last executing test programs: 11m56.110159157s ago: executing program 1 (id=4570): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4020002}, 0xc, &(0x7f00000002c0)={&(0x7f00000000c0)={0x1fc, r1, 0x23, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x400, 0x11}}}}, [@NL80211_ATTR_CSA_C_OFFSETS_TX={0x6, 0xcd, [0x5]}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1d}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2a8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x48}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x19}], @NL80211_ATTR_FRAME={0x191, 0x33, @reassoc_resp={{{0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, {0x81}, @broadcast, @broadcast, @initial, {0x6}, @value=@ver_80211n={0x0, 0x3, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1}}, 0x2000, 0x56, @random=0x1000, @void, @val={0x2d, 0x1a, {0x8000, 0x1, 0x0, 0x0, {0xe1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x1, 0x2, 0xff}}, [{0xdd, 0x3b, "0bc87eedbf1ea3cf191db4f8c5ea64f09e6b2e05b07bc103477fdda7c0e18f7a407f91de41f61aabc18ca543db61e9c2097f26a550f11b3eae3fe2"}, {0xdd, 0x93, "5c9e6b3bbe4344d06dc2159a161f7796f33ef5f32512cb5e60b38744ff7b7e6c8779b80daa805ea4176d355ca54620bce2c0768c1c01c518657005e05d92c19c06b55d7e30f07fd282bd5818071f17bad7e73b9a52eaa4d6d6e86c10de52e139476cf2a53dd55456fab8cc8ff15b5f9b02d22ca7f3f40fb0506a05e78ab7d795309eb458637f925fc48b9140d5855bce15835a"}, {0xdd, 0x7b, "2e29e83dcc07e3a9282b6476998c6c27e6d9452a38d8e8974119c0bcb0971e00292eac5e67ca987d8a6243e90bd63fb8034add9fc9411ed62067c831247cde31041aa39eb1720521f6edb584496e7e4d73501f4b36e84b73f82c1f04b56644ef976c6a3e18b358d6da73f37ea0fe9cb569ffdc9b0e0a679c27520b"}]}}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x4044050}, 0x4000000) r3 = getpgid(0xffffffffffffffff) ioprio_set$pid(0x3, r3, 0x2000) r4 = socket$igmp6(0xa, 0x3, 0x2) bind$inet6(r4, &(0x7f0000000340)={0xa, 0x4e20, 0x9, @mcast2, 0x55f11421}, 0x1c) ioprio_set$pid(0x2, r3, 0x4000) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0), r0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x134, r5, 0x8, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x10c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcd}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbea}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffff8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40080}, 0x20000084) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f00000005c0)) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r0, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x9d54a9f5121746ca}, 0xc, &(0x7f0000000800)={&(0x7f0000000640)={0x1a4, r1, 0x10, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x1, 0x74}}}}, [@NL80211_ATTR_IE={0x7, 0x2a, [@challenge={0x10, 0x1, 0x7b}]}, @NL80211_ATTR_IE={0x6c, 0x2a, [@mesh_chsw={0x76, 0x6, {0x4, 0x7f, 0x11, 0x2}}, @erp={0x2a, 0x1}, @challenge={0x10, 0x1, 0x3f}, @perr={0x84, 0x2, {0x70}}, @erp={0x2a, 0x1, {0x1, 0x1, 0x1}}, @preq={0x82, 0x51, {{0x1, 0x1}, 0xf, 0x5, 0x9, @device_a, 0xbe3d, @void, 0x4, 0x4, 0x5, [{{0x1}, @device_a, 0x81}, {{}, @broadcast, 0x5}, {{0x1}, @device_b, 0xffffffff}, {{0x1}, @broadcast, 0x1}, {{0x1}, @device_a, 0x100}]}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0xef, 0xfa, "41dd1c5cafe2ac689f50a0423059a6d081a6161607ffab8476a5a3a3242cda1a93e5e02bb70f0d5abaf2e027cd2ce9f2b17fa3cd26536fbbaef85cee004eb5f2338a8ccf8a98113dae529301dfadaa139b0887635e441bd38365c850ae88ccfb4d95a22e3e103d158071605b69b49849943710d3135d7f5ed73f19a886dea0bc4b8d6588b467c2912ed0ad3c6caa44729160425c37097f77e1473a7db1f3d50e1aa3253d385c731de7b27ecda03efa51fc87f283d5980b1bd49474242cec1cfbe823c746a84117c8b1e66a57c810960f683db3ebee25c03ed37138b490923f80f69008eb5af66c37013548"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x57c7}], @fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0x10, 0xf9, "d1ade12b7ba9cc36a4af6b36"}]]}, 0x1a4}, 0x1, 0x0, 0x0, 0x40001}, 0x8008854) r6 = shmget(0x1, 0x4000, 0x800, &(0x7f0000ffc000/0x4000)=nil) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000880)={0x0, 0x0}, &(0x7f00000008c0)=0xc) r8 = getgid() fstat(r0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r6, 0x1, &(0x7f0000000980)={{0x0, r7, r8, r9, 0xee00, 0x10}, 0x3, 0x262e, 0x62f, 0x8001, r3, r3, 0x6}) connect$l2tp6(0xffffffffffffffff, &(0x7f00000009c0)={0xa, 0x0, 0x7c7f, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xf6c0, 0x2}, 0x20) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0x8, 0x1) pivot_root(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00') userfaultfd(0x1) r10 = semget(0x3, 0x2, 0x40) semctl$GETNCNT(r10, 0x4, 0xe, &(0x7f0000000b00)=""/64) r11 = openat$audio1(0xffffff9c, &(0x7f0000000b40), 0x1, 0x0) preadv(r11, &(0x7f0000001e80)=[{&(0x7f0000000b80)=""/253, 0xfd}, {&(0x7f0000000c80)=""/48, 0x30}, {&(0x7f0000000cc0)}, {&(0x7f0000000d00)=""/83, 0x53}, {&(0x7f0000000d80)=""/199, 0xc7}, {&(0x7f0000000e80)=""/4096, 0x1000}], 0x6, 0x4, 0x7) mknodat$null(0xffffffffffffff9c, &(0x7f0000001ec0)='./file1\x00', 0xe08, 0x103) fsetxattr$trusted_overlay_redirect(r11, &(0x7f0000001f00), &(0x7f0000001f40)='./file1\x00', 0x8, 0x1) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r4, 0x8982, &(0x7f0000001f80)={0x1, 'ip6gre0\x00'}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001fc0)) 11m54.778762366s ago: executing program 1 (id=4572): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000040)={0x1d, r2, 0x3, {0x0, 0x0, 0x4}}, 0x18) r3 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000140), 0x200041, 0x0) close(r3) openat$mixer(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) recvmsg$inet_nvme(r6, &(0x7f0000000300)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x5450, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f0000000000)={0x6, 0x2}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x1, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004) r8 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) r9 = socket(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r9, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)={&(0x7f0000000e00)={0x20, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NOTIFY_RADAR(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="99c310bb0ab028cff174887cdc2c0000900d952411022fe288b7fcc20100", @ANYRES16=r8, @ANYBLOB="08032bbd7000fbdbdf258600000008000300", @ANYRES32=r10, @ANYBLOB="0800260025170000050019010b000000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000000) write$FUSE_NOTIFY_RETRIEVE(r9, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x5, 0x5, 0xef}}, 0x30) 11m52.859809034s ago: executing program 1 (id=4573): timer_create(0x0, &(0x7f0000000080)={0x0, 0x11, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40080c1) r2 = socket(0x2b, 0x1, 0x1) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4, 0x0, @local, 0x2}, 0x1c) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003440)) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x8c0}, 0x18000) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x4}, 0x20000051) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r5, r4, 0x0) recvmmsg$unix(r6, &(0x7f0000005f80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) ioctl$TUNSETQUEUE(r7, 0x5452, &(0x7f0000000180)={'ip6_vti0\x00'}) syz_clone(0x4810000, &(0x7f00000001c0)="f998277308db7803e67874a1c0af1f55f36bf8f51ae17d7e9d1e68e0d7961d05dccfcba6372b4950ef9fec007b6ba4315424c1abab00d8d566a6f5b6e117c9dcca212779c1b8120a9e41d7b30135b2fc5b3627810b4d44a12e", 0x59, &(0x7f0000000240), &(0x7f0000000300), &(0x7f0000000380)="f2ccf42f09327d56a9b2592aed20097d8175c0092e3f0546a5c514b9e93d54e679348b0b4b10d64e80baa61b2ff1c64f52ef209e6f952da78cf9c0578bafe7d09f28db8f4d72249bcffb72ed8b3200eb4188c622cc114269c66cf41a9f9b251973ea5b719c5d0e") setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0), 0x4) 11m37.209607979s ago: executing program 1 (id=4585): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r1) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/136, 0x88}], 0x1, 0x9, 0x1) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010026bd70003c0200000200000008000100", @ANYRES32=r3], 0x1c}}, 0x0) 11m32.259980463s ago: executing program 1 (id=4586): r0 = syz_usb_connect(0x5, 0x3f, &(0x7f0000000040)=ANY=[@ANYBLOB="11010000733336088dee1adb23610000000109022d0001100000000904000003fe03010009cd8d1f00020000000905050200de7e001009058b1e20"], 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000540)={0x44, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x40045b0a, &(0x7f0000000700)) 11m30.221162978s ago: executing program 1 (id=4587): r0 = socket$alg(0x26, 0x5, 0x0) r1 = fsopen(&(0x7f0000000100)='cifs\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)) sched_setscheduler(0x0, 0x2, &(0x7f0000000480)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbee6, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000040)='source', &(0x7f0000000380)='//\xf2b\x06\b\xba\xdfXo\xdc\xea\x95\x9a\x82\x10\x97W\x8f7\x98\x9b/Q9\xf9\rmD\x94)U\xdb\x15X.I\n}\xf3\x9d\xe4_\x05\x9cqf4I^#b?9\xde\xafu\'\x83L\xe0\x97\xe1n_\xa4%\xb1\x97\x93\xafv\xce\x14/8/\x00\x00\xa7\xfb\xf4\x84\x1fA\xeas^\xef\xa2\x85\xa3!