last executing test programs: 5.410300194s ago: executing program 0 (id=2324): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f00000002c0)={0x0, 'syzkaller0\x00', {0x1}, 0xb5}) r2 = socket$netlink(0x10, 0x3, 0x0) preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000000)=""/52, 0x34}], 0x1, 0xe, 0x6fa) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) 3.53822764s ago: executing program 0 (id=2325): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000003000000000000000000000085200000fd5d0100"], &(0x7f0000000980)='GPL\x00', 0xf, 0x0, 0x0, 0x41000, 0x25, '\x00', 0x0, 0x9}, 0x94) 3.457155859s ago: executing program 1 (id=2326): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000002c0)={r2, r0, 0x16, 0x0, @val=@netkit={@void, @value=r2}}, 0x1c) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0x11, &(0x7f0000000180)=0x7ff, 0x4) 2.898518881s ago: executing program 0 (id=2327): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x9}}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, 0x0, 0x0) close(0x4) 2.867028554s ago: executing program 1 (id=2328): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28011, r0, 0x0) vmsplice(r0, &(0x7f0000001840)=[{0x0}], 0x1, 0x8) 2.129595575s ago: executing program 0 (id=2329): madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) openat(0xffffffffffffff9c, 0x0, 0x129042, 0x15) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) 2.129394735s ago: executing program 1 (id=2330): sendmsg$NLBL_MGMT_C_ADDDEF(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x40040) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000000000dc020078000000000000000000000000ff02000000000000e26ea7250000000100000000000000000a"], 0xb8}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$nl_xfrm(r0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0xff80, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="760100001b"], 0x188}, 0x1, 0x0, 0x0, 0x40004}, 0x0) 1.647793408s ago: executing program 1 (id=2331): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x100}) r1 = mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f0000000140)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x0, &(0x7f00000001c0)={@flat, @fd={0x66642a85, 0x0, r0}, @ptr={0x70742a85, 0x0, &(0x7f0000000240)=""/10, 0xa}}, 0x0}, 0x10}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000480)={0x64, 0x0, &(0x7f0000000380)=[@register_looper, @free_buffer={0x40086303, r1}, @transaction_sg={0x40486311, {0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x0, &(0x7f00000002c0)={@flat=@handle={0x73682a85, 0xa, 0xc}, @ptr={0x70742a85, 0x1, &(0x7f0000000000)=""/126, 0x7e, 0x2, 0x3a}, @flat=@handle={0x73682a85, 0x110a, 0x2}}, 0x0}, 0x400}, @release={0x40046306, 0x2}], 0x0, 0x0, 0x0}) 1.560393638s ago: executing program 0 (id=2332): r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000002640)={0x0, 0x14, 0x3, 0x30, 0x700, 0x0, &(0x7f0000001640)="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"}) 861.653715ms ago: executing program 0 (id=2333): r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000100), 0x2) r1 = memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\xdenJ\xeb\x87\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38\x14\xcb\xfa\xb3j\x92\f\xe0\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf0\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2) ftruncate(r1, 0xffff) fcntl$addseals(r1, 0x409, 0x7) r2 = ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={r1, 0x0, 0x0, 0x4000}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x300000f, 0x11, r2, 0x0) syz_clone(0x1000, 0x0, 0x0, 0x0, 0x0, 0x0) 775.595384ms ago: executing program 1 (id=2334): r0 = socket(0x2, 0xa, 0x300) read(r0, &(0x7f0000000500)=""/219, 0xdb) 0s ago: executing program 1 (id=2335): r0 = landlock_create_ruleset(&(0x7f0000000080)={0x2832, 0x0, 0x2}, 0x18, 0x0) landlock_restrict_self(r0, 0x0) r1 = syz_clone(0x0, 0x0, 0x14, 0x0, 0x0, 0x0) ptrace(0x4206, r1) ptrace(0x4207, r1) kernel console output (not intermixed with test programs): ed { create } for pid=11242 comm="syz.1.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1475.342553][ T28] audit: type=1400 audit(1731.252:9737): avc: denied { create } for pid=11242 comm="syz.1.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1475.344311][ T28] audit: type=1400 audit(1731.252:9738): avc: denied { write } for pid=11242 comm="syz.1.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1475.345851][ T28] audit: type=1400 audit(1731.252:9739): avc: denied { module_request } for pid=11242 comm="syz.1.2124" kmod="net-pf-16-proto-16-family-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1475.481079][ T28] audit: type=1400 audit(1731.392:9740): avc: denied { read } for pid=11242 comm="syz.1.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1475.621923][ T28] audit: type=1400 audit(1731.492:9741): avc: denied { create } for pid=11242 comm="syz.1.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1475.629628][ T28] audit: type=1400 audit(1731.532:9742): avc: denied { write } for pid=11242 comm="syz.1.2124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1479.152406][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 1479.153699][ T28] audit: type=1400 audit(1735.062:9759): avc: denied { create } for pid=11251 comm="syz.1.2127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1479.209750][ T28] audit: type=1400 audit(1735.112:9760): avc: denied { write } for pid=11251 comm="syz.1.2127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1479.344619][ T28] audit: type=1400 audit(1735.252:9761): avc: denied { write } for pid=11251 comm="syz.1.2127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1480.224979][ T7322] usb 1-1: device descriptor read/64, error -110 [ 1480.460084][ T7322] usb 1-1: reset high-speed USB device number 83 using dummy_hcd [ 1480.599686][ T7322] usb 1-1: device descriptor read/64, error -32 [ 1480.839436][ T7322] usb 1-1: reset high-speed USB device number 83 using dummy_hcd [ 1480.860196][ T7322] usb 1-1: device descriptor read/8, error -32 [ 1481.099481][ T7322] usb 1-1: reset high-speed USB device number 83 using dummy_hcd [ 1481.121125][ T7322] usb 1-1: device descriptor read/8, error -32 [ 1481.229983][ T7322] raw-gadget.0 gadget.0: failed to queue suspend event [ 1481.234491][ T9976] usb 1-1: USB disconnect, device number 83 [ 1481.270282][ T9976] raw-gadget.0 gadget.0: failed to queue reset event [ 1481.350545][ T9976] raw-gadget.0 gadget.0: failed to queue resume event [ 1481.420200][ T9976] usb 1-1: new high-speed USB device number 84 using dummy_hcd [ 1481.421976][ C0] raw-gadget.0 gadget.0: ignoring, device is not running [ 1481.426936][ T9976] raw-gadget.0 gadget.0: failed to queue reset event [ 1481.499645][ T9976] raw-gadget.0 gadget.0: failed to queue resume event [ 1481.569831][ T9976] usb 1-1: device descriptor read/64, error -32 [ 1481.679964][ T9976] raw-gadget.0 gadget.0: failed to queue suspend event [ 1481.683900][ T9976] raw-gadget.0 gadget.0: failed to queue reset event [ 1481.718476][ T28] audit: type=1400 audit(1737.622:9762): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1481.718868][ T28] audit: type=1400 audit(1737.622:9763): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1481.719542][ T28] audit: type=1400 audit(1737.622:9764): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1481.750329][ T9976] raw-gadget.0 gadget.0: failed to queue resume event [ 1481.809860][ T9976] usb 1-1: new high-speed USB device number 85 using dummy_hcd [ 1481.811422][ C0] raw-gadget.0 gadget.0: ignoring, device is not running [ 1481.817295][ T9976] raw-gadget.0 gadget.0: failed to queue reset event [ 1481.890259][ T9976] raw-gadget.0 gadget.0: failed to queue resume event [ 1481.959702][ T9976] usb 1-1: device descriptor read/64, error -32 [ 1482.067380][ T28] audit: type=1400 audit(1737.972:9765): avc: denied { create } for pid=11261 comm="syz.1.2128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1482.070310][ T9976] raw-gadget.0 gadget.0: failed to queue suspend event [ 1482.071777][ T9976] usb usb1-port1: attempt power cycle [ 1482.072577][ T9976] raw-gadget.0 gadget.0: failed to queue disconnect event [ 1482.074203][ T9976] raw-gadget.0 gadget.0: failed to queue reset event [ 1482.104437][ T28] audit: type=1400 audit(1738.012:9766): avc: denied { write } for pid=11261 comm="syz.1.2128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1482.139709][ T9976] raw-gadget.0 gadget.0: failed to queue resume event [ 1482.150322][ T9976] raw-gadget.0 gadget.0: failed to queue reset event [ 1482.269680][ T28] audit: type=1400 audit(1738.172:9767): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1482.294700][ T28] audit: type=1400 audit(1738.202:9768): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1482.359751][ T9976] raw-gadget.0 gadget.0: failed to queue resume event [ 1482.420099][ T9976] usb 1-1: new high-speed USB device number 86 using dummy_hcd [ 1482.440368][ C0] raw-gadget.0 gadget.0: ignoring, device is not running [ 1482.441603][ T9976] usb 1-1: device descriptor read/8, error -32 [ 1482.550036][ T9976] raw-gadget.0 gadget.0: failed to queue suspend event [ 1482.552850][ T9976] raw-gadget.0 gadget.0: failed to queue reset event [ 1482.619805][ T9976] raw-gadget.0 gadget.0: failed to queue resume event [ 1482.679947][ T9976] usb 1-1: new high-speed USB device number 87 using dummy_hcd [ 1482.720484][ C0] raw-gadget.0 gadget.0: ignoring, device is not running [ 1482.721867][ T9976] usb 1-1: device descriptor read/8, error -32 [ 1482.770193][T11264] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=11264 comm=syz.1.2129 [ 1482.830057][ T9976] raw-gadget.0 gadget.0: failed to queue suspend event [ 1482.831755][ T9976] usb usb1-port1: unable to enumerate USB device [ 1484.012500][T11226] raw-gadget.0 gadget.0: failed to queue disconnect event [ 1484.175125][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 1484.175533][ T28] audit: type=1400 audit(1740.082:9786): avc: denied { create } for pid=11272 comm="syz.0.2132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1484.211248][ T28] audit: type=1400 audit(1740.122:9787): avc: denied { write } for pid=11272 comm="syz.0.2132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1484.293784][ T28] audit: type=1400 audit(1740.202:9788): avc: denied { write } for pid=11272 comm="syz.0.2132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1485.402917][ T28] audit: type=1400 audit(1741.312:9789): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1485.404010][ T28] audit: type=1400 audit(1741.312:9790): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1485.405004][ T28] audit: type=1400 audit(1741.312:9791): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1485.677533][ T28] audit: type=1400 audit(1741.582:9792): avc: denied { create } for pid=11274 comm="syz.1.2133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1485.695605][ T28] audit: type=1400 audit(1741.602:9793): avc: denied { write } for pid=11274 comm="syz.1.2133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1485.878271][ T28] audit: type=1400 audit(1741.782:9794): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1485.878723][ T28] audit: type=1400 audit(1741.782:9795): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1489.348886][ T28] kauditd_printk_skb: 44 callbacks suppressed [ 1489.349543][ T28] audit: type=1400 audit(1745.252:9838): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1489.352057][ T28] audit: type=1400 audit(1745.262:9839): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1489.352553][ T28] audit: type=1400 audit(1745.262:9840): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1489.572434][ T28] audit: type=1400 audit(1745.482:9841): avc: denied { create } for pid=11296 comm="syz.1.2143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1489.581306][ T28] audit: type=1400 audit(1745.492:9842): avc: denied { write } for pid=11296 comm="syz.1.2143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1489.602646][ T28] audit: type=1400 audit(1745.512:9843): avc: denied { read } for pid=11296 comm="syz.1.2143" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1489.604426][ T28] audit: type=1400 audit(1745.512:9844): avc: denied { open } for pid=11296 comm="syz.1.2143" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1489.702114][ T28] audit: type=1400 audit(1745.612:9845): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1489.703762][ T28] audit: type=1400 audit(1745.612:9846): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1489.705410][ T28] audit: type=1400 audit(1745.612:9847): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1490.609631][ T9976] usb 1-1: new high-speed USB device number 88 using dummy_hcd [ 1490.785983][ T9976] usb 1-1: config 1 has an invalid interface number: 7 but max is 0 [ 1490.787089][ T9976] usb 1-1: config 1 has no interface number 0 [ 1490.790255][ T9976] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0xE has invalid maxpacket 1023 [ 1490.792927][ T9976] usb 1-1: config 1 interface 7 altsetting 0 bulk endpoint 0xF has invalid maxpacket 1024 [ 1490.827919][ T9976] usb 1-1: New USB device found, idVendor=1199, idProduct=68a3, bcdDevice= 0.00 [ 1490.839897][ T9976] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1490.841011][ T9976] usb 1-1: Product: syz [ 1490.841767][ T9976] usb 1-1: Manufacturer: syz [ 1490.842626][ T9976] usb 1-1: SerialNumber: syz [ 1490.854230][T11301] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1490.862519][T11301] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1490.874617][ T9976] usb 1-1: Error in usbnet_get_endpoints (-22) [ 1491.117096][ T9976] usb 1-1: USB disconnect, device number 88 [ 1495.674662][ T28] kauditd_printk_skb: 49 callbacks suppressed [ 1495.675118][ T28] audit: type=1400 audit(1751.582:9895): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1495.720806][ T28] audit: type=1400 audit(1751.632:9896): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1495.730253][ T28] audit: type=1400 audit(1751.632:9897): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1496.234844][ T28] audit: type=1400 audit(1752.142:9898): avc: denied { create } for pid=11327 comm="syz.1.2151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1496.292984][ T28] audit: type=1400 audit(1752.202:9899): avc: denied { read write } for pid=11327 comm="syz.1.2151" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1496.293451][ T28] audit: type=1400 audit(1752.202:9900): avc: denied { open } for pid=11327 comm="syz.1.2151" path="/dev/uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1496.332273][ T28] audit: type=1400 audit(1752.242:9901): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1496.370022][ T28] audit: type=1400 audit(1752.242:9902): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1496.370589][ T28] audit: type=1400 audit(1752.242:9903): avc: denied { ioctl } for pid=11327 comm="syz.1.2151" path="/dev/uinput" dev="devtmpfs" ino=698 ioctlcmd=0x55ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1496.391025][ T28] audit: type=1400 audit(1752.302:9904): avc: denied { setopt } for pid=11327 comm="syz.1.2151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1500.690500][ T28] kauditd_printk_skb: 132 callbacks suppressed [ 1500.697776][ T28] audit: type=1400 audit(1756.592:10037): avc: denied { module_request } for pid=11366 comm="syz.1.2167" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1500.829816][ T28] audit: type=1400 audit(1756.732:10038): avc: denied { read } for pid=11366 comm="syz.1.2167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1500.904507][ T28] audit: type=1400 audit(1756.812:10039): avc: denied { read open } for pid=11370 comm="syz.0.2169" path="cgroup:[4026532650]" dev="nsfs" ino=4026532650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1500.928623][ T28] audit: type=1400 audit(1756.832:10040): avc: denied { create } for pid=11370 comm="syz.0.2169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1500.958417][ T28] audit: type=1400 audit(1756.862:10041): avc: denied { setopt } for pid=11370 comm="syz.0.2169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1501.035661][ T28] audit: type=1400 audit(1756.942:10042): avc: denied { create } for pid=11370 comm="syz.0.2169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1501.038287][ T28] audit: type=1400 audit(1756.942:10043): avc: denied { create } for pid=11370 comm="syz.0.2169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1501.053930][ T28] audit: type=1400 audit(1756.962:10044): avc: denied { setopt } for pid=11370 comm="syz.0.2169" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1501.074059][ T28] audit: type=1400 audit(1756.982:10045): avc: denied { read } for pid=11370 comm="syz.0.2169" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1501.077138][ T28] audit: type=1400 audit(1756.982:10046): avc: denied { open } for pid=11370 comm="syz.0.2169" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1506.157972][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 1506.178312][ T28] audit: type=1400 audit(1762.062:10085): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1506.386781][ T28] audit: type=1400 audit(1762.292:10086): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1506.388797][ T28] audit: type=1400 audit(1762.292:10087): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1507.069896][ T28] audit: type=1400 audit(1762.972:10088): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1507.070314][ T28] audit: type=1400 audit(1762.972:10089): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1507.070677][ T28] audit: type=1400 audit(1762.972:10090): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1507.363712][ T28] audit: type=1400 audit(1763.272:10091): avc: denied { read write } for pid=11387 comm="syz.0.2175" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1507.381219][ T28] audit: type=1400 audit(1763.292:10092): avc: denied { open } for pid=11387 comm="syz.0.2175" path="/dev/full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1507.506159][ T28] audit: type=1400 audit(1763.412:10093): avc: denied { write } for pid=11387 comm="syz.0.2175" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1507.506677][ T28] audit: type=1400 audit(1763.412:10094): avc: denied { open } for pid=11387 comm="syz.0.2175" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1512.234053][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 1512.234397][ T28] audit: type=1400 audit(1768.142:10131): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1512.251057][ T28] audit: type=1400 audit(1768.162:10132): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1512.254711][ T28] audit: type=1400 audit(1768.162:10133): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1512.320508][ T28] audit: type=1400 audit(1768.222:10134): avc: denied { create } for pid=11399 comm="syz.1.2179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1512.351718][ T28] audit: type=1400 audit(1768.262:10135): avc: denied { write } for pid=11399 comm="syz.1.2179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1512.509778][ T28] audit: type=1400 audit(1768.412:10136): avc: denied { create } for pid=11401 comm="syz.0.2180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1512.529765][ T28] audit: type=1400 audit(1768.432:10137): avc: denied { write } for pid=11401 comm="syz.0.2180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1512.550615][ T28] audit: type=1400 audit(1768.462:10138): avc: denied { write } for pid=11399 comm="syz.1.2179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1513.459852][ T28] audit: type=1400 audit(1769.362:10139): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1513.512381][ T28] audit: type=1400 audit(1769.422:10140): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1517.689863][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 1517.690342][ T28] audit: type=1400 audit(1773.592:10168): avc: denied { setopt } for pid=11411 comm="syz.0.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1518.224048][ T28] audit: type=1400 audit(1774.132:10169): avc: denied { prog_load } for pid=11411 comm="syz.0.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1518.232929][ T28] audit: type=1400 audit(1774.142:10170): avc: denied { bpf } for pid=11411 comm="syz.0.2184" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1518.282337][ T28] audit: type=1400 audit(1774.192:10171): avc: denied { prog_load } for pid=11411 comm="syz.0.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1518.284449][ T28] audit: type=1400 audit(1774.192:10172): avc: denied { bpf } for pid=11411 comm="syz.0.2184" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1518.286638][ T28] audit: type=1400 audit(1774.192:10173): avc: denied { prog_load } for pid=11411 comm="syz.0.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1518.298570][ T28] audit: type=1400 audit(1774.202:10174): avc: denied { perfmon } for pid=11411 comm="syz.0.2184" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1518.310588][ T28] audit: type=1400 audit(1774.222:10175): avc: denied { bpf } for pid=11411 comm="syz.0.2184" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1518.325529][ T28] audit: type=1400 audit(1774.232:10176): avc: denied { prog_run } for pid=11411 comm="syz.0.2184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1519.073786][ T28] audit: type=1400 audit(1774.982:10177): avc: denied { create } for pid=11407 comm="syz.1.2182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1522.813906][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 1522.814304][ T28] audit: type=1400 audit(1778.722:10183): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1522.814544][ T28] audit: type=1400 audit(1778.722:10184): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1522.814750][ T28] audit: type=1400 audit(1778.722:10185): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1523.300698][ T28] audit: type=1400 audit(1779.212:10186): avc: denied { create } for pid=11419 comm="syz.0.2186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1523.303714][ T28] audit: type=1400 audit(1779.212:10187): avc: denied { write } for pid=11419 comm="syz.0.2186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1523.331981][ T28] audit: type=1400 audit(1779.242:10188): avc: denied { write } for pid=11419 comm="syz.0.2186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1523.724236][ T28] audit: type=1400 audit(1779.632:10189): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1523.731312][ T28] audit: type=1400 audit(1779.632:10190): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1523.745307][ T28] audit: type=1400 audit(1779.632:10191): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1525.167260][ T28] audit: type=1400 audit(1781.072:10192): avc: denied { create } for pid=11421 comm="syz.1.2187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1526.539507][ T9976] usb 1-1: new high-speed USB device number 89 using dummy_hcd [ 1526.699963][ T9976] usb 1-1: Using ep0 maxpacket: 32 [ 1526.722005][ T9976] usb 1-1: config 6 has an invalid interface number: 234 but max is 1 [ 1526.724373][ T9976] usb 1-1: config 6 has an invalid interface number: 201 but max is 1 [ 1526.725374][ T9976] usb 1-1: config 6 contains an unexpected descriptor of type 0x2, skipping [ 1526.726221][ T9976] usb 1-1: config 6 has no interface number 0 [ 1526.726953][ T9976] usb 1-1: config 6 has no interface number 1 [ 1526.727717][ T9976] usb 1-1: config 6 interface 234 altsetting 1 has an invalid descriptor for endpoint zero, skipping [ 1526.728738][ T9976] usb 1-1: config 6 interface 234 altsetting 1 has a duplicate endpoint with address 0x1, skipping [ 1526.730147][ T9976] usb 1-1: config 6 interface 234 altsetting 1 has an invalid descriptor for endpoint zero, skipping [ 1526.731337][ T9976] usb 1-1: config 6 interface 234 altsetting 1 endpoint 0x8 has invalid maxpacket 1040, setting to 