579.112545][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 6579.112799][ T31] audit: type=1400 audit(134224562.002:32823): avc: denied { read } for pid=4777 comm="syz.3.12354" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6579.118747][ T31] audit: type=1400 audit(134224562.002:32824): avc: denied { open } for pid=4777 comm="syz.3.12354" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6579.133639][ T31] audit: type=1400 audit(134224562.022:32825): avc: denied { ioctl } for pid=4777 comm="syz.3.12354" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6579.415872][ T31] audit: type=1400 audit(134224562.302:32826): avc: denied { read write } for pid=4779 comm="syz.3.12355" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6579.439577][ T31] audit: type=1400 audit(134224562.332:32827): avc: denied { open } for pid=4779 comm="syz.3.12355" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6579.440259][ T31] audit: type=1400 audit(134224562.332:32828): avc: denied { ioctl } for pid=4779 comm="syz.3.12355" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6579.440754][ T4780] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6579.441344][ T4780] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6579.640068][ T31] audit: type=1400 audit(134224562.532:32829): avc: denied { read write } for pid=4783 comm="syz.3.12356" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6579.640530][ T31] audit: type=1400 audit(134224562.532:32830): avc: denied { open } for pid=4783 comm="syz.3.12356" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6579.648555][ T31] audit: type=1400 audit(134224562.542:32831): avc: denied { ioctl } for pid=4783 comm="syz.3.12356" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6579.658370][ T4784] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6579.659833][ T4784] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6579.820850][ T31] audit: type=1400 audit(134224562.712:32832): avc: denied { create } for pid=4787 comm="syz.3.12357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6580.516418][ T4797] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6580.521178][ T4797] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6581.113546][ T4810] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6581.120460][ T4810] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6588.036572][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 6588.037071][ T31] audit: type=1400 audit(134224570.932:32868): avc: denied { create } for pid=4819 comm="syz.3.12369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6588.048375][ T31] audit: type=1400 audit(134224570.942:32869): avc: denied { bind } for pid=4819 comm="syz.3.12369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6588.048838][ T31] audit: type=1400 audit(134224570.942:32870): avc: denied { module_request } for pid=4819 comm="syz.3.12369" kmod="crypto-blake2b-256" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6588.118334][ T31] audit: type=1400 audit(134224571.012:32871): avc: denied { module_request } for pid=4819 comm="syz.3.12369" kmod="crypto-blake2b-256-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6588.174345][ T31] audit: type=1400 audit(134224571.062:32872): avc: denied { accept } for pid=4819 comm="syz.3.12369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6588.302245][ T31] audit: type=1400 audit(134224571.192:32873): avc: denied { read } for pid=4823 comm="syz.3.12370" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6588.306470][ T31] audit: type=1400 audit(134224571.192:32874): avc: denied { open } for pid=4823 comm="syz.3.12370" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6588.311482][ T31] audit: type=1400 