\xfb\x93\xd7R\xab2\x1eW\xe9h\x9b\xf7ul\xf9D\xd4\x82X5\x13\xaa\x87\xf9\xba\xa9m\x14\x14R_\x9a\\>4\xce\x8e_#\xf8D\xb1\xdep\x01\xcc:\xa6\xc5n\xeb\xab\xf70\x99\xef\x8b0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000040)='source', &(0x7f0000000380)='//\xf2b\x06\b\xba\xdfXo\xdc\xea\x95\x9a\x82\x10\x97W\x8f7\x98\x9b/Q9\xf9\rmD\x94)U\xdb\x15X.I\n}\xf3\x9d\xe4_\x05\x9cqf4I^#b?9\xde\xafu\'\x83L\xe0\x97\xe1n_\xa4%\xb1\x97\x93\xafv\xce\x14/8/\x00\x00\xa7\xfb\xf4\x84\x1fA\xeas^\xef\xa2\x85\xa3!\xfb\x93\xd7R\xab2\x1eW\xe9h\x9b\xf7ul\xf9D\xd4\x82X5\x13\xaa\x87\xf9\xba\xa9m\x14\x14R_\x9a\\>4\xce\x8e_#\xf8D\xb1\xdep\x01\xcc:\xa6\xc5n\xeb\xab\xf70\x99\xef\x8b0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0xd, 0xc, "41a0a18ef515814e914ddb349f24d2d4fdf2029d4ea0d5c318c72a7f44575de5928931313688f80c00e226d5f9de71854d921504681829ab9aea7bb39083bd3e", "b52d2e8698032804ba481f878cc65fac11ec880364f7acb23df30827152197f46a9f88676e0b06b603b41a00352efa0e1e53c5153c1a7cc757f3186cc14548be", "8b65cc03d13d051bee0900000006000800f15bc5104e6a8500000055b2a07060", [0x895, 0xcbd]}) 29.619267064s ago: executing program 0 (id=4909): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x2) write$UHID_INPUT(r3, &(0x7f0000000000)={0x9, {"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", 0x1000}}, 0x1006) 25.566977874s ago: executing program 0 (id=4912): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fgetxattr(r1, 0x0, 0x0, 0x0) setsockopt$MRT6_TABLE(0xffffffffffffffff, 0x29, 0xcf, &(0x7f0000000380)=0xff, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = open(&(0x7f0000000080)='./bus\x00', 0x147842, 0x1) preadv2(r4, &(0x7f0000000040)=[{&(0x7f0000002880)=""/4105, 0xfffffdef}], 0x100000000000000a, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000200), 0x2018081, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) setresgid(0xee00, 0xee01, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4000008}, 0x20000044) setgroups(0x0, 0x0) setuid(0xee00) shmget$private(0x0, 0x4000, 0x800, &(0x7f0000007000/0x4000)=nil) 15.559697334s ago: executing program 2 (id=4920): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r1, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000001400000008000a00fc00000018000180140002006e657464657673696d300000000000000800050000fcffff08000900fc000000080011000700000008000e00800000000800", @ANYRES32=r0], 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x0) 15.141907505s ago: executing program 2 (id=4921): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x35, &(0x7f0000000040), 0x4) 7.491602072s ago: executing program 0 (id=4922): mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) syz_fuse_handle_req(r0, &(0x7f0000006280)="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", 0x2000, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)={0x90, 0x0, 0x0, {0x4, 0x10000000000, 0x0, 0x5, 0x0, 0x0, {0x0, 0x1, 0x101, 0x8000000000000000, 0x80000000000, 0x0, 0x10, 0x4, 0x0, 0x2000, 0x2}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f0000000380)={0x50, 0x0, 0x0, {0x7, 0x27, 0x0, 0x801001a, 0x66d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000008280)="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", 0x2000, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d00)={0x90, 0x0, 0x4, {0x3, 0x0, 0x0, 0x100000000, 0xf, 0x0, {0x3, 0x20000, 0x0, 0x4, 0x0, 0x7ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) rename(&(0x7f0000000100)='./file0/../file0/file0\x00', &(0x7f00000000c0)='./file0/../file0/file0\x00') r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4}]}) socket$inet_mptcp(0x2, 0x1, 0x106) close_range(r1, 0xffffffffffffffff, 0x0) 4.25579288s ago: executing program 0 (id=4923): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000003c0), 0x0, 0x20000000) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x5, &(0x7f0000000080)=""/26, &(0x7f0000000000)=0x1a) recvmmsg(r0, &(0x7f0000003480)=[{{&(0x7f0000000200)=@l2tp={0x2, 0x0, @empty}, 0x80, &(0x7f0000000180)=[{&(0x7f0000002480)=""/233, 0xe9}, {&(0x7f00000004c0)=""/189, 0xbd}, {&(0x7f0000001480)=""/4096, 0x1000}], 0x3, &(0x7f0000004000)=""/4106, 0x100a}, 0x5}, {{&(0x7f0000000580)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000280)=""/12, 0xc}], 0x1, &(0x7f0000000940)=""/200, 0xc8}, 0x3}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000a40)=""/75, 0x4b}], 0x1, &(0x7f0000000ac0)=""/209, 0xd1}, 0x400}, {{0x0, 0x0, 0x0}, 0x3ff}], 0x4, 0x40010001, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x1, 0x3, &(0x7f0000002580)=ANY=[@ANYBLOB], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x35, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x34, &(0x7f0000000040)=r3, 0x4) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000002, 0x10, 0xffffffffffffffff, 0x2000) io_uring_setup(0x191a, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000007, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r4 = socket$xdp(0x2c, 0x3, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x5a) r6 = accept4(r5, 0x0, 0x0, 0x0) write(r6, &(0x7f0000000040)="cb", 0xfffffdef) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, &(0x7f00000000c0)='rw\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000f40)=@mangle={'mangle\x00', 0x44, 0x6, 0x4e0, 0x130, 0x0, 0x200, 0x398, 0x98, 0x448, 0x448, 0x448, 0x448, 0x448, 0x6, 0x0, {[{{@ip={@local, @broadcast, 0x0, 0x0, 'geneve1\x00', 'ip6gre0\x00', {0xff}, {}, 0x0, 0x0, 0x18}, 0x0, 0x70, 0x98, 0x0, {0x0, 0x2000000}}, @inet=@DSCP={0x28}}, {{@ip={@multicast2, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @private=0xa010101, 0x0, 0x0, 'dvmrp0\x00', 'nr0\x00'}, 0x0, 0xa8, 0xd0, 0x0, {}, [@common=@unspec=@time={{0x38}, {0xffffffff, 0x8000, 0x8d84, 0xcafc, 0xffffff8e, 0x70, 0x1}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @local, 0x0, 0x0, 'geneve0\x00', 'veth1_to_team\x00', {}, {}, 0x0, 0x0, 0x3}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x3, 0x8, @ipv4=@multicast1, 0x5e20}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) 477.488105ms ago: executing program 2 (id=4924): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000880)=ANY=[@ANYBLOB="700200001300290a000000000000000007000000", @ANYRES32=r1, @ANYBLOB="000000000000000008001a80100003800c0005800800000000000000100003803000018005000c000000000014000500714abbd25404007cbbf6efb226f19bf90d0002003a288e5e5b5b5a40000000006000078014000400293a02149f3b75a67093c28fd6f55a2314000400e48f01e49713f0c2d839f940d9f088d80500060000000000130002006272696467655f696c6176655f30000007000200293a00000500060000000000080001000000000018000180140004004d2906d0880fc8acc30fe2020f9849675000018014000500a1085e7df341b9dc3d8008a2fe5bdaad140004009c7e472c916020fe41bcc5aa8f56c9471400050080ab8be51421cfa3c9e5cbfe8217e0af080001000000000008000100000000006000018005000600000000000500060000000000080001000000000005000600000000000c00020073797a746e6c30000800010000000000130002006272696467655f736c6176655f30000014000500e078d277f38ed3a40a448f3f6b6763e8e0000c80080025"], 0x270}}, 0x0) 338.725813ms ago: executing program 2 (id=4925): r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x10) close(r0) 160.784402ms ago: executing program 2 (id=4926): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000440)=@newqdisc={0x5c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xffe0, 0x43dcdf1fd8cdb755}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x2c, 0x2, {{0x3, 0x80000000, 0x6361, 0x5, 0x1, 0x6}, [@TCA_NETEM_CORR={0x10, 0x1, {0x0, 0xe412, 0x1}}]}}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) 466.221µs ago: executing program 0 (id=4927): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r2, 0x541c, &(0x7f00000000c0)={0x2, {0x2, 0x0, 0x300, 0x0, 0x8, 0x300}}) 0s ago: executing program 2 (id=4928): r0 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi3\x00', 0x2000, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000400)={'8255\x00', [0xfffffffb, 0x80000002, 0x2, 0x100000, 0x88d7, 0x8f, 0xfffffffd, 0xf, 0x2, 0xffffffff, 0x200, 0xfff, 0x344, 0x0, 0x0, 0x200, 0x9, 0x3, 0x84, 0xe, 0x0, 0x0, 0x80, 0x7ff, 0x4, 0xffffffff, 0xb0c3, 0x807df, 0x8, 0xf3, 0x1]}) kernel console