64 [ 1526.732445][ T9976] usb 1-1: config 6 interface 234 altsetting 1 bulk endpoint 0xA has invalid maxpacket 1023 [ 1526.733433][ T9976] usb 1-1: config 6 interface 201 altsetting 1 has a duplicate endpoint with address 0x4, skipping [ 1526.735831][ T9976] usb 1-1: config 6 interface 201 altsetting 1 has a duplicate endpoint with address 0x7, skipping [ 1526.736827][ T9976] usb 1-1: config 6 interface 201 altsetting 1 has a duplicate endpoint with address 0xC, skipping [ 1526.737898][ T9976] usb 1-1: config 6 interface 201 altsetting 1 has a duplicate endpoint with address 0xC, skipping [ 1526.738817][ T9976] usb 1-1: config 6 interface 234 has no altsetting 0 [ 1526.739942][ T9976] usb 1-1: config 6 interface 201 has no altsetting 0 [ 1526.755405][ T9976] usb 1-1: New USB device found, idVendor=0763, idProduct=1033, bcdDevice=bb.29 [ 1526.756490][ T9976] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1526.757464][ T9976] usb 1-1: Product: ዄ㍕搖庩札磐칾ꢧ俫뭅噾刨짛㻥䢫厨똼䀭搊㯐龺䷠켤䡐擸놌࣢Ⲇו깶杺傴廉䛊㑂籒≎䂿ஸ抰蚶ݝ擧堶캉䒢䯵ࡕ咎ᷗ蔁둳 [ 1526.759308][ T9976] usb 1-1: Manufacturer: 鏳䅕聼窾퇮䝇恕ഺh矵뇬鯊쬖卲㡥쵼뤘籕郙鳼㠷ݒ [ 1526.761103][ T9976] usb 1-1: SerialNumber: Ъ [ 1526.782719][T11424] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1526.792030][T11424] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 1527.047314][ T9976] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 1527.181343][ T9976] usb 1-1: USB disconnect, device number 89 [ 1527.829514][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 1527.841157][ T28] audit: type=1400 audit(1783.722:10233): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1527.953896][ T28] audit: type=1400 audit(1783.862:10234): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1527.979709][ T28] audit: type=1400 audit(1783.882:10235): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1528.156642][ T28] audit: type=1400 audit(1784.062:10236): avc: denied { setopt } for pid=11456 comm="syz.0.2189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1528.681395][ T28] audit: type=1400 audit(1784.592:10237): avc: denied { prog_load } for pid=11456 comm="syz.0.2189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1528.710163][ T28] audit: type=1400 audit(1784.612:10238): avc: denied { prog_load } for pid=11456 comm="syz.0.2189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1528.728034][ T28] audit: type=1400 audit(1784.632:10239): avc: denied { bpf } for pid=11456 comm="syz.0.2189" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1528.728591][ T28] audit: type=1400 audit(1784.632:10240): avc: denied { perfmon } for pid=11456 comm="syz.0.2189" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1528.728834][ T28] audit: type=1400 audit(1784.632:10241): avc: denied { prog_run } for pid=11456 comm="syz.0.2189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1528.914796][ T28] audit: type=1400 audit(1784.822:10242): avc: denied { create } for pid=11459 comm="syz.1.2190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1529.239671][T11461] FAULT_INJECTION: forcing a failure. [ 1529.239671][T11461] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1529.248558][T11461] CPU: 0 UID: 0 PID: 11461 Comm: syz.1.2190 Not tainted syzkaller #0 PREEMPT [ 1529.248702][T11461] Hardware name: ARM-Versatile Express [ 1529.248948][T11461] Call trace: [ 1529.249004][T11461] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1529.249151][T11461] r7:60000013 r6:60000013 r5:8231e924 r4:00000000 [ 1529.249172][T11461] [<80201af0>] (show_stack) from [<8021e384>] (dump_stack_lvl+0x5c/0x70) [ 1529.249230][T11461] [<8021e328>] (dump_stack_lvl) from [<8021e3b0>] (dump_stack+0x18/0x1c) [ 1529.249296][T11461] r7:00000001 r6:00000000 r5:85810000 r4:82b1815c [ 1529.249316][T11461] [<8021e398>] (dump_stack) from [<809d848c>] (should_fail_ex+0x1c0/0x224) [ 1529.249376][T11461] [<809d82cc>] (should_fail_ex) from [<8055443c>] (should_fail_alloc_page+0x68/0x74) [ 1529.249468][T11461] r8:dfa2db5c r7:00000001 r6:00000000 r5:00140cca r4:dfa2db68 [ 1529.250394][T11461] [<805543d4>] (should_fail_alloc_page) from [<80519fdc>] (prepare_alloc_pages+0xf8/0x1b4) [ 1529.255016][T11461] [<80519ee4>] (prepare_alloc_pages) from [<805230f4>] (__alloc_frozen_pages_noprof+0xb0/0x1620) [ 1529.258764][T11461] r10:00000000 r9:85810000 r8:20000000 r7:20000000 r6:00140cca r5:00000000 [ 1529.258796][T11461] r4:dfa2dc58 [ 1529.258826][T11461] [<80523044>] (__alloc_frozen_pages_noprof) from [<805246d8>] (__folio_alloc_noprof+0x14/0x6c) [ 1529.258887][T11461] r10:00000000 r9:85a1cb40 r8:20000000 r7:20000000 r6:84f98780 r5:00000000 [ 1529.258898][T11461] r4:dfa2dc58 [ 1529.258907][T11461] [<805246c4>] (__folio_alloc_noprof) from [<804eea60>] (do_anonymous_page+0xf0/0x648) [ 1529.258944][T11461] r5:00000000 r4:dfa2dc58 [ 1529.258953][T11461] [<804ee970>] (do_anonymous_page) from [<804f1928>] (handle_mm_fault+0x5bc/0x6b8) [ 1529.258996][T11461] r10:00000000 r9:85a1cb40 r8:86493d80 r7:dfa2dd78 r6:20000000 r5:85810000 [ 1529.259008][T11461] r4:00000215 [ 1529.259017][T11461] [<804f136c>] (handle_mm_fault) from [<80232fb0>] (do_page_fault+0xf0/0x4d0) [ 1529.259058][T11461] r10:00000002 r9:85a1cb40 r8:00000215 r7:20000000 r6:00000a06 r5:20000d00 [ 1529.259069][T11461] r4:dfa2dd78 [ 1529.259077][T11461] [<80232ec0>] (do_page_fault) from [<802334b0>] (do_translation_fault+0x120/0x128) [ 1529.259113][T11461] r10:85810000 r9:85810000 r8:80233390 r7:dfa2dd78 r6:20000d00 r5:00000a06 [ 1529.259136][T11461] r4:82a1c740 [ 1529.259146][T11461] [<80233390>] (do_translation_fault) from [<8023355c>] (do_DataAbort+0x38/0xac) [ 1529.259182][T11461] r9:85810000 r8:80233390 r7:dfa2dd78 r6:20000d00 r5:00000a06 r4:82a1c740 [ 1529.259193][T11461] [<80233524>] (do_DataAbort) from [<80200b2c>] (__dabt_svc+0x4c/0x80) [ 1529.259218][T11461] Exception stack(0xdfa2dd78 to 0xdfa2ddc0) [ 1529.259236][T11461] dd60: 20000d00 7effffff [ 1529.259256][T11461] dd80: 00000000 b5003500 b5403587 20000d00 0000541b 86035000 dfa2decc 81e8342c [ 1529.259276][T11461] dda0: 85810000 dfa2de4c a1000d03 dfa2ddc8 815f199c 81ae6548 80000013 ffffffff [ 1529.259295][T11461] r8:dfa2decc r7:dfa2ddac r6:ffffffff r5:80000013 r4:81ae6548 [ 1529.259305][T11461] [<815f1908>] (sk_ioctl) from [<818e58f4>] (inet6_ioctl+0xf4/0x198) [ 1529.259344][T11461] r7:86035000 r6:86035000 r5:20000d00 r4:0000541b [ 1529.259354][T11461] [<818e5800>] (inet6_ioctl) from [<815ecb44>] (sock_ioctl+0x138/0x4c0) [ 1529.259530][T11461] r7:86035000 r6:20000d00 r5:834b51c0 r4:0000541b [ 1529.259552][T11461] [<815eca0c>] (sock_ioctl) from [<805a1b84>] (sys_ioctl+0x244/0xb5c) [ 1529.259623][T11461] r9:00000003 r8:864d1980 r7:20000d00 r6:0000541b r5:864d1981 r4:00000000 [ 1529.259642][T11461] [<805a1940>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1529.259683][T11461] Exception stack(0xdfa2dfa8 to 0xdfa2dff0) [ 1529.259712][T11461] dfa0: 00000000 00000000 00000003 0000541b 20000d00 00000000 [ 1529.259743][T11461] dfc0: 00000000 00000000 0012f214 00000036 003462d8 00000000 00000001 76f4a0dc [ 1529.259767][T11461] dfe0: 76f49e88 76f49e78 00018ebc 00130810 [ 1529.259799][T11461] r10:00000036 r9:85810000 r8:8020029c r7:00000036 r6:0012f214 r5:00000000 [ 1529.259816][T11461] r4:00000000 [ 1531.143105][ T92] usb 2-1: new high-speed USB device number 84 using dummy_hcd [ 1531.400872][ T92] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1531.401185][ T92] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1531.401257][ T92] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1531.401354][ T92] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1531.401399][ T92] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1531.407096][ T92] usb 2-1: config 0 descriptor?? [ 1532.327980][T11465] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1532.330202][T11465] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1532.633092][ T92] usbhid 2-1:0.0: can't add hid device: -71 [ 1532.633378][ T92] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 1532.655163][ T92] usb 2-1: USB disconnect, device number 84 [ 1533.057788][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 1533.058134][ T28] audit: type=1400 audit(1788.962:10260): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.179913][ T28] audit: type=1400 audit(1789.082:10261): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.180270][ T28] audit: type=1400 audit(1789.082:10262): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.180604][ T28] audit: type=1400 audit(1789.082:10263): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.261539][ T28] audit: type=1400 audit(1789.172:10264): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.319439][ T28] audit: type=1400 audit(1789.212:10265): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1533.430927][ T28] audit: type=1400 audit(1789.342:10266): avc: denied { create } for pid=11481 comm="syz.0.2194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1533.443358][ T28] audit: type=1400 audit(1789.352:10267): avc: denied { write } for pid=11481 comm="syz.0.2194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1533.492756][ T28] audit: type=1400 audit(1789.402:10268): avc: denied { write } for pid=11481 comm="syz.0.2194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1534.784107][ T28] audit: type=1400 audit(1790.682:10269): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1538.200923][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 1538.201239][ T28] audit: type=1400 audit(1794.112:10308): avc: denied { create } for pid=11494 comm="syz.0.2198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1538.205890][ T28] audit: type=1400 audit(1794.112:10309): avc: denied { write } for pid=11494 comm="syz.0.2198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1538.230731][ T28] audit: type=1400 audit(1794.142:10310): avc: denied { write } for pid=11494 comm="syz.0.2198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1538.391176][ T28] audit: type=1400 audit(1794.302:10311): avc: denied { prog_load } for pid=11488 comm="syz.1.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1538.531771][ T28] audit: type=1400 audit(1794.442:10312): avc: denied { prog_load } for pid=11488 comm="syz.1.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1538.692368][ T28] audit: type=1400 audit(1794.602:10313): avc: denied { bpf } for pid=11488 comm="syz.1.2196" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1538.724530][ T28] audit: type=1400 audit(1794.632:10314): avc: denied { prog_load } for pid=11488 comm="syz.1.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1538.724994][ T28] audit: type=1400 audit(1794.632:10315): avc: denied { bpf } for pid=11488 comm="syz.1.2196" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1538.734252][ T28] audit: type=1400 audit(1794.642:10316): avc: denied { prog_load } for pid=11488 comm="syz.1.2196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1538.747027][ T28] audit: type=1400 audit(1794.652:10317): avc: denied { perfmon } for pid=11488 comm="syz.1.2196" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1543.233169][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 1543.233424][ T28] audit: type=1400 audit(1799.142:10348): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.249800][ T28] audit: type=1400 audit(1799.142:10349): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.279611][ T28] audit: type=1400 audit(1799.142:10350): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1543.729491][ T28] audit: type=1400 audit(1799.642:10351): avc: denied { create } for pid=11507 comm="syz.0.