audit(134224571.202:32875): avc: denied { ioctl } for pid=4823 comm="syz.3.12370" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6588.442838][ T31] audit: type=1400 audit(134224571.332:32876): avc: denied { read write } for pid=4825 comm="syz.3.12371" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6588.443312][ T31] audit: type=1400 audit(134224571.332:32877): avc: denied { open } for pid=4825 comm="syz.3.12371" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6588.454983][ T4826] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6588.459142][ T4826] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6590.096698][ T4845] 8<--- cut here --- [ 6590.097065][ T4845] Unable to handle kernel paging request at virtual address fee04f27 when write [ 6590.097217][ T4845] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 6590.098275][ T4845] Internal error: Oops: a06 [#1] SMP ARM [ 6590.100034][ T4845] Modules linked in: [ 6590.100582][ T4845] CPU: 1 UID: 0 PID: 4845 Comm: syz.0.12377 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT [ 6590.101800][ T4845] Hardware name: ARM-Versatile Express [ 6590.102567][ T4845] PC is at parport_attach+0x174/0x1d0 [ 6590.103259][ T4845] LR is at parport_attach+0x164/0x1d0 [ 6590.103768][ T4845] pc : [<81398bc8>] lr : [<81398bb8>] psr: 60000013 [ 6590.104209][ T4845] sp : dfad9d38 ip : dfad9d38 fp : dfad9d5c [ 6590.104532][ T4845] r10: 82b15078 r9 : 00000003 r8 : 83c560c0 [ 6590.104876][ T4845] r7 : dfad9d98 r6 : 83c560c0 r5 : 00000000 r4 : 00000000 [ 6590.105511][ T4845] r3 : fee04f27 r2 : 81e14f2c r1 : 00000001 r0 : 81398838 [ 6590.106163][ T4845] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 6590.106573][ T4845] Control: 30c5387d Table: 856e4b80 DAC: 00000000 [ 6590.106972][ T4845] Register r0 information: non-slab/vmalloc memory [ 6590.107845][ T4845] Register r1 information: non-paged memory [ 6590.108272][ T4845] Register r2 information: non-slab/vmalloc memory [ 6590.108740][ T4845] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 6590.109366][ T4845] Register r4 information: NULL pointer [ 6590.109731][ T4845] Register r5 information: NULL pointer [ 6590.110042][ T4845] Register r6 information: slab kmalloc-192 start 83c560c0 pointer offset 0 size 192 [ 6590.112580][ T4845] Register r7 information: 2-page vmalloc region starting at 0xdfad8000 allocated at kernel_clone+0xac/0x3e4 [ 6590.113136][ T4845] Register r8 information: slab kmalloc-192 start 83c560c0 pointer offset 0 size 192 [ 6590.113732][ T4845] Register r9 information: non-paged memory [ 6590.114066][ T4845] Register r10 information: non-slab/vmalloc memory [ 6590.114735][ T4845] Register r11 information: 2-page vmalloc region starting at 0xdfad8000 allocated at kernel_clone+0xac/0x3e4 [ 6590.115710][ T4845] Register r12 information: 2-page vmalloc region starting at 0xdfad8000 allocated at kernel_clone+0xac/0x3e4 [ 6590.116448][ T4845] Process syz.0.12377 (pid: 4845, stack limit = 0xdfad8000) [ 6590.116885][ T4845] Stack: (0xdfad9d38 to 0xdfada000) [ 6590.117270][ T4845] 9d20: 823f893c 83c560c0 [ 6590.117890][ T4845] 9d40: dfad9d60 829c4b18 81e153ec 00000000 dfad9d94 dfad9d60 81394c80 81398a60 [ 6590.118422][ T4845] 9d60: 200000c0 00000000 dfad9d84 200000c0 83c560c0 b5403587 200000c0 85410000 [ 6590.118972][ T4845] 9d80: 40946400 00000003 dfad9e4c dfad9d98 81390910 81394b88 656d6f63 705f6964 [ 6590.119466][ T4845] 9da0: 6f707261 00007472 00000000 00004f27 00000005 00000004 00000004 00000005 [ 6590.120131][ T4845] 9dc0: 00000006 00000006 00000007 0000000a 00000100 00000002 00080000 00000001 [ 6590.120606][ T4845] 9de0: 00000008 0000001e 00000001 00000000 0001a449 00000003 00000006 00000081 [ 6590.121040][ T4845] 9e00: 0000caa7 00000004 00001e58 