output (not intermixed with test programs): 4091][ T31] audit: type=1400 audit(2660.440:31255): avc: denied { read write } for pid=22104 comm="syz.0.4738" name="admmidi2" dev="devtmpfs" ino=743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2660.569170][ T31] audit: type=1400 audit(2660.440:31256): avc: denied { read write open } for pid=22104 comm="syz.0.4738" path="/dev/admmidi2" dev="devtmpfs" ino=743 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2660.606745][ T31] audit: type=1400 audit(2660.490:31257): avc: denied { ioctl } for pid=22104 comm="syz.0.4738" path="/dev/admmidi2" dev="devtmpfs" ino=743 ioctlcmd=0x5710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2660.664422][ T31] audit: type=1400 audit(2660.550:31258): avc: denied { read } for pid=22099 comm="syz.2.4736" name="timer" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2660.758324][ T31] audit: type=1400 audit(2660.640:31259): avc: denied { read open } for pid=22099 comm="syz.2.4736" path="/dev/snd/timer" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2660.765096][ T31] audit: type=1400 audit(2660.650:31260): avc: denied { ioctl } for pid=22099 comm="syz.2.4736" path="/dev/snd/timer" dev="devtmpfs" ino=717 ioctlcmd=0x5402 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2661.120662][ T31] audit: type=1400 audit(2660.960:31261): avc: denied { read write } for pid=22107 comm="syz.0.4739" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2662.714127][T12699] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 2662.970948][T12699] usb 1-1: Using ep0 maxpacket: 8 [ 2663.017248][T12699] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 2663.018430][T12699] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 2663.019381][T12699] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 2663.020391][T12699] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 2663.021422][T12699] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 2663.024664][T12699] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 2663.033105][T12699] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2663.268565][T12699] usb 1-1: usb_control_msg returned -32 [ 2663.271107][T12699] usbtmc 1-1:16.0: can't read capabilities [ 2666.788947][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 2666.789437][ T31] audit: type=1400 audit(2666.670:31291): avc: denied { map_create } for pid=22107 comm="syz.0.4739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2666.789685][ T31] audit: type=1400 audit(2666.670:31292): avc: denied { map_read map_write } for pid=22107 comm="syz.0.4739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2666.799885][ T31] audit: type=1400 audit(2666.680:31293): avc: denied { prog_load } for pid=22107 comm="syz.0.4739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2666.800423][ T31] audit: type=1400 audit(2666.680:31294): avc: denied { bpf } for pid=22107 comm="syz.0.4739" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2666.810006][ T31] audit: type=1400 audit(2666.690:31295): avc: denied { prog_load } for pid=22107 comm="syz.0.4739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2666.815877][ T31] audit: type=1400 audit(2666.700:31296): avc: denied { bpf } for pid=22107 comm="syz.0.4739" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2666.821531][ T31] audit: type=1400 audit(2666.700:31297): avc: denied { perfmon } for pid=22107 comm="syz.0.4739" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2668.230115][ T31] audit: type=1400 audit(2668.110:31298): avc: denied { read write } for pid=22124 comm="syz.2.4740" name="rdma_cm" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2668.239223][ T31] audit: type=1400 audit(2668.110:31299): avc: denied { read write open } for pid=22124 comm="syz.2.4740" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2668.247535][ T31] audit: type=1400 audit(2668.130:31300): avc: denied { prog_load } for pid=22124 comm="syz.2.4740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2675.351369][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 2675.353851][ T31] audit: type=1400 audit(2675.230:31303): avc: denied { allowed } for pid=22128 comm="syz.2.4741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2675.361606][ T31] audit: type=1400 audit(2675.240:31304): avc: denied { create } for pid=22128 comm="syz.2.4741" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2675.364874][ T31] audit: type=1400 audit(2675.240:31305): avc: denied { map } for pid=22128 comm="syz.2.4741" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55040 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2675.365450][ T31] audit: type=1400 audit(2675.250:31306): avc: denied { read write } for pid=22128 comm="syz.2.4741" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55040 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2675.375558][ T31] audit: type=1400 audit(2675.260:31307): avc: denied { map } for pid=22128 comm="syz.2.4741" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55040 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2675.376096][ T31] audit: type=1400 audit(2675.260:31308): avc: denied { read write } for pid=22128 comm="syz.2.4741" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55040 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2675.398074][ T31] audit: type=1400 audit(2675.280:31309): avc: denied { read } for pid=22128 comm="syz.2.4741" name="seq" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2675.398699][ T31] audit: type=1400 audit(2675.280:31310): avc: denied { read open } for pid=22128 comm="syz.2.4741" path="/dev/snd/seq" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2675.401457][ T31] audit: type=1400 audit(2675.280:31311): avc: denied { ioctl } for pid=22128 comm="syz.2.4741" path="/dev/snd/seq" dev="devtmpfs" ino=718 ioctlcmd=0x5320 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2675.415388][ T31] audit: type=1400 audit(2675.300:31312): avc: denied { ioctl } for pid=22128 comm="syz.2.4741" path="/dev/snd/seq" dev="devtmpfs" ino=718 ioctlcmd=0x534c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2675.914090][T12699] usb 1-1: USB disconnect, device number 21 [ 2677.862601][T20661] usb 1-1: new high-speed USB device number 22 using dummy_hcd [ 2678.022744][T20661] usb 1-1: Using ep0 maxpacket: 32 [ 2678.033891][T20661] usb 1-1: New USB device found, idVendor=0b89, idProduct=0007, bcdDevice=ef.64 [ 2678.034288][T20661] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2678.047363][T20661] usb 1-1: config 0 descriptor?? [ 2678.303289][T17883] usb 1-1: USB disconnect, device number 22 [ 2683.397024][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 2683.397533][ T31] audit: type=1400 audit(2683.280:31354): avc: denied { map_create } for pid=22181 comm="syz.0.4750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2683.402373][ T31] audit: type=1400 audit(2683.280:31355): avc: denied { map_read map_write } for pid=22181 comm="syz.0.4750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2683.412220][ T31] audit: type=1400 audit(2683.290:31356): avc: denied { map_create } for pid=22181 comm="syz.0.4750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2683.417401][ T31] audit: type=1400 audit(2683.300:31357): avc: denied { module_request } for pid=22181 comm="syz.0.4750" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2685.267016][ T31] audit: type=1400 audit(2685.150:31358): avc: denied { create } for pid=22185 comm="syz.0.4751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2685.274763][ T31] audit: type=1400 audit(2685.160:31359): avc: denied { write } for pid=22185 comm="syz.0.4751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2685.289147][ T31] audit: type=1400 audit(2685.170:31360): avc: denied { module_request } for pid=22185 comm="syz.0.4751" kmod="net-pf-16-proto-16-family-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2685.504553][ T31] audit: type=1400 audit(2685.390:31361): avc: denied { read } for pid=22185 comm="syz.0.4751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2685.534832][ T31] audit: type=1400 audit(2685.420:31362): avc: denied { ioctl } for pid=22185 comm="syz.0.4751" path="socket:[55602]" dev="sockfs" ino=55602 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2685.538254][ T31] audit: type=1400 audit(2685.420:31363): avc: denied { module_request } for pid=22185 comm="syz.0.4751" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2688.049641][T17883] usb 1-1: new high-speed USB device number 23 using dummy_hcd [ 2688.273934][T17883] usb 1-1: New USB device