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1543.730619][ T28] audit: type=1400 audit(1799.642:10352): avc: denied { write } for pid=11507 comm="syz.0.2202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1544.084160][ T28] audit: type=1400 audit(1799.992:10353): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1544.084566][ T28] audit: type=1400 audit(1799.992:10354): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1544.110997][ T28] audit: type=1400 audit(1800.022:10355): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1544.159761][ T28] audit: type=1400 audit(1800.062:10356): avc: denied { create } for pid=11506 comm="syz.1.2201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1544.231721][ T28] audit: type=1400 audit(1800.142:10357): avc: denied { ioctl } for pid=11506 comm="syz.1.2201" path="socket:[23147]" dev="sockfs" ino=23147 ioctlcmd=0x4b63 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1548.548532][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 1548.549337][ T28] audit: type=1400 audit(1804.452:10368): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.581080][ T28] audit: type=1400 audit(1804.492:10369): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.582485][ T28] audit: type=1400 audit(1804.492:10370): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.728000][ T28] audit: type=1400 audit(1804.632:10371): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.728490][ T28] audit: type=1400 audit(1804.632:10372): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.741004][ T28] audit: type=1400 audit(1804.652:10373): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.828423][ T28] audit: type=1400 audit(1804.732:10374): avc: denied { read } for pid=11516 comm="syz.0.2206" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1548.828896][ T28] audit: type=1400 audit(1804.732:10375): avc: denied { open } for pid=11516 comm="syz.0.2206" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1548.867259][ T28] audit: type=1400 audit(1804.772:10376): avc: denied { ioctl } for pid=11516 comm="syz.0.2206" path="/dev/mixer" dev="devtmpfs" ino=730 ioctlcmd=0x5331 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1548.898414][ T28] audit: type=1400 audit(1804.802:10377): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1553.592676][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 1553.592998][ T28] audit: type=1400 audit(1809.502:10436): avc: denied { prog_load } for pid=11534 comm="syz.1.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1553.603433][ T28] audit: type=1400 audit(1809.502:10437): avc: denied { bpf } for pid=11534 comm="syz.1.2212" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1553.753848][ T28] audit: type=1400 audit(1809.662:10438): avc: denied { map_create } for pid=11534 comm="syz.1.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1553.754751][ T28] audit: type=1400 audit(1809.662:10439): avc: denied { bpf } for pid=11534 comm="syz.1.2212" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1553.772792][ T28] audit: type=1400 audit(1809.682:10440): avc: denied { map_create } for pid=11534 comm="syz.1.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1553.798150][ T28] audit: type=1400 audit(1809.702:10441): avc: denied { map_read map_write } for pid=11534 comm="syz.1.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1554.021687][ T28] audit: type=1400 audit(1809.932:10442): avc: denied { prog_load } for pid=11534 comm="syz.1.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1554.087478][ T28] audit: type=1400 audit(1809.992:10443): avc: denied { bpf } for pid=11534 comm="syz.1.2212" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1554.318287][ T28] audit: type=1400 audit(1810.222:10444): avc: denied { prog_load } for pid=11534 comm="syz.1.2212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1554.376689][ T28] audit: type=1400 audit(1810.282:10445): avc: denied { bpf } for pid=11534 comm="syz.1.2212" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1558.812898][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 1558.813315][ T28] audit: type=1400 audit(1814.722:10479): avc: denied { read } for pid=11542 comm="syz.0.2216" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1558.813550][ T28] audit: type=1400 audit(1814.722:10480): avc: denied { open } for pid=11542 comm="syz.0.2216" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1558.843598][ T28] audit: type=1400 audit(1814.752:10481): avc: denied { ioctl } for pid=11542 comm="syz.0.2216" path="/dev/loop-control" dev="devtmpfs" ino=633 ioctlcmd=0x6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1558.863840][ T28] audit: type=1400 audit(1814.772:10482): avc: denied { ioctl } for pid=11542 comm="syz.0.2216" path="/dev/loop-control" dev="devtmpfs" ino=633 ioctlcmd=0x4b72 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1559.221763][ T28] audit: type=1400 audit(1815.132:10483): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1559.222226][ T28] audit: type=1400 audit(1815.132:10484): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1559.237532][ T28] audit: type=1400 audit(1815.132:10485): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1559.779747][ T28] audit: type=1400 audit(1815.682:10486): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1559.809618][ T28] audit: type=1400 audit(1815.712:10487): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1559.811511][ T28] audit: type=1400 audit(1815.712:10488): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1564.146872][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 1564.147235][ T28] audit: type=1400 audit(1820.052:10524): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1564.170724][ T28] audit: type=1400 audit(1820.072:10525): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1564.172766][ T28] audit: type=1400 audit(1820.072:10526): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1564.301155][ T28] audit: type=1400 audit(1820.212:10527): avc: denied { create } for pid=11558 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1564.306219][ T28] audit: type=1400 audit(1820.212:10528): avc: denied { write } for pid=11558 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1564.314466][ T28] audit: type=1400 audit(1820.212:10529): avc: denied { read } for pid=11558 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1564.333637][ T28] audit: type=1400 audit(1820.242:10530): avc: denied { write } for pid=11558 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1564.355638][ T28] audit: type=1400 audit(1820.262:10531): avc: denied { write } for pid=11558 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1564.383771][ T28] audit: type=1400 audit(1820.292:10532): avc: denied { accept } for pid=11558 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1564.422165][ T28] audit: type=1400 audit(1820.332:10533): avc: denied { create } for pid=11558 comm="syz.0.2221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1571.056675][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 1571.056988][ T28] audit: type=1400 audit(1826.962:10568): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1571.131848][ T28] audit: type=1400 audit(1827.042:10569): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1571.151996][ T28] audit: type=1400 audit(1827.062:10570): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1571.733690][ T28] audit: type=1400 audit(1827.642:10571): avc: denied { read write } for pid=11572 comm="syz.1.2226" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1571.734908][ T28] audit: type=1400 audit(1827.642:10572): avc: denied { open } for pid=11572 comm="syz.1.2226" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1571.771810][ T28] audit: type=1400 audit(1827.682:10573): avc: denied { ioctl } for pid=11572 comm="syz.1.2226" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1571.900641][ T28] audit: type=1400 audit(1827.812:10574): avc: denied { ioctl } for pid=11572 comm="syz.1.2226" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1571.999944][ T28] audit: type=1400 audit(1827.902:10575): avc: denied { ioctl } for pid=11572 comm="syz.1.2226" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1572.009669][ T9] usb 2-1: new high-speed USB device number 85 using dummy_hcd [ 1572.241826][ T9] usb 2-1: unable to get BOS descriptor or descriptor too short [ 1572.301666][ T9] usb 2-1: config 9 has an invalid interface number: 195 but max is 0 [ 1572.302717][ T9] usb 2-1: config 9 has no interface number 0 [ 1572.303690][ T9] usb 2-1: config 9 interface 195 has no altsetting 0 [ 1572.351471][ T9] usb 2-1: New USB device found, idVendor=13d3, idProduct=3237, bcdDevice= 6.67 [ 1572.352655][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1572.353783][ T9] usb 2-1: Product: syz [ 1572.354535][ T9] usb 2-1: Manufacturer: syz [ 1572.355258][ T9] usb 2-1: SerialNumber: syz [ 1572.381069][ T28] audit: type=1400 audit(1828.292:10576): avc: denied { ioctl } for pid=11572 comm="syz.1.2226" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1572.600834][ T28] audit: type=1400 audit(1828.512:10577): avc: denied { ioctl } for pid=11572 comm="syz.1.2226" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1573.251859][T11573] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11573 comm=syz.1.2226 [ 1573.390301][ T9] usb 2-1: USB disconnect, device number 85 [ 1576.164506][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 1576.165026][ T28] audit: type=1400 audit(1832.072:10623): avc: denied { read } for pid=11607 comm="syz.0.2234" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1576.180098][ T28] audit: type=1400 audit(1832.082:10624): avc: denied { open } for pid=11607 comm="syz.0.2234" path="net:[4026532657]" dev="nsfs" ino=4026532657 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1576.211377][ T28] audit: type=1400 audit(1832.122:10625): avc: denied { create } for pid=11607 comm="syz.0.2234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1576.213635][ T28] audit: type=1400 audit(1832.122:10626): avc: denied { ioctl } for pid=11607 comm="syz.0.2234" path="socket:[23294]" dev="sockfs" ino=23294 ioctlcmd=0x1500 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1576.221515][ T28] audit: type=1400 audit(1832.132:10627): avc: denied { setattr } for pid=11607 comm="syz.0.2234" path="socket:[23294]" dev="sockfs" ino=23294 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1576.284647][ T28] audit: type=1400 audit(1832.192:10628): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=952 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1576.287195][ T28] audit: type=1400 audit(1832.192:10629): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=952 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1576.301724][ T28] audit: type=1400 audit(1832.212:10630): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=952 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1576.411378][ T28] audit: type=1400 audit(1832.322:10631): avc: denied { read } for pid=11609 comm="syz.0.2235" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1576.414069][ T28] audit: type=1400 audit(1832.322:10632): avc: denied { open } for pid=11609 comm="syz.0.2235" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1581.244913][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 1581.248398][ T28] audit: type=1400 audit(1837.152:10671): avc: denied { create } for pid=11599 comm="syz.1.