0000000b 00000003 0000003c 00000008 00000006 [ 6590.121530][ T4845] 9e20: 00000000 00000005 00000000 fa494828 00000000 833e9c00 83c560c0 200000c0 [ 6590.122045][ T4845] 9e40: dfad9f14 dfad9e50 813918c4 81390844 00000000 00000000 00000000 fa494828 [ 6590.122621][ T4845] 9e60: 00000000 00000000 8246a3fc 0000005f 83ccb058 83c560f0 83c1eb04 85410000 [ 6590.123117][ T4845] 9e80: dfad9ee4 dfad9e90 8079688c 8078cb7c 00000064 00000001 00000000 dfad9eac [ 6590.123545][ T4845] 9ea0: 857f40d0 8342dee0 00006400 0000000b dfad9ea0 00000000 dfad9d30 fa494828 [ 6590.124057][ T4845] 9ec0: 833e9c00 40946400 200000c0 200000c0 00000003 833e9c00 dfad9ef4 dfad9ee8 [ 6590.124576][ T4845] 9ee0: 807969ac fa494828 dfad9f14 40946400 00000000 833e9c01 200000c0 00000003 [ 6590.125045][ T4845] 9f00: 833e9c00 85410000 dfad9fa4 dfad9f18 8056f16c 813912f4 ecac8b10 85410000 [ 6590.125885][ T4845] 9f20: dfad9f3c dfad9f30 81a2db88 81a2da58 dfad9f54 dfad9f40 8026203c 802935d8 [ 6590.126418][ T4845] 9f40: dfad9fb0 40000000 dfad9f84 dfad9f58 802229ec 80261ff8 00000000 8281d09c [ 6590.126959][ T4845] 9f60: dfad9fb0 0014c4a0 ecac8b10 80222940 00000000 fa494828 dfad9fac 00000000 [ 6590.127798][ T4845] 9f80: 00000000 002f6300 00000036 8020029c 85410000 00000036 00000000 dfad9fa8 [ 6590.128259][ T4845] 9fa0: 80200060 8056f048 00000000 00000000 00000003 40946400 200000c0 00000000 [ 6590.128832][ T4845] 9fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76bd40bc [ 6590.129297][ T4845] 9fe0: 76bd3ec0 76bd3eb0 000193a4 00131f40 60000010 00000003 00000000 00000000 [ 6590.129856][ T4845] Call trace: [ 6590.130159][ T4845] [<81398a54>] (parport_attach) from [<81394c80>] (comedi_device_attach+0x104/0x240) [ 6590.131111][ T4845] r6:00000000 r5:81e153ec r4:829c4b18 [ 6590.131420][ T4845] [<81394b7c>] (comedi_device_attach) from [<81390910>] (do_devconfig_ioctl+0xd8/0x1e0) [ 6590.135005][ T4845] r10:00000003 r9:40946400 r8:85410000 r7:200000c0 r6:b5403587 r5:83c560c0 [ 6590.135556][ T4845] r4:200000c0 [ 6590.135784][ T4845] [<81390838>] (do_devconfig_ioctl) from [<813918c4>] (comedi_unlocked_ioctl+0x5dc/0x1b94) [ 6590.136563][ T4845] r6:200000c0 r5:83c560c0 r4:833e9c00 [ 6590.136927][ T4845] [<813912e8>] (comedi_unlocked_ioctl) from [<8056f16c>] (sys_ioctl+0x130/0xdc8) [ 6590.137431][ T4845] r10:85410000 r9:833e9c00 r8:00000003 r7:200000c0 r6:833e9c01 r5:00000000 [ 6590.137931][ T4845] r4:40946400 [ 6590.138143][ T4845] [<8056f03c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6590.139014][ T4845] Exception stack(0xdfad9fa8 to 0xdfad9ff0) [ 6590.139818][ T4845] 9fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 6590.140357][ T4845] 9fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76bd40bc [ 6590.140928][ T4845] 9fe0: 76bd3ec0 76bd3eb0 000193a4 00131f40 [ 6590.141293][ T4845] r10:00000036 r9:85410000 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 6590.141695][ T4845] r4:00000000 [ 6590.142169][ T4845] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 6590.142915][ T4845] ---[ end trace 0000000000000000 ]--- [ 6590.143854][ T4845] Kernel panic - not syncing: Fatal exception [ 6590.146192][ T4845] Rebooting in 86400 seconds.. VM DIAGNOSIS: 17:10:33 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000004 R03=81a2e3c0 R04=00000008 R05=828f8dc8 R06=00000000 R07=828f8dc0 R08=8337e000 R09=00000028 R10=828f8dc8 R11=dfa81b2c R12=dfa81b30 R13=dfa81b20 R14=80340934 R15=81a2e3d0 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=847e9040 R01=00000037 R02=eb743000 R03=eb743018 R04=83903032 R05=847e9040 R06=80a719d0 R07=8390303a R08=82828458 R09=00000000 R10=00002b3d R11=dfad999c R12=00000002 R13=dfad9990 R14=8295a2fc R15=80a719e0 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000