found, idVendor=8086, idProduct=0110, bcdDevice=bf.ad [ 2688.294907][T17883] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2688.306654][T17883] usb 1-1: config 0 descriptor?? [ 2688.522582][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 2688.522980][ T31] audit: type=1400 audit(2688.400:31382): avc: denied { ioctl } for pid=22197 comm="syz.0.4755" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2691.610877][ T31] audit: type=1400 audit(2691.490:31383): avc: denied { create } for pid=22207 comm="syz.2.4757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2691.627846][ T31] audit: type=1400 audit(2691.510:31384): avc: denied { create } for pid=22207 comm="syz.2.4757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2691.636933][ T31] audit: type=1400 audit(2691.520:31385): avc: denied { setopt } for pid=22207 comm="syz.2.4757" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2691.646184][ T31] audit: type=1400 audit(2691.530:31386): avc: denied { setopt } for pid=22207 comm="syz.2.4757" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2691.646879][T22208] syz_tun: entered allmulticast mode [ 2691.650332][ T31] audit: type=1400 audit(2691.530:31387): avc: denied { setopt } for pid=22207 comm="syz.2.4757" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2691.666100][ T31] audit: type=1400 audit(2691.550:31388): avc: denied { create } for pid=22207 comm="syz.2.4757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2691.670678][ T31] audit: type=1400 audit(2691.550:31389): avc: denied { setopt } for pid=22207 comm="syz.2.4757" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2691.678430][T22207] syz_tun: left allmulticast mode [ 2691.749494][ T31] audit: type=1400 audit(2691.630:31390): avc: denied { allowed } for pid=22209 comm="syz.2.4758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2691.758976][ T31] audit: type=1400 audit(2691.640:31391): avc: denied { create } for pid=22209 comm="syz.2.4758" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2695.602424][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 2695.602912][ T31] audit: type=1400 audit(2695.480:31401): avc: denied { ioctl } for pid=22197 comm="syz.0.4755" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2698.390332][ T31] audit: type=1400 audit(2698.270:31402): avc: denied { execute } for pid=22214 comm="syz.2.4760" name="file1" dev="tmpfs" ino=433 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2698.403720][ T31] audit: type=1400 audit(2698.290:31403): avc: denied { execute_no_trans } for pid=22214 comm="syz.2.4760" path="/82/file1" dev="tmpfs" ino=433 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2698.547119][T21098] usb 1-1: USB disconnect, device number 23 [ 2698.851368][ T31] audit: type=1400 audit(2698.730:31404): avc: denied { write } for pid=22227 comm="syz.0.4762" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2698.852458][ T31] audit: type=1400 audit(2698.730:31405): avc: denied { open } for pid=22227 comm="syz.0.4762" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2698.865696][ T31] audit: type=1400 audit(2698.750:31406): avc: denied { read write } for pid=22227 comm="syz.0.4762" name="vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2698.867732][ T31] audit: type=1400 audit(2698.750:31407): avc: denied { read write open } for pid=22227 comm="syz.0.4762" path="/dev/vhost-net" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2698.880635][ T31] audit: type=1400 audit(2698.760:31408): avc: denied { ioctl } for pid=22227 comm="syz.0.4762" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2698.895734][ T31] audit: type=1400 audit(2698.780:31409): avc: denied { create } for pid=22227 comm="syz.0.4762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2698.911653][ T31] audit: type=1400 audit(2698.790:31410): avc: denied { ioctl } for pid=22227 comm="syz.0.4762" path="/dev/vhost-net" dev="devtmpfs" ino=707 ioctlcmd=0xaf11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2701.336095][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 2701.342486][ T31] audit: type=1400 audit(2701.100:31412): avc: denied { map_create } for pid=22227 comm="syz.0.4762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2701.405099][ T31] audit: type=1400 audit(2701.140:31413): avc: denied { map_read map_write } for pid=22227 comm="syz.0.4762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2701.446649][ T31] audit: type=1400 audit(2701.210:31414): avc: denied { module_request } for pid=22227 comm="syz.0.4762" kmod="fs-autofs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2709.623333][ T31] audit: type=1400 audit(2709.500:31415): avc: denied { write } for pid=22234 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2709.637142][ T31] audit: type=1400 audit(2709.520:31416): avc: denied { open } for pid=22234 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2709.702839][ T31] audit: type=1400 audit(2709.580:31417): avc: denied { search } for pid=22234 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2709.726902][ T31] audit: type=1400 audit(2709.600:31418): avc: denied { search } for pid=22234 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2709.727463][ T31] audit: type=1400 audit(2709.600:31419): avc: denied { search } for pid=22234 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2709.727767][ T31] audit: type=1400 audit(2709.600:31420): avc: denied { search } for pid=22234 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2709.842348][ T31] audit: type=1400 audit(2709.720:31421): avc: denied { search } for pid=22235 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2709.853049][ T31] audit: type=1400 audit(2709.730:31422): avc: denied { search } for pid=22235 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2709.854930][ T31] audit: type=1400 audit(2709.730:31423): avc: denied { search } for pid=22235 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2709.857259][ T31] audit: type=1400 audit(2709.730:31424): avc: denied { read open } for pid=22235 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2714.672824][ T31] kauditd_printk_skb: 130 callbacks suppressed [ 2714.673247][ T31] audit: type=1400 audit(2714.560:31555): avc: denied { watch } for pid=22244 comm="syz.2.4765" path="/84" dev="tmpfs" ino=439 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2714.835888][ T31] audit: type=1400 audit(2714.720:31556): avc: denied { prog_load } for pid=22249 comm="syz.2.4766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2714.855152][ T31] audit: type=1400 audit(2714.740:31557): avc: denied { bpf } for pid=22249 comm="syz.2.4766" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2714.855432][ T31] audit: type=1400 audit(2714.740:31558): avc: denied { perfmon } for pid=22249 comm="syz.2.4766" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2714.855748][ T31] audit: type=1400 audit(2714.740:31559): avc: denied { perfmon } for pid=22249 comm="syz.2.4766" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2714.855948][ T31] audit: type=1400 audit(2714.740:31560): avc: denied { bpf } for pid=22249 comm="syz.2.4766" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2714.937336][ T31] audit: type=1400 audit(2714.820:31561): avc: denied { execmem } for pid=22251 comm="syz.2.4767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2716.818058][ T31] audit: type=1400 audit(2716.700:31562): avc: denied { prog_load } for pid=22251 comm="syz.2.4767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2716.818585][ T31] audit: type=1400 audit(2716.700:31563): avc: denied { bpf } for pid=22251 comm="syz.2.4767" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2716.822397][ T31] audit: type=1400 audit(2716.700:31564): avc: denied { perfmon } for pid=22251 comm="syz.2.4767" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2722.538174][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 2722.538639][ T31] audit: type=1400 audit(2722.420:31570): avc: denied { prog_load } for pid=22255 comm="syz.0.4768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2722.545563][ T31] audit: type=1400 audit(2722.430:31571): avc: denied { bpf } for pid=22255 comm="syz.0.4768" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2722.556957][ T31] audit: type=1400 audit(2722.440:31572): avc: denied { prog_load } for pid=22255 comm="syz.0.4768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2722.559279][ T31] audit: type=1400 audit(2722.440:31573): avc: denied { bpf } for pid=22255 comm="syz.0.4768" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2722.569366][ T31] audit: type=1400 