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1585.303137][ T28] audit: type=1400 audit(1841.212:10672): avc: denied { create } for pid=11629 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1588.108012][ T28] audit: type=1400 audit(1844.022:10673): avc: denied { write } for pid=11629 comm="syz.0.2241" path="socket:[24404]" dev="sockfs" ino=24404 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1589.147622][ T28] audit: type=1400 audit(1845.052:10674): avc: denied { write } for pid=11629 comm="syz.0.2241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1589.333294][ T28] audit: type=1400 audit(1845.242:10675): avc: denied { read write } for pid=11629 comm="syz.0.2241" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1589.335142][ T28] audit: type=1400 audit(1845.242:10676): avc: denied { open } for pid=11629 comm="syz.0.2241" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1589.511592][ T28] audit: type=1400 audit(1845.412:10677): avc: denied { write } for pid=11599 comm="syz.1.2231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1589.749688][ T28] audit: type=1400 audit(1845.652:10678): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.762142][ T28] audit: type=1400 audit(1845.672:10679): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.779891][ T28] audit: type=1400 audit(1845.682:10680): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.991711][ T28] audit: type=1400 audit(1845.902:10681): avc: denied { ioctl } for pid=11629 comm="syz.0.2241" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0x5517 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1590.234501][ T28] audit: type=1400 audit(1846.142:10682): avc: denied { mounton } for pid=11629 comm="syz.0.2241" path="/1218/file0" dev="tmpfs" ino=6466 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1593.117355][ T28] kauditd_printk_skb: 46 callbacks suppressed [ 1593.122665][ T28] audit: type=1400 audit(1849.022:10729): avc: denied { create } for pid=11646 comm="syz.0.2248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1593.149651][ T28] audit: type=1400 audit(1849.052:10730): avc: denied { create } for pid=11646 comm="syz.0.2248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1593.164799][ T28] audit: type=1400 audit(1849.072:10731): avc: denied { write } for pid=11646 comm="syz.0.2248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1593.168001][ T28] audit: type=1400 audit(1849.072:10732): avc: denied { read } for pid=11646 comm="syz.0.2248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1593.181827][ T28] audit: type=1400 audit(1849.092:10733): avc: denied { map_create } for pid=11646 comm="syz.0.2248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1593.183484][ T28] audit: type=1400 audit(1849.092:10734): avc: denied { bpf } for pid=11646 comm="syz.0.2248" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1593.211195][ T28] audit: type=1400 audit(1849.122:10735): avc: denied { map_create } for pid=11646 comm="syz.0.2248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1593.212741][ T28] audit: type=1400 audit(1849.122:10736): avc: denied { map_read map_write } for pid=11646 comm="syz.0.2248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1593.243618][ T28] audit: type=1400 audit(1849.152:10737): avc: denied { write } for pid=11646 comm="syz.0.2248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1593.254975][ T28] audit: type=1400 audit(1849.162:10738): avc: denied { create } for pid=11646 comm="syz.0.2248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1594.849986][ T9677] usb 1-1: new high-speed USB device number 90 using dummy_hcd [ 1594.999781][ T9677] usb 1-1: Using ep0 maxpacket: 16 [ 1595.029902][ T9677] usb 1-1: config 6 has an invalid interface number: 214 but max is 3 [ 1595.030941][ T9677] usb 1-1: config 6 has an invalid interface number: 106 but max is 3 [ 1595.034624][ T9677] usb 1-1: config 6 has an invalid interface number: 231 but max is 3 [ 1595.035839][ T9677] usb 1-1: config 6 has an invalid interface number: 194 but max is 3 [ 1595.036745][ T9677] usb 1-1: config 6 has no interface number 0 [ 1595.037643][ T9677] usb 1-1: config 6 has no interface number 1 [ 1595.042354][ T9677] usb 1-1: config 6 has no interface number 2 [ 1595.043430][ T9677] usb 1-1: config 6 has no interface number 3 [ 1595.044385][ T9677] usb 1-1: config 6 interface 214 altsetting 5 has an invalid descriptor for endpoint zero, skipping [ 1595.045442][ T9677] usb 1-1: config 6 interface 214 altsetting 5 has an invalid descriptor for endpoint zero, skipping [ 1595.046563][ T9677] usb 1-1: config 6 interface 214 altsetting 5 endpoint 0x6 has invalid maxpacket 512, setting to 64 [ 1595.047934][ T9677] usb 1-1: config 6 interface 231 altsetting 5 endpoint 0x1 has invalid maxpacket 1023, setting to 64 [ 1595.055371][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has an invalid descriptor for endpoint zero, skipping [ 1595.057856][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has an endpoint descriptor with address 0xDE, changing to 0x8E [ 1595.060583][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has a duplicate endpoint with address 0x8E, skipping [ 1595.062430][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has a duplicate endpoint with address 0xE, skipping [ 1595.066568][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has a duplicate endpoint with address 0xA, skipping [ 1595.069695][ T9677] usb 1-1: config 6 interface 194 altsetting 248 endpoint 0x4 has invalid maxpacket 1024, setting to 64 [ 1595.072291][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has a duplicate endpoint with address 0xA, skipping [ 1595.075018][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has a duplicate endpoint with address 0x87, skipping [ 1595.078480][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has a duplicate endpoint with address 0x4, skipping [ 1595.081644][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has a duplicate endpoint with address 0x1, skipping [ 1595.082764][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has an invalid descriptor for endpoint zero, skipping [ 1595.085115][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has a duplicate endpoint with address 0x1, skipping [ 1595.087520][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has a duplicate endpoint with address 0x9, skipping [ 1595.101170][ T9677] usb 1-1: config 6 interface 194 altsetting 248 has 16 endpoint descriptors, different from the interface descriptor's value: 15 [ 1595.101540][ T9677] usb 1-1: config 6 interface 214 has no altsetting 0 [ 1595.101747][ T9677] usb 1-1: config 6 interface 106 has no altsetting 0 [ 1595.101927][ T9677] usb 1-1: config 6 interface 231 has no altsetting 0 [ 1595.102097][ T9677] usb 1-1: config 6 interface 194 has no altsetting 0 [ 1595.134907][ T9677] usb 1-1: New USB device found, idVendor=0c52, idProduct=2871, bcdDevice=ce.c4 [ 1595.135236][ T9677] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1595.135528][ T9677] usb 1-1: Product: syz [ 1595.135705][ T9677] usb 1-1: Manufacturer: syz [ 1595.135874][ T9677] usb 1-1: SerialNumber: syz [ 1595.412721][T11649] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1595.430376][T11649] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1598.782773][ T28] kauditd_printk_skb: 41 callbacks suppressed [ 1598.784216][ T28] audit: type=1400 audit(1854.692:10780): avc: denied { mount } for pid=11662 comm="syz.1.2253" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1599.231827][ T28] audit: type=1400 audit(1855.142:10781): avc: denied { prog_load } for pid=11662 comm="syz.1.2253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1599.239222][ T28] audit: type=1400 audit(1855.142:10782): avc: denied { bpf } for pid=11662 comm="syz.1.2253" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1599.409725][ T28] audit: type=1400 audit(1855.312:10783): avc: denied { ioctl } for pid=11648 comm="syz.0.2249" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1599.704580][ T28] audit: type=1400 audit(1855.612:10784): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1599.721581][ T28] audit: type=1400 audit(1855.632:10785): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1599.741965][ T28] audit: type=1400 audit(1855.652:10786): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1600.051722][ T28] audit: type=1400 audit(1855.942:10787): avc: denied { create } for pid=11665 comm="syz.1.2254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1600.097417][ T28] audit: type=1400 audit(1856.002:10788): avc: denied { write } for pid=11665 comm="syz.1.2254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1600.484242][ T28] audit: type=1400 audit(1856.392:10789): avc: denied { ioctl } for pid=11648 comm="syz.0.2249" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1600.492824][ T9677] ftdi_sio 1-1:6.214: FTDI USB Serial Device converter detected [ 1600.495061][ T9677] ftdi_sio ttyUSB0: unknown device type: 0xcec4 [ 1601.518836][ T9677] ftdi_sio 1-1:6.106: FTDI USB Serial Device converter detected [ 1601.520655][ T9677] ftdi_sio ttyUSB1: unknown device type: 0xcec4 [ 1601.528033][ T9677] ftdi_sio 1-1:6.231: FTDI USB Serial Device converter detected [ 1601.532819][ T9677] ftdi_sio ttyUSB2: unknown device type: 0xcec4 [ 1601.545344][ T9677] ftdi_sio 1-1:6.194: FTDI USB Serial Device converter detected [ 1601.546717][ T9677] ftdi_sio ttyUSB3: unknown device type: 0xcec4 [ 1601.562940][ T9677] usb 1-1: USB disconnect, device number 90 [ 1601.568058][ T9677] ftdi_sio 1-1:6.214: device disconnected [ 1601.575949][ T9677] ftdi_sio 1-1:6.106: device disconnected [ 1601.584739][ T9677] ftdi_sio 1-1:6.231: device disconnected [ 1601.587231][ T9677] ftdi_sio 1-1:6.194: device disconnected [ 1601.855075][T11699] raw_sendmsg: syz.0.2255 forgot to set AF_INET. Fix it! [ 1604.328552][ T28] kauditd_printk_skb: 108 callbacks suppressed [ 1604.329736][ T28] audit: type=1400 audit(1860.232:10898): avc: denied { search } for pid=11707 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1604.329880][ T28] audit: type=1400 audit(1860.232:10899): avc: denied { search } for pid=11707 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1604.329945][ T28] audit: type=1400 audit(1860.232:10900): avc: denied { search } for pid=11707 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1604.345984][ T28] audit: type=1400 audit(1860.252:10901): avc: denied { getattr } for pid=11707 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=36 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1604.349547][ T28] audit: type=1400 audit(1860.252:10902): avc: denied { search } for pid=11707 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1604.349840][ T28] audit: type=1400 audit(1860.252:10903): avc: denied { search } for pid=11707 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1604.349926][ T28] audit: type=1400 audit(1860.262:10904): avc: denied { search } for pid=11707 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1604.356363][ T28] audit: type=1400 audit(1860.262:10905): avc: denied { write search } for pid=11707 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1604.369416][ T28] audit: type=1400 audit(1860.272:10906): avc: denied { remove_name search } for pid=11707 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=36 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1604.369779][ T28] audit: type=1400 audit(1860.272:10907): avc: denied { unlink } for pid=11707 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=36 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1609.557237][ T28] kauditd_printk_skb: 61 callbacks suppressed [ 1609.557670][ T28] audit: type=1400 audit(1865.462:10969): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1609.628155][ T28] audit: type=1400 audit(1865.532:10970): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1609.664844][ T28] audit: type=1400 audit(1865.542:10971): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1609.899649][ T28] audit: type=1400 audit(1865.802:10972): avc: denied { prog_load } for pid=11723 comm="syz.1.2262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1609.900188][ T28] audit: type=1400 audit(1865.802:10973): avc: denied { bpf } for pid=11723 comm="syz.1.2262" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1609.952850][ T28] audit: type=1400 audit(1865.862:10974): avc: denied { create } for pid=11724 comm="syz.0.2263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1609.965414][ T28] audit: type=1400 audit(1865.872:10975): avc: denied { write } for pid=11724 comm="syz.0.2263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1610.060065][ T28] audit: type=1400 audit(1865.962:10976): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1610.080563][ T28] audit: type=1400 audit(1865.982:10977): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1610.080921][ T28] audit: type=1400 audit(1865.982:10978): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1615.055230][ T28] kauditd_printk_skb: 72 callbacks suppressed [ 1615.055707][ T28] audit: type=1400 audit(1870.962:11051): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1615.160825][ T28] audit: type=1400 audit(1871.072:11052): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1615.165770][ T28] audit: type=1400 audit(1871.072:11053): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1616.437532][ T28] audit: type=1400 audit(1872.342:11054): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1616.437992][ T28] audit: type=1400 audit(1872.342:11055): avc: denied { open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1616.512103][ T28] audit: type=1400 audit(1872.422:11056): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1616.818725][ T28] audit: type=1400 audit(1872.722:11057): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1616.819680][ T28] audit: type=1400 audit(1872.722:11058): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1616.901438][ T28] audit: type=1400 audit(1872.782:11059): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1617.294092][ T28] audit: type=1400 audit(1873.182:11060): avc: denied { prog_load } for pid=11750 comm="syz.0.2271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1620.163174][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 1620.164190][ T28] audit: type=1400 audit(1876.072:11096): avc: denied { write } for pid=11753 comm="syz.1.2272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1620.336020][ T28] audit: type=1400 audit(1876.242:11097): avc: denied { create } for pid=11757 comm="syz.0.2273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1620.373823][ T28] audit: type=1400 audit(1876.282:11098): avc: denied { write } for pid=11757 comm="syz.0.2273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1622.242844][ T28] audit: type=1400 audit(1878.152:11099): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1622.246143][ T28] audit: type=1400 audit(1878.152:11100): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1622.247858][ T28] audit: type=1400 audit(1878.152:11101): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1622.505210][ T28] audit: type=1400 audit(1878.412:11102): avc: denied { allowed } for pid=11761 comm="syz.0.2274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1622.575071][ T28] audit: type=1400 audit(1878.442:11103): avc: denied { create } for pid=11761 comm="syz.0.2274" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1623.104895][ T28] audit: type=1400 audit(1879.012:11104): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1623.161769][ T28] audit: type=1400 audit(1879.072:11105): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1625.540966][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 1625.541366][ T28] audit: type=1400 audit(1881.452:11116): avc: denied { create } for pid=11765 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1625.576926][ T28] audit: type=1400 audit(1881.472:11117): avc: denied { write } for pid=11765 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1625.682529][ T28] audit: type=1400 audit(1881.592:11118): avc: denied { create } for pid=11765 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1625.800701][ T28] audit: type=1400 audit(1881.712:11119): avc: denied { write } for pid=11765 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1625.817222][ T28] audit: type=1400 audit(1881.722:11120): avc: denied { read } for pid=11765 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1625.865071][ T28] audit: type=1400 audit(1881.772:11121): avc: denied { read } for pid=11765 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1625.887602][ T28] audit: type=1400 audit(1881.792:11122): avc: denied { write } for pid=11765 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1625.933840][ T28] audit: type=1400 audit(1881.842:11123): avc: denied { write } for pid=11765 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1625.947269][ T28] audit: type=1400 audit(1881.852:11124): avc: denied { read } for pid=11765 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1625.973212][ T28] audit: type=1400 audit(1881.882:11125): avc: denied { write } for pid=11765 comm="syz.0.2276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1632.127267][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 1632.127721][ T28] audit: type=1400 audit(1888.032:11159): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1632.149713][ T28] audit: type=1400 audit(1888.052:11160): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1632.153328][ T28] audit: type=1400 audit(1888.052:11161): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1633.401543][ T28] audit: type=1400 audit(1889.062:11162): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1633.403263][ T28] audit: type=1400 audit(1889.312:11163): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1633.405151][ T28] audit: type=1400 audit(1889.312:11164): avc: denied { ioctl } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.601362][ T28] audit: type=1400 audit(1890.512:11165): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.603541][ T28] audit: type=1400 audit(1890.512:11166): avc: denied { open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.607021][ T28] audit: type=1400 audit(1890.512:11167): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.762318][ T28] audit: type=1400 audit(1890.672:11168): avc: denied { create } for pid=11781 comm="syz.0.2281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1637.315735][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 1637.316173][ T28] audit: type=1400 audit(1893.222:11198): avc: denied { read } for pid=11787 comm="syz.0.2282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1637.321380][ T28] audit: type=1400 audit(1893.232:11199): avc: denied { setopt } for pid=11787 comm="syz.0.2282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1637.327798][ T28] audit: type=1400 audit(1893.232:11200): avc: denied { prog_load } for pid=11787 comm="syz.0.2282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1637.340779][ T28] audit: type=1400 audit(1893.252:11201): avc: denied { bpf } for pid=11787 comm="syz.0.2282" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1637.382651][ T28] audit: type=1400 audit(1893.292:11202): avc: denied { prog_load } for pid=11787 comm="syz.0.2282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1637.399648][ T28] audit: type=1400 audit(1893.292:11203): avc: denied { bpf } for pid=11787 comm="syz.0.2282" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1637.400103][ T28] audit: type=1400 audit(1893.292:11204): avc: denied { perfmon } for pid=11787 comm="syz.0.2282" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1637.680970][ T28] audit: type=1400 audit(1893.592:11205): avc: denied { prog_run } for pid=11787 comm="syz.0.2282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1637.869499][ T28] audit: type=1400 audit(1893.772:11206): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1637.910003][ T28] audit: type=1400 audit(1893.812:11207): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1643.439502][ T28] kauditd_printk_skb: 56 callbacks suppressed [ 1643.444082][ T28] audit: type=1400 audit(1899.342:11262): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1643.480389][ T28] audit: type=1400 audit(1899.382:11263): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1643.543902][ T28] audit: type=1400 audit(1899.442:11264): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1644.265006][ T28] audit: type=1400 audit(1900.172:11265): avc: denied { execute } for pid=11813 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1644.319963][ T28] audit: type=1400 audit(1900.212:11266): avc: denied { execute_no_trans } for pid=11813 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1644.320415][ T28] audit: type=1400 audit(1900.222:11267): avc: denied { execute } for pid=11813 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1644.369939][ T28] audit: type=1400 audit(1900.272:11268): avc: denied { execmem } for pid=11813 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1644.481039][ T28] audit: type=1400 audit(1900.392:11269): avc: denied { read } for pid=11816 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1644.481512][ T28] audit: type=1400 audit(1900.392:11270): avc: denied { open } for pid=11816 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1644.494818][ T28] audit: type=1400 audit(1900.392:11271): avc: denied { mounton } for pid=11816 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1644.541847][ T2159] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1644.639617][ T2159] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1644.684619][ T2159] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1644.773623][ T2159] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1645.681920][ T2159] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1645.788766][ T2159] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1646.000492][ T2159] bond0 (unregistering): Released all slaves [ 1646.139572][ T2159] hsr_slave_0: left promiscuous mode [ 1646.150810][ T2159] hsr_slave_1: left promiscuous mode [ 1646.180680][ T2159] veth1_macvtap: left promiscuous mode [ 1646.181821][ T2159] veth0_macvtap: left promiscuous mode [ 1646.200434][ T2159] veth1_vlan: left promiscuous mode [ 1646.200987][ T2159] veth0_vlan: left promiscuous mode [ 1648.610032][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 1648.610371][ T28] audit: type=1400 audit(1904.492:11287): avc: denied { read write } for pid=11816 comm="syz-executor" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1648.621267][ T28] audit: type=1400 audit(1904.532:11288): avc: denied { read write open } for pid=11816 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1648.623133][ T28] audit: type=1400 audit(1904.532:11289): avc: denied { ioctl } for pid=11816 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1648.757302][ T28] audit: type=1400 audit(1904.662:11290): avc: denied { write } for pid=11847 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1648.762951][ T28] audit: type=1400 audit(1904.672:11291): avc: denied { write open } for pid=11847 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1648.787142][ T28] audit: type=1400 audit(1904.692:11292): avc: denied { search } for pid=11847 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1648.790943][ T28] audit: type=1400 audit(1904.692:11293): avc: denied { search } for pid=11847 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1648.792918][ T28] audit: type=1400 audit(1904.702:11294): avc: denied { search } for pid=11847 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1648.796133][ T28] audit: type=1400 audit(1904.702:11295): avc: denied { search } for pid=11847 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1648.809654][ T28] audit: type=1400 audit(1904.702:11296): avc: denied { module_request } for pid=11816 comm="syz-executor" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1651.861513][ T2957] 8021q: adding VLAN 0 to HW filter on device eth1 [ 1653.121639][T11816] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1653.133106][T11816] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1653.665721][ T28] kauditd_printk_skb: 167 callbacks suppressed [ 1653.666224][ T28] audit: type=1400 audit(1909.572:11464): avc: denied { search } for pid=11986 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1653.672416][ T28] audit: type=1400 audit(1909.582:11465): avc: denied { read } for pid=11986 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1653.675948][ T28] audit: type=1400 audit(1909.582:11466): avc: denied { read open } for pid=11986 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1653.678075][ T28] audit: type=1400 audit(1909.582:11467): avc: denied { search } for pid=11986 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1653.684761][ T28] audit: type=1400 audit(1909.592:11468): avc: denied { search } for pid=11986 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1653.685552][ T28] audit: type=1400 audit(1909.592:11469): avc: denied { search } for pid=11986 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1653.687187][ T28] audit: type=1400 audit(1909.592:11470): avc: denied { read } for pid=11986 comm="cmp" name="resolv.conf.eth2.link" dev="tmpfs" ino=38 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1653.687872][ T28] audit: type=1400 audit(1909.592:11471): avc: denied { read open } for pid=11986 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=38 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1653.689003][ T28] audit: type=1400 audit(1909.592:11472): avc: denied { getattr } for pid=11986 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1653.718574][ T28] audit: type=1400 audit(1909.622:11473): avc: denied { module_request } for pid=11816 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1654.421785][ T2957] 8021q: adding VLAN 0 to HW filter on device eth2 [ 1655.578817][T11816] hsr_slave_0: entered promiscuous mode [ 1655.593296][T11816] hsr_slave_1: entered promiscuous mode [ 1655.601138][T11816] debugfs: 'hsr0' already exists in 'hsr' [ 1655.601978][T11816] Cannot create hsr debugfs directory [ 1656.807520][T11816] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1656.825664][T11816] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 1656.836001][T11816] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1656.854610][T11816] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 1656.872717][T11816] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1656.878709][T11816] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 1656.892624][T11816] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1656.914104][T11816] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 1658.677202][ T28] kauditd_printk_skb: 195 callbacks suppressed [ 1658.677575][ T28] audit: type=1400 audit(1914.582:11669): avc: denied { write open } for pid=12151 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1658.710263][ T28] audit: type=1400 audit(1914.612:11670): avc: denied { search } for pid=12151 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1658.713389][ T28] audit: type=1400 audit(1914.622:11671): avc: denied { search } for pid=12151 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1658.715536][ T28] audit: type=1400 audit(1914.622:11672): avc: denied { search } for pid=12151 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1658.718711][ T28] audit: type=1400 audit(1914.622:11673): avc: denied { search } for pid=12151 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1658.798107][ T28] audit: type=1400 audit(1914.702:11674): avc: denied { search } for pid=12153 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1658.798572][ T28] audit: type=1400 audit(1914.702:11675): avc: denied { search } for pid=12153 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1658.798662][ T28] audit: type=1400 audit(1914.702:11676): avc: denied { search } for pid=12153 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1658.798728][ T28] audit: type=1400 audit(1914.702:11677): avc: denied { read } for pid=12153 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1658.811991][ T28] audit: type=1400 audit(1914.712:11678): avc: denied { read open } for pid=12153 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1659.023642][T11816] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1663.690625][ T28] kauditd_printk_skb: 383 callbacks suppressed [ 1663.691160][ T28] audit: type=1400 audit(1919.602:12062): avc: denied { sys_module } for pid=11816 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1663.691482][ T28] audit: type=1400 audit(1919.602:12063): avc: denied { module_request } for pid=11816 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1663.746114][ T28] audit: type=1400 audit(1919.652:12064): avc: denied { read write } for pid=3102 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1663.746642][ T28] audit: type=1400 audit(1919.652:12065): avc: denied { read write open } for pid=3102 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1663.783265][ T28] audit: type=1400 audit(1919.692:12066): avc: denied { search } for pid=12197 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1663.783863][ T28] audit: type=1400 audit(1919.692:12067): avc: denied { search } for pid=12197 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1663.784304][ T28] audit: type=1400 audit(1919.692:12068): avc: denied { search } for pid=12197 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1663.784398][ T28] audit: type=1400 audit(1919.692:12069): avc: denied { getattr } for pid=12197 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=43 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1663.784456][ T28] audit: type=1400 audit(1919.692:12070): avc: denied { write } for pid=12197 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1663.784518][ T28] audit: type=1400 audit(1919.692:12071): avc: denied { remove_name } for pid=12197 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=43 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1666.107567][T11816] veth0_vlan: entered promiscuous mode [ 1666.195742][T11816] veth1_vlan: entered promiscuous mode [ 1666.379921][T11816] veth0_macvtap: entered promiscuous mode [ 1666.388798][T11816] veth1_macvtap: entered promiscuous mode [ 1666.589946][T10178] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1666.590647][T10178] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1666.591054][T10178] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1666.591280][T10178] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1667.470487][T12230] FAULT_INJECTION: forcing a failure. [ 1667.470487][T12230] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1667.480274][T12230] CPU: 1 UID: 0 PID: 12230 Comm: syz.0.2289 Not tainted syzkaller #0 PREEMPT [ 1667.480422][T12230] Hardware name: ARM-Versatile Express [ 1667.480450][T12230] Call trace: [ 1667.480531][T12230] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1667.480641][T12230] r7:60000013 r6:60000013 r5:8231e924 r4:00000000 [ 1667.480662][T12230] [<80201af0>] (show_stack) from [<8021e384>] (dump_stack_lvl+0x5c/0x70) [ 1667.480717][T12230] [<8021e328>] (dump_stack_lvl) from [<8021e3b0>] (dump_stack+0x18/0x1c) [ 1667.480785][T12230] r7:20000240 r6:00000000 r5:85814b00 r4:82b4f348 [ 1667.480803][T12230] [<8021e398>] (dump_stack) from [<809d848c>] (should_fail_ex+0x1c0/0x224) [ 1667.480858][T12230] [<809d82cc>] (should_fail_ex) from [<809d8504>] (should_fail+0x14/0x18) [ 1667.480956][T12230] r8:24040000 r7:20000240 r6:dfd15e28 r5:00000000 r4:dfd15f20 [ 1667.480976][T12230] [<809d84f0>] (should_fail) from [<809d8524>] (should_fail_usercopy+0x1c/0x20) [ 1667.481024][T12230] [<809d8508>] (should_fail_usercopy) from [<815ec1c4>] (copy_msghdr_from_user+0x50/0x1e0) [ 1667.481082][T12230] [<815ec174>] (copy_msghdr_from_user) from [<815ec3cc>] (___sys_sendmsg+0x78/0xd0) [ 1667.481150][T12230] r8:24040000 r7:00000000 r6:85057440 r5:dfd15f20 r4:dfd15e6c [ 1667.481168][T12230] [<815ec354>] (___sys_sendmsg) from [<815ee540>] (__sys_sendmsg+0x8c/0xe0) [ 1667.481234][T12230] r9:85814b00 r8:864d1f80 r7:24040000 r6:20000240 r5:864d1f81 r4:00000003 [ 1667.481252][T12230] [<815ee4b4>] (__sys_sendmsg) from [<815ee5a8>] (sys_sendmsg+0x14/0x18) [ 1667.481312][T12230] r8:8020029c r7:00000128 r6:0012f214 r5:00000000 r4:00000000 [ 1667.481329][T12230] [<815ee594>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1667.481375][T12230] Exception stack(0xdfd15fa8 to 0xdfd15ff0) [ 1667.481416][T12230] 5fa0: 00000000 00000000 00000003 20000240 24040000 00000000 [ 1667.481452][T12230] 5fc0: 00000000 00000000 0012f214 00000128 003462d8 00000000 00000001 76f8a0dc [ 1667.481480][T12230] 5fe0: 76f89e88 76f89e78 00018ebc 00130810 [ 1667.972131][T10178] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1668.036207][T10178] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1668.055631][T12244] syzkaller0: entered promiscuous mode [ 1668.056141][T12244] syzkaller0: entered allmulticast mode [ 1668.090677][T10178] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1668.142079][T10178] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1668.557060][T10178] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1668.576063][T10178] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1668.582689][T10178] bond0 (unregistering): Released all slaves [ 1668.666590][T10178] hsr_slave_0: left promiscuous mode [ 1668.668562][T10178] hsr_slave_1: left promiscuous mode [ 1668.690049][T10178] veth1_macvtap: left promiscuous mode [ 1668.690400][T10178] veth0_macvtap: left promiscuous mode [ 1668.690874][T10178] veth1_vlan: left promiscuous mode [ 1668.690988][T10178] veth0_vlan: left promiscuous mode [ 1668.898735][ T28] kauditd_printk_skb: 384 callbacks suppressed [ 1668.899401][ T28] audit: type=1400 audit(1924.802:12456): avc: denied { read write } for pid=12266 comm="syz.0.2303" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1668.932753][ T28] audit: type=1400 audit(1924.832:12457): avc: denied { read write open } for pid=12266 comm="syz.0.2303" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1668.933143][ T28] audit: type=1400 audit(1924.832:12458): avc: denied { sys_module } for pid=12239 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1668.933466][ T28] audit: type=1400 audit(1924.842:12459): avc: denied { module_request } for pid=12239 comm="syz-executor" kmod="rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1669.179565][ T28] audit: type=1400 audit(1925.082:12460): avc: denied { module_request } for pid=12239 comm="syz-executor" kmod="netdev-rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1669.278409][ T28] audit: type=1400 audit(1925.182:12461): avc: denied { mounton } for pid=12266 comm="syz.0.2303" path="/4/file0" dev="tmpfs" ino=38 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1669.283994][ T28] audit: type=1400 audit(1925.192:12462): avc: denied { mount } for pid=12266 comm="syz.0.2303" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1669.339483][ T28] audit: type=1400 audit(1925.242:12463): avc: denied { sys_module } for pid=12239 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1669.339823][ T28] audit: type=1400 audit(1925.242:12464): avc: denied { module_request } for pid=12239 comm="syz-executor" kmod="rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1669.461585][ T28] audit: type=1400 audit(1925.372:12465): avc: denied { write } for pid=12272 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1670.583567][ T2957] 8021q: adding VLAN 0 to HW filter on device eth1 [ 1671.573928][T12239] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1671.594480][T12239] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1672.027401][ T2957] 8021q: adding VLAN 0 to HW filter on device eth2 [ 1673.423318][T12239] hsr_slave_0: entered promiscuous mode [ 1673.425028][T12239] hsr_slave_1: entered promiscuous mode [ 1673.481186][ T2957] 8021q: adding VLAN 0 to HW filter on device eth3 [ 1673.967499][ T28] kauditd_printk_skb: 250 callbacks suppressed [ 1673.967817][ T28] audit: type=1400 audit(1929.872:12716): avc: denied { write } for pid=12524 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1673.969492][ T28] audit: type=1400 audit(1929.882:12717): avc: denied { open } for pid=12524 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1674.205688][ T28] audit: type=1400 audit(1930.112:12718): avc: denied { write } for pid=12542 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1674.207562][ T28] audit: type=1400 audit(1930.112:12719): avc: denied { open } for pid=12542 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1674.217549][ T28] audit: type=1400 audit(1930.122:12720): avc: denied { search } for pid=12542 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1674.219371][ T28] audit: type=1400 audit(1930.122:12721): avc: denied { search } for pid=12542 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1674.225178][ T28] audit: type=1400 audit(1930.122:12722): avc: denied { search } for pid=12542 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1674.230445][ T28] audit: type=1400 audit(1930.122:12723): avc: denied { search } for pid=12542 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1674.239646][ T28] audit: type=1400 audit(1930.142:12724): avc: denied { search } for pid=12554 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1674.241397][ T28] audit: type=1400 audit(1930.142:12725): avc: denied { search } for pid=12554 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1674.406589][T12239] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1674.424370][T12239] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 1674.434831][T12239] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1674.456172][T12239] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 1674.472889][T12239] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1674.492417][T12239] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 1674.510617][T12239] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1674.530708][T12239] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 1675.789791][T12239] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1678.994534][ T28] kauditd_printk_skb: 309 callbacks suppressed [ 1678.994879][ T28] audit: type=1400 audit(1934.902:13035): avc: denied { sys_module } for pid=12239 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1678.997465][ T28] audit: type=1400 audit(1934.902:13036): avc: denied { module_request } for pid=12239 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1679.029506][ T28] audit: type=1400 audit(1934.932:13037): avc: denied { search } for pid=12614 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1679.029927][ T28] audit: type=1400 audit(1934.932:13038): avc: denied { search } for pid=12614 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1679.030019][ T28] audit: type=1400 audit(1934.932:13039): avc: denied { search } for pid=12614 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1679.069782][ T28] audit: type=1400 audit(1934.972:13040): avc: denied { search } for pid=12607 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1679.169783][ T28] audit: type=1400 audit(1935.072:13041): avc: denied { module_request } for pid=12239 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1679.330495][ T28] audit: type=1400 audit(1935.232:13042): avc: denied { write } for pid=12616 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1679.330970][ T28] audit: type=1400 audit(1935.232:13043): avc: denied { open } for pid=12616 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1679.374290][ T28] audit: type=1400 audit(1935.282:13044): avc: denied { search } for pid=12616 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1681.585326][T12239] veth0_vlan: entered promiscuous mode [ 1681.621665][T12239] veth1_vlan: entered promiscuous mode [ 1681.682981][T12239] veth0_macvtap: entered promiscuous mode [ 1681.694780][T12239] veth1_macvtap: entered promiscuous mode [ 1681.788666][T11875] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1681.789616][T11875] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1681.789749][T11875] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1681.789822][T11875] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1682.715994][T12653] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1682.726041][T12653] block device autoloading is deprecated and will be removed. [ 1683.391472][T12668] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2308'. [ 1684.101548][ T28] kauditd_printk_skb: 475 callbacks suppressed [ 1684.107382][ T28] audit: type=1400 audit(1940.012:13520): avc: denied { search } for pid=12675 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.108720][ T28] audit: type=1400 audit(1940.012:13521): avc: denied { search } for pid=12675 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.110168][ T28] audit: type=1400 audit(1940.012:13522): avc: denied { search } for pid=12675 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.131518][ T28] audit: type=1400 audit(1940.042:13523): avc: denied { search } for pid=12671 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.245397][ T28] audit: type=1400 audit(1940.152:13524): avc: denied { write } for pid=12676 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1684.248191][ T28] audit: type=1400 audit(1940.152:13525): avc: denied { open } for pid=12676 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1684.257577][ T28] audit: type=1400 audit(1940.162:13526): avc: denied { search } for pid=12676 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.261622][ T28] audit: type=1400 audit(1940.162:13527): avc: denied { search } for pid=12676 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.265759][ T28] audit: type=1400 audit(1940.162:13528): avc: denied { search } for pid=12676 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1684.273720][ T28] audit: type=1400 audit(1940.162:13529): avc: denied { search } for pid=12676 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1689.209574][ T28] kauditd_printk_skb: 149 callbacks suppressed [ 1689.209951][ T28] audit: type=1400 audit(1945.092:13679): avc: denied { read write } for pid=12239 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1689.211608][ T28] audit: type=1400 audit(1945.122:13680): avc: denied { read write open } for pid=12239 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1689.212917][ T28] audit: type=1400 audit(1945.122:13681): avc: denied { ioctl } for pid=12239 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1689.339370][ T28] audit: type=1400 audit(1945.242:13682): avc: denied { create } for pid=12712 comm="syz.0.2318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1689.499839][ T28] audit: type=1400 audit(1945.412:13683): avc: denied { write } for pid=12712 comm="syz.0.2318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1689.500946][T12713] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2318'. [ 1689.501612][T12713] netlink: 20 bytes leftover after parsing attributes in process `syz.0.2318'. [ 1689.818751][ T28] audit: type=1400 audit(1945.722:13684): avc: denied { read write } for pid=11816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1689.820636][ T28] audit: type=1400 audit(1945.732:13685): avc: denied { open } for pid=11816 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1689.844660][ T28] audit: type=1400 audit(1945.752:13686): avc: denied { write } for pid=12714 comm="syz.1.2319" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1689.845954][ T28] audit: type=1400 audit(1945.752:13687): avc: denied { ioctl } for pid=11816 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1689.871798][ T28] audit: type=1400 audit(1945.782:13688): avc: denied { write open } for pid=12714 comm="syz.1.2319" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1694.292354][ T28] kauditd_printk_skb: 57 callbacks suppressed [ 1694.292745][ T28] audit: type=1400 audit(1950.202:13746): avc: denied { create } for pid=12745 comm="syz.0.2327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1694.363870][ T28] audit: type=1400 audit(1950.252:13747): avc: denied { ioctl } for pid=12745 comm="syz.0.2327" path="socket:[25593]" dev="sockfs" ino=25593 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1694.373785][T12747] veth0: entered promiscuous mode [ 1694.375200][ T28] audit: type=1400 audit(1950.282:13748): avc: denied { setopt } for pid=12745 comm="syz.0.2327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1694.412026][ T28] audit: type=1400 audit(1950.322:13749): avc: denied { setopt } for pid=12745 comm="syz.0.2327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1694.415978][T12747] veth0: left promiscuous mode [ 1694.474969][ T28] audit: type=1400 audit(1950.382:13750): avc: denied { read write } for pid=12239 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1694.475386][ T28] audit: type=1400 audit(1950.382:13751): avc: denied { open } for pid=12239 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1694.475760][ T28] audit: type=1400 audit(1950.382:13752): avc: denied { ioctl } for pid=12239 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1694.520006][ T28] audit: type=1400 audit(1950.412:13753): avc: denied { read write } for pid=11816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1694.520485][ T28] audit: type=1400 audit(1950.412:13754): avc: denied { open } for pid=11816 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1694.520834][ T28] audit: type=1400 audit(1950.412:13755): avc: denied { ioctl } for pid=11816 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=953 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1694.827342][T12750] netlink: 182 bytes leftover after parsing attributes in process `syz.1.2330'. [ 1696.461921][T12758] syz.1.2334 uses obsolete (PF_INET,SOCK_PACKET) [ 1697.053795][T12761] ------------[ cut here ]------------ [ 1697.054390][T12761] WARNING: fs/exec.c:118 at path_noexec+0x80/0x88, CPU#1: syz.0.2333/12761 [ 1697.057691][T12761] Modules linked in: [ 1697.058683][T12761] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1697.059276][T12761] CPU: 1 UID: 0 PID: 12761 Comm: syz.0.2333 Not tainted syzkaller #0 PREEMPT [ 1697.059751][T12761] Hardware name: ARM-Versatile Express [ 1697.059962][T12761] Call trace: [ 1697.060144][T12761] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1697.060516][T12761] r7:82a1eab8 r6:00000000 r5:8231e924 r4:00000001 [ 1697.060757][T12761] [<80201af0>] (show_stack) from [<8021e384>] (dump_stack_lvl+0x5c/0x70) [ 1697.061104][T12761] [<8021e328>] (dump_stack_lvl) from [<8021e3b0>] (dump_stack+0x18/0x1c) [ 1697.061416][T12761] r7:82a1eab8 r6:00000000 r5:83815780 r4:82c7cd3c [ 1697.061712][T12761] [<8021e398>] (dump_stack) from [<8020260c>] (vpanic+0x114/0x320) [ 1697.062016][T12761] [<802024f8>] (vpanic) from [<8020284c>] (trace_suspend_resume+0x0/0x104) [ 1697.062357][T12761] r7:80590820 [ 1697.062515][T12761] [<80202818>] (panic) from [<80250854>] (get_taint+0x0/0x1c) [ 1697.062821][T12761] r3:82a0b544 r2:00000001 r1:823053ec r0:8230cce8 [ 1697.063043][T12761] [<802507dc>] (check_panic_on_warn) from [<802509d0>] (__warn+0x98/0x1ac) [ 1697.063369][T12761] [<80250938>] (__warn) from [<80250c5c>] (warn_slowpath_fmt+0x178/0x1f4) [ 1697.064572][T12761] r8:00000009 r7:82340f08 r6:dfa61e4c r5:83815780 r4:00000000 [ 1697.064849][T12761] [<80250ae8>] (warn_slowpath_fmt) from [<80590820>] (path_noexec+0x80/0x88) [ 1697.065194][T12761] r10:8641ac80 r9:85a22580 r8:83815780 r7:20000000 r6:0300000f r5:00000011 [ 1697.065484][T12761] r4:8641aca8 [ 1697.065628][T12761] [<805907a0>] (path_noexec) from [<804fa45c>] (do_mmap+0x334/0x53c) [ 1697.065945][T12761] r5:00000011 r4:00003000 [ 1697.066146][T12761] [<804fa128>] (do_mmap) from [<804c33c8>] (vm_mmap_pgoff+0x128/0x20c) [ 1697.066475][T12761] r10:85a22580 r9:20000000 r8:00003000 r7:dfa61f18 r6:8641ac80 r5:0300000f [ 1697.066787][T12761] r4:00000000 [ 1697.066933][T12761] [<804c32a0>] (vm_mmap_pgoff) from [<804f991c>] (ksys_mmap_pgoff+0xa4/0xec) [ 1697.067260][T12761] r10:000000c0 r9:83815780 r8:8641ac80 r7:20000000 r6:00003000 r5:0300000f [ 1697.067562][T12761] r4:00000011 [ 1697.067719][T12761] [<804f9878>] (ksys_mmap_pgoff) from [<804f9980>] (sys_mmap_pgoff+0x1c/0x24) [ 1697.068756][T12761] r8:8020029c r7:000000c0 r6:0034631c r5:00000000 r4:00000005 [ 1697.069304][T12761] [<804f9964>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1697.071238][T12761] Exception stack(0xdfa61fa8 to 0xdfa61ff0) [ 1697.076194][T12761] 1fa0: 00000005 00000000 20000000 00003000 0300000f 00000011 [ 1697.079338][T12761] 1fc0: 00000005 00000000 0034631c 000000c0 003462d8 00000000 00000001 76f8a0dc [ 1697.079943][T12761] 1fe0: 76f89e88 76f89e78 00018ebc 00130810 [ 1697.082384][T12761] Rebooting in 86400 seconds..