audit(2722.450:31574): avc: denied { perfmon } for pid=22255 comm="syz.0.4768" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2722.571247][ T31] audit: type=1400 audit(2722.450:31575): avc: denied { bpf } for pid=22255 comm="syz.0.4768" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2722.583577][ T31] audit: type=1400 audit(2722.470:31576): avc: denied { bpf } for pid=22255 comm="syz.0.4768" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2722.585434][ T31] audit: type=1400 audit(2722.470:31577): avc: denied { perfmon } for pid=22255 comm="syz.0.4768" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2722.601220][ T31] audit: type=1400 audit(2722.480:31578): avc: denied { bpf } for pid=22255 comm="syz.0.4768" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2722.601475][ T31] audit: type=1400 audit(2722.480:31579): avc: denied { prog_run } for pid=22255 comm="syz.0.4768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2730.706510][ T31] audit: type=1400 audit(2730.590:31580): avc: denied { read write } for pid=22262 comm="syz.2.4770" name="vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2730.707062][ T31] audit: type=1400 audit(2730.590:31581): avc: denied { read write open } for pid=22262 comm="syz.2.4770" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2730.710667][ T31] audit: type=1400 audit(2730.590:31582): avc: denied { ioctl } for pid=22262 comm="syz.2.4770" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2730.734632][ T31] audit: type=1400 audit(2730.600:31583): avc: denied { ioctl } for pid=22262 comm="syz.2.4770" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 ioctlcmd=0xaf22 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2730.739578][ T31] audit: type=1400 audit(2730.620:31584): avc: denied { read write } for pid=22262 comm="syz.2.4770" name="vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2730.740011][ T31] audit: type=1400 audit(2730.620:31585): avc: denied { open } for pid=22262 comm="syz.2.4770" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2730.746760][ T31] audit: type=1400 audit(2730.630:31586): avc: denied { ioctl } for pid=22262 comm="syz.2.4770" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2730.809997][ T31] audit: type=1400 audit(2730.690:31587): avc: denied { prog_load } for pid=22266 comm="syz.2.4771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2730.827851][ T31] audit: type=1400 audit(2730.710:31588): avc: denied { bpf } for pid=22266 comm="syz.2.4771" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2730.828170][ T31] audit: type=1400 audit(2730.710:31589): avc: denied { perfmon } for pid=22266 comm="syz.2.4771" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2742.374904][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 2742.375204][ T31] audit: type=1400 audit(2742.260:31609): avc: denied { read } for pid=22278 comm="syz.2.4774" dev="nsfs" ino=4026532963 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2742.379197][ T31] audit: type=1400 audit(2742.260:31610): avc: denied { read open } for pid=22278 comm="syz.2.4774" path="net:[4026532963]" dev="nsfs" ino=4026532963 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2742.386735][ T31] audit: type=1400 audit(2742.270:31611): avc: denied { create } for pid=22278 comm="syz.2.4774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2742.392146][ T31] audit: type=1400 audit(2742.270:31612): avc: denied { write } for pid=22278 comm="syz.2.4774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2742.393522][ T31] audit: type=1400 audit(2742.280:31613): avc: denied { read } for pid=22278 comm="syz.2.4774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2742.401573][ T31] audit: type=1400 audit(2742.280:31614): avc: denied { prog_load } for pid=22278 comm="syz.2.4774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2742.402058][ T31] audit: type=1400 audit(2742.280:31615): avc: denied { bpf } for pid=22278 comm="syz.2.4774" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2742.411636][ T31] audit: type=1400 audit(2742.290:31616): avc: denied { prog_load } for pid=22278 comm="syz.2.4774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2742.420617][ T31] audit: type=1400 audit(2742.300:31617): avc: denied { bpf } for pid=22278 comm="syz.2.4774" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2742.420961][ T31] audit: type=1400 audit(2742.300:31618): avc: denied { perfmon } for pid=22278 comm="syz.2.4774" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2744.029837][T22289] comedi: valid board names for 8255 driver are: [ 2744.030249][T22289] 8255 [ 2744.030552][T22289] comedi: valid board names for vmk80xx driver are: [ 2744.030625][T22289] vmk80xx [ 2744.030678][T22289] comedi: valid board names for usbduxsigma driver are: [ 2744.030748][T22289] usbduxsigma [ 2744.030802][T22289] comedi: valid board names for usbduxfast driver are: [ 2744.030854][T22289] usbduxfast [ 2744.030902][T22289] comedi: valid board names for usbdux driver are: [ 2744.030948][T22289] usbdux [ 2744.031019][T22289] comedi: valid board names for ni6501 driver are: [ 2744.031082][T22289] ni6501 [ 2744.031129][T22289] comedi: valid board names for dt9812 driver are: [ 2744.031176][T22289] dt9812 [ 2744.031220][T22289] comedi: valid board names for ni_labpc_cs driver are: [ 2744.031266][T22289] ni_labpc_cs [ 2744.031312][T22289] comedi: valid board names for ni_daq_700 driver are: [ 2744.031355][T22289] ni_daq_700 [ 2744.031400][T22289] comedi: valid board names for labpc_pci driver are: [ 2744.031448][T22289] labpc_pci [ 2744.031491][T22289] comedi: valid board names for adl_pci9118 driver are: [ 2744.031551][T22289] pci9118dg [ 2744.031620][T22289] pci9118hg [ 2744.031664][T22289] pci9118hr [ 2744.033601][T22289] comedi: valid board names for 8255_pci driver are: [ 2744.033734][T22289] 8255_pci [ 2744.033792][T22289] comedi: valid board names for comedi_parport driver are: [ 2744.033843][T22289] comedi_parport [ 2744.033887][T22289] comedi: valid board names for comedi_test driver are: [ 2744.033935][T22289] comedi_test [ 2744.033983][T22289] comedi: valid board names for comedi_bond driver are: [ 2744.034029][T22289] comedi_bond [ 2747.682394][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 2747.682704][ T31] audit: type=1400 audit(2747.560:31639): avc: denied { create } for pid=22302 comm="syz.0.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2747.723412][ T31] audit: type=1400 audit(2747.610:31640): avc: denied { write } for pid=22302 comm="syz.0.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2747.734658][ T31] audit: type=1400 audit(2747.620:31641): avc: denied { module_request } for pid=22302 comm="syz.0.4783" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2747.968637][ T31] audit: type=1400 audit(2747.850:31642): avc: denied { write } for pid=22302 comm="syz.0.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2747.969137][ T31] audit: type=1400 audit(2747.850:31643): avc: denied { module_request } for pid=22302 comm="syz.0.4783" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2748.525052][ T31] audit: type=1400 audit(2748.410:31644): avc: denied { execmem } for pid=22306 comm="syz.0.4784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2753.253705][ T31] audit: type=1400 audit(2753.140:31645): avc: denied { allowed } for pid=22306 comm="syz.0.4784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2756.295465][ T31] audit: type=1400 audit(2756.180:31646): avc: denied { allowed } for pid=22310 comm="syz.2.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2756.300120][ T31] audit: type=1400 audit(2756.180:31647): avc: denied { sqpoll } for pid=22310 comm="syz.2.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2756.306846][ T31] audit: type=1400 audit(2756.190:31648): avc: denied { create } for pid=22310 comm="syz.2.4785" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2756.309243][ T31] audit: type=1400 audit(2756.190:31649): avc: denied { map } for pid=22310 comm="syz.2.4785" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55752 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2756.314042][ T31] audit: type=1400 audit(2756.200:31650): avc: denied { read write } for pid=22310 comm="syz.2.4785" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55752 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2756.321004][ T31] audit: type=1400 audit(2756.200:31651): avc: denied { map } for pid=22310 comm="syz.2.4785" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55752 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2756.321422][ T31] audit: type=1400 audit(2756.200:31652): avc: denied { read write } for pid=22310 comm="syz.2.4785" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55752 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2756.346634][ T31] audit: type=1400 audit(2756.230:31653): avc: denied { execmem } for pid=22310 comm="syz.2.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2758.697815][ T31] audit: type=1400 audit(2758.580:31654): avc: denied { create } for pid=22310 comm="syz.2.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2758.707368][ T31] audit: type=1400 audit(2758.590:31655): avc: denied { write } for pid=22310 comm="syz.2.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2758.733460][ T31] audit: type=1400 audit(2758.620:31656): avc: denied { module_request } for pid=22310 comm="syz.2.4785" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2760.219645][ T31] audit: type=1400 audit(2760.100:31657): avc: denied { execmem } for pid=22316 comm="syz.0.4786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2761.329676][ T31] audit: type=1400 audit(2761.210:31658): avc: denied { read } for pid=22316 comm="syz.0.4786" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2761.330047][ T31] audit: type=1400 audit(2761.210:31659): avc: denied { open } for pid=22316 comm="syz.0.4786" path="net:[4026532651]" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2761.337143][ T31] audit: type=1400 audit(2761.220:31660): avc: denied { create } for pid=22316 comm="syz.0.4786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2761.345428][ T31] audit: type=1400 audit(2761.230:31661): avc: denied { read } for pid=22316 comm="syz.0.4786" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2761.345815][ T31] audit: type=1400 audit(2761.230:31662): avc: denied { open } for pid=22316 comm="syz.0.4786" path="net:[4026532651]" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2761.356360][ T31] audit: type=1400 audit(2761.240:31663): avc: denied { create } for pid=22316 comm="syz.0.4786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2764.216872][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 2764.222976][ T31] audit: type=1400 audit(2764.100:31679): avc: denied { read write } for pid=22325 comm="syz.0.4789" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2764.235676][ T31] audit: type=1400 audit(2764.110:31680): avc: denied { read write open } for pid=22325 comm="syz.0.4789" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2764.239511][ T31] audit: type=1400 audit(2764.120:31681): avc: denied { mounton } for pid=22325 comm="syz.0.4789" path="/87/file0" dev="tmpfs" ino=461 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2764.251018][ T31] audit: type=1400 audit(2764.130:31682): avc: denied { mount } for pid=22325 comm="syz.0.4789" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2764.657205][ T31] audit: type=1400 audit(2764.540:31683): avc: denied { prog_load } for pid=22328 comm="syz.2.4790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2764.657760][ T31] audit: type=1400 audit(2764.540:31684): avc: denied { bpf } for pid=22328 comm="syz.2.4790" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2764.666572][ T31] audit: type=1400 audit(2764.550:31685): avc: denied { perfmon } for pid=22328 comm="syz.2.4790" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2764.688126][ T31] audit: type=1400 audit(2764.570:31686): avc: denied { execmem } for pid=22328 comm="syz.2.4790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2765.795707][ T31] audit: type=1326 audit(2765.680:31687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22325 comm="syz.0.4789" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x0 [ 2766.816718][ T31] audit: type=1400 audit(2766.700:31688): avc: denied { prog_load } for pid=22328 comm="syz.2.4790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2768.522683][T17883] usb 1-1: new high-speed USB device number 24 using dummy_hcd [ 2768.672295][T17883] usb 1-1: Using ep0 maxpacket: 8 [ 2768.731134][T17883] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ea [ 2768.731529][T17883] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2768.732332][T17883] usb 1-1: Product: syz [ 2768.732418][T17883] usb 1-1: Manufacturer: syz [ 2768.732498][T17883] usb 1-1: SerialNumber: syz [ 2768.757254][T17883] usb 1-1: config 0 descriptor?? [ 2772.584015][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 2772.590452][ T31] audit: type=1400 audit(2772.470:31709): avc: denied { ioctl } for pid=22339 comm="syz.0.4792" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2776.055929][ T31] audit: type=1400 audit(2775.940:31710): avc: denied { ioctl } for pid=22339 comm="syz.0.4792" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2777.801122][ T31] audit: type=1400 audit(2777.680:31711): avc: denied { name_bind } for pid=22350 comm="syz.2.4793" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2777.805888][ T31] audit: type=1400 audit(2777.690:31712): avc: denied { node_bind } for pid=22350 comm="syz.2.4793" saddr=224.0.0.1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2778.047544][ T31] audit: type=1400 audit(2777.930:31713): avc: denied { execmem } for pid=22354 comm="syz.2.4795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2779.047769][T19669] usb 1-1: USB disconnect, device number 24 [ 2779.162721][ T31] audit: type=1400 audit(2779.040:31714): avc: denied { create } for pid=22363 comm="syz.0.4796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2779.170722][T22364] netlink: 'syz.0.4796': attribute type 1 has an invalid length. [ 2779.171680][ T31] audit: type=1400 audit(2779.050:31715): avc: denied { write } for pid=22363 comm="syz.0.4796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2779.369393][ T31] audit: type=1400 audit(2779.250:31716): avc: denied { create } for pid=22367 comm="syz.0.4798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2779.375933][ T31] audit: type=1400 audit(2779.260:31717): avc: denied { ioctl } for pid=22367 comm="syz.0.4798" path="socket:[55818]" dev="sockfs" ino=55818 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2779.452236][ T31] audit: type=1400 audit(2779.330:31718): avc: denied { prog_load } for pid=22369 comm="syz.0.4799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2779.459672][ T31] audit: type=1400 audit(2779.340:31719): avc: denied { bpf } for pid=22369 comm="syz.0.4799" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2779.460036][ T31] audit: type=1400 audit(2779.340:31720): avc: denied { perfmon } for pid=22369 comm="syz.0.4799" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2785.870393][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 2785.870785][ T31] audit: type=1400 audit(2785.750:31729): avc: denied { create } for pid=22378 comm="syz.2.4800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2785.878189][ T31] audit: type=1400 audit(2785.760:31730): avc: denied { ioctl } for pid=22378 comm="syz.2.4800" path="socket:[55832]" dev="sockfs" ino=55832 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2785.880298][ T31] audit: type=1400 audit(2785.760:31731): avc: denied { module_request } for pid=22378 comm="syz.2.4800" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2785.948150][ T31] audit: type=1400 audit(2785.830:31732): avc: denied { sys_module } for pid=22378 comm="syz.2.4800" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2785.948407][ T31] audit: type=1400 audit(2785.830:31733): avc: denied { module_request } for pid=22378 comm="syz.2.4800" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2786.078670][ T31] audit: type=1400 audit(2785.950:31734): avc: denied { allowed } for pid=22378 comm="syz.2.4800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2786.079145][ T31] audit: type=1400 audit(2785.960:31735): avc: denied { create } for pid=22378 comm="syz.2.4800" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2786.084876][ T31] audit: type=1400 audit(2785.960:31736): avc: denied { map } for pid=22378 comm="syz.2.4800" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55833 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2786.087906][ T31] audit: type=1400 audit(2785.970:31737): avc: denied { read write } for pid=22378 comm="syz.2.4800" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55833 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2786.102600][ T31] audit: type=1400 audit(2785.980:31738): avc: denied { map } for pid=22378 comm="syz.2.4800" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55833 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2792.857029][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2792.857505][ T31] audit: type=1400 audit(2792.740:31749): avc: denied { prog_load } for pid=22389 comm="syz.2.4803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2792.857888][ T31] audit: type=1400 audit(2792.740:31750): avc: denied { bpf } for pid=22389 comm="syz.2.4803" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2792.858189][ T31] audit: type=1400 audit(2792.740:31751): avc: denied { perfmon } for pid=22389 comm="syz.2.4803" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2792.864275][ T31] audit: type=1400 audit(2792.740:31752): avc: denied { perfmon } for pid=22389 comm="syz.2.4803" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2792.864788][ T31] audit: type=1400 audit(2792.750:31753): avc: denied { bpf } for pid=22389 comm="syz.2.4803" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2792.886365][ T31] audit: type=1400 audit(2792.770:31754): avc: denied { execmem } for pid=22389 comm="syz.2.4803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2795.018654][ T31] audit: type=1400 audit(2794.900:31755): avc: denied { create } for pid=22389 comm="syz.2.4803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2795.035358][ T31] audit: type=1400 audit(2794.920:31756): avc: denied { setopt } for pid=22389 comm="syz.2.4803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2797.357812][ T31] audit: type=1400 audit(2797.240:31757): avc: denied { execmem } for pid=22393 comm="syz.0.4804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2799.836848][ T31] audit: type=1400 audit(2799.720:31758): avc: denied { prog_load } for pid=22393 comm="syz.0.4804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2799.838890][ T31] audit: type=1400 audit(2799.720:31759): avc: denied { bpf } for pid=22393 comm="syz.0.4804" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2799.857936][ T31] audit: type=1400 audit(2799.740:31760): avc: denied { create } for pid=22393 comm="syz.0.4804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2799.861269][ T31] audit: type=1400 audit(2799.740:31761): avc: denied { write } for pid=22393 comm="syz.0.4804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2799.861577][ T31] audit: type=1400 audit(2799.740:31762): avc: denied { module_request } for pid=22393 comm="syz.0.4804" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2799.936328][ T31] audit: type=1400 audit(2799.820:31763): avc: denied { map_create } for pid=22393 comm="syz.0.4804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2799.939908][ T31] audit: type=1400 audit(2799.820:31764): avc: denied { create } for pid=22393 comm="syz.0.4804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2800.583895][ T31] audit: type=1400 audit(2800.470:31765): avc: denied { create } for pid=22398 comm="syz.2.4805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2800.586049][ T31] audit: type=1400 audit(2800.470:31766): avc: denied { read } for pid=22398 comm="syz.2.4805" path="socket:[55877]" dev="sockfs" ino=55877 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2800.593467][ T31] audit: type=1400 audit(2800.480:31767): avc: denied { read } for pid=22398 comm="syz.2.4805" path="socket:[55877]" dev="sockfs" ino=55877 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2805.487310][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 2805.510927][ T31] audit: type=1400 audit(2805.280:31776): avc: denied { map_create } for pid=22401 comm="syz.2.4806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2805.547289][ T31] audit: type=1400 audit(2805.290:31777): avc: denied { perfmon } for pid=22401 comm="syz.2.4806" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2805.587457][ T31] audit: type=1400 audit(2805.290:31778): avc: denied { map_read map_write } for pid=22401 comm="syz.2.4806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2805.659516][ T31] audit: type=1400 audit(2805.370:31779): avc: denied { module_request } for pid=22401 comm="syz.2.4806" kmod="fs-autofs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2805.919208][ T31] audit: type=1400 audit(2805.800:31780): avc: denied { read write } for pid=22405 comm="syz.0.4807" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2805.920650][ T31] audit: type=1400 audit(2805.800:31781): avc: denied { open } for pid=22405 comm="syz.0.4807" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2806.028839][ T31] audit: type=1400 audit(2805.910:31782): avc: denied { mounton } for pid=22405 comm="syz.0.4807" path="/96/file0" dev="tmpfs" ino=507 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2806.039535][ T31] audit: type=1400 audit(2805.920:31783): avc: denied { mount } for pid=22405 comm="syz.0.4807" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2808.170707][ T31] audit: type=1400 audit(2808.050:31784): avc: denied { unmount } for pid=21275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2808.338793][ T31] audit: type=1400 audit(2808.220:31785): avc: denied { execmem } for pid=22416 comm="syz.0.4809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2811.221866][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 2811.225314][ T31] audit: type=1400 audit(2811.100:31792): avc: denied { create } for pid=22420 comm="syz.2.4810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2811.228949][ T31] audit: type=1400 audit(2811.110:31793): avc: denied { setopt } for pid=22420 comm="syz.2.4810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2811.233294][ T31] audit: type=1400 audit(2811.120:31794): avc: denied { setopt } for pid=22420 comm="syz.2.4810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2811.238714][ T31] audit: type=1400 audit(2811.120:31795): avc: denied { append } for pid=22420 comm="syz.2.4810" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2811.240391][ T31] audit: type=1400 audit(2811.120:31796): avc: denied { open } for pid=22420 comm="syz.2.4810" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2811.244671][ T31] audit: type=1400 audit(2811.130:31797): avc: denied { ioctl } for pid=22420 comm="syz.2.4810" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2811.271432][ T31] audit: type=1400 audit(2811.150:31798): avc: denied { create } for pid=22420 comm="syz.2.4810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2811.275367][ T31] audit: type=1400 audit(2811.160:31799): avc: denied { ioctl } for pid=22420 comm="syz.2.4810" path="socket:[55275]" dev="sockfs" ino=55275 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2811.468034][ T31] audit: type=1400 audit(2811.350:31800): avc: denied { create } for pid=22427 comm="syz.2.4811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2811.480377][ T31] audit: type=1400 audit(2811.360:31801): avc: denied { create } for pid=22427 comm="syz.2.4811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2816.955438][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 2816.955845][ T31] audit: type=1400 audit(2816.840:31808): avc: denied { unlink } for pid=21275 comm="syz-executor" name="file0" dev="tmpfs" ino=518 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2817.039460][ T31] audit: type=1400 audit(2816.920:31809): avc: denied { read write } for pid=22431 comm="syz.0.4812" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2817.042861][ T31] audit: type=1400 audit(2816.920:31810): avc: denied { open } for pid=22431 comm="syz.0.4812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2817.049581][ T31] audit: type=1400 audit(2816.920:31811): avc: denied { ioctl } for pid=22431 comm="syz.0.4812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2817.059939][ T31] audit: type=1400 audit(2816.940:31812): avc: denied { ioctl } for pid=22431 comm="syz.0.4812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2817.154820][ T31] audit: type=1400 audit(2817.040:31813): avc: denied { ioctl } for pid=22431 comm="syz.0.4812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2817.224165][ T31] audit: type=1400 audit(2817.110:31814): avc: denied { ioctl } for pid=22431 comm="syz.0.4812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2817.282465][T10548] usb 1-1: new high-speed USB device number 25 using dummy_hcd [ 2817.296738][ T31] audit: type=1400 audit(2817.170:31815): avc: denied { ioctl } for pid=22431 comm="syz.0.4812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2817.297518][ T31] audit: type=1400 audit(2817.180:31816): avc: denied { ioctl } for pid=22431 comm="syz.0.4812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2817.363952][ T31] audit: type=1400 audit(2817.250:31817): avc: denied { ioctl } for pid=22431 comm="syz.0.4812" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2817.442740][T10548] usb 1-1: Using ep0 maxpacket: 32 [ 2817.464167][T10548] usb 1-1: config 0 interface 0 has no altsetting 0 [ 2817.464719][T10548] usb 1-1: New USB device found, idVendor=046d, idProduct=c623, bcdDevice= 0.00 [ 2817.464843][T10548] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2817.473254][T10548] usb 1-1: config 0 descriptor?? [ 2817.954158][T10548] logitech 0003:046D:C623.0007: hidraw0: USB HID v0.07 Device [HID 046d:c623] on usb-dummy_hcd.0-1/input0 [ 2818.148833][T10548] usb 1-1: USB disconnect, device number 25 [ 2821.402504][T12699] usb 1-1: new high-speed USB device number 26 using dummy_hcd [ 2821.682109][T12699] usb 1-1: Using ep0 maxpacket: 32 [ 2821.812387][T12699] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x85 has invalid maxpacket 1024 [ 2821.822466][T12699] usb 1-1: New USB device found, idVendor=12d8, idProduct=0001, bcdDevice=de.79 [ 2821.822742][T12699] usb 1-1: New USB device strings: Mfr=1, Product=236, SerialNumber=2 [ 2821.822884][T12699] usb 1-1: Product: syz [ 2821.822925][T12699] usb 1-1: Manufacturer: syz [ 2821.822955][T12699] usb 1-1: SerialNumber: syz [ 2821.829068][T12699] usb 1-1: config 0 descriptor?? [ 2821.895133][T22465] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 2821.901495][T12699] hub 1-1:0.0: bad descriptor, ignoring hub [ 2821.902317][T12699] hub 1-1:0.0: probe with driver hub failed with error -5 [ 2822.473490][T21098] usb 1-1: USB disconnect, device number 26 [ 2822.840495][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 2822.840891][ T31] audit: type=1400 audit(2822.720:31847): avc: denied { allowed } for pid=22484 comm="syz.0.4819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2822.847339][ T31] audit: type=1400 audit(2822.730:31848): avc: denied { create } for pid=22484 comm="syz.0.4819" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2822.850586][ T31] audit: type=1400 audit(2822.730:31849): avc: denied { map } for pid=22484 comm="syz.0.4819" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56347 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2822.852255][ T31] audit: type=1400 audit(2822.730:31850): avc: denied { read write } for pid=22484 comm="syz.0.4819" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56347 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2822.992323][ T31] audit: type=1400 audit(2822.870:31851): avc: denied { map } for pid=22484 comm="syz.0.4819" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56347 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2823.018429][ T31] audit: type=1400 audit(2822.900:31852): avc: denied { read write } for pid=22484 comm="syz.0.4819" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56347 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2823.452270][ T31] audit: type=1400 audit(2823.330:31853): avc: denied { prog_load } for pid=22486 comm="syz.0.4820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2823.462676][ T31] audit: type=1400 audit(2823.340:31854): avc: denied { bpf } for pid=22486 comm="syz.0.4820" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2823.477738][ T31] audit: type=1400 audit(2823.350:31855): avc: denied { perfmon } for pid=22486 comm="syz.0.4820" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2823.478107][ T31] audit: type=1400 audit(2823.350:31856): avc: denied { bpf } for pid=22486 comm="syz.0.4820" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2829.759676][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 2829.760557][ T31] audit: type=1400 audit(2829.640:31885): avc: denied { unmount } for pid=21275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2830.159479][ T31] audit: type=1400 audit(2830.040:31886): avc: denied { create } for pid=22502 comm="syz.0.4824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2830.180271][ T31] audit: type=1400 audit(2830.060:31887): avc: denied { create } for pid=22502 comm="syz.0.4824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2830.222318][ T31] audit: type=1400 audit(2830.100:31888): avc: denied { ioctl } for pid=22502 comm="syz.0.4824" path="socket:[56359]" dev="sockfs" ino=56359 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2830.254283][ T31] audit: type=1400 audit(2830.140:31889): avc: denied { create } for pid=22502 comm="syz.0.4824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2830.256236][ T31] audit: type=1400 audit(2830.140:31890): avc: denied { bind } for pid=22502 comm="syz.0.4824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2830.286645][ T31] audit: type=1400 audit(2830.170:31891): avc: denied { create } for pid=22502 comm="syz.0.4824" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2830.288413][ T31] audit: type=1400 audit(2830.170:31892): avc: denied { connect } for pid=22502 comm="syz.0.4824" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2830.290327][ T31] audit: type=1400 audit(2830.170:31893): avc: denied { setopt } for pid=22502 comm="syz.0.4824" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2830.396423][ T31] audit: type=1400 audit(2830.250:31894): avc: denied { write } for pid=22502 comm="syz.0.4824" laddr=::1 lport=6 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2836.850129][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2836.850938][ T31] audit: type=1400 audit(2836.730:31905): avc: denied { prog_load } for pid=22509 comm="syz.0.4826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2836.872733][ T31] audit: type=1400 audit(2836.730:31906): avc: denied { bpf } for pid=22509 comm="syz.0.4826" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2836.873390][ T31] audit: type=1400 audit(2836.750:31907): avc: denied { perfmon } for pid=22509 comm="syz.0.4826" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2836.873696][ T31] audit: type=1400 audit(2836.750:31908): avc: denied { bpf } for pid=22509 comm="syz.0.4826" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2836.892475][ T31] audit: type=1400 audit(2836.770:31909): avc: denied { create } for pid=22509 comm="syz.0.4826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2836.893716][ T31] audit: type=1400 audit(2836.780:31910): avc: denied { connect } for pid=22509 comm="syz.0.4826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2841.969933][ T31] audit: type=1400 audit(2841.850:31911): avc: denied { read write } for pid=22516 comm="syz.0.4828" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2841.972584][ T31] audit: type=1400 audit(2841.850:31912): avc: denied { open } for pid=22516 comm="syz.0.4828" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2841.976372][ T31] audit: type=1400 audit(2841.860:31913): avc: denied { mounton } for pid=22516 comm="syz.0.4828" path="/113/file0" dev="tmpfs" ino=595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2841.988866][ T31] audit: type=1400 audit(2841.870:31914): avc: denied { mount } for pid=22516 comm="syz.0.4828" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2842.820360][ T31] audit: type=1400 audit(2842.700:31915): avc: denied { map_create } for pid=22513 comm="syz.2.4827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2842.824776][ T31] audit: type=1400 audit(2842.710:31916): avc: denied { perfmon } for pid=22513 comm="syz.2.4827" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2842.825104][ T31] audit: type=1400 audit(2842.710:31917): avc: denied { map_read map_write } for pid=22513 comm="syz.2.4827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2842.840164][ T31] audit: type=1400 audit(2842.720:31918): avc: denied { prog_load } for pid=22513 comm="syz.2.4827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2842.847010][ T31] audit: type=1400 audit(2842.730:31919): avc: denied { bpf } for pid=22513 comm="syz.2.4827" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2842.856726][ T31] audit: type=1400 audit(2842.740:31920): avc: denied { prog_load } for pid=22513 comm="syz.2.4827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2846.059304][T22524] macvlan0: entered promiscuous mode [ 2846.073498][T22524] netlink: 'syz.0.4829': attribute type 1 has an invalid length. [ 2846.073898][T22524] netlink: 'syz.0.4829': attribute type 2 has an invalid length. [ 2846.347791][T22526] netlink: 36 bytes leftover after parsing attributes in process `syz.0.4830'. [ 2847.266866][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2847.268481][ T31] audit: type=1400 audit(2847.150:31931): avc: denied { watch } for pid=22527 comm="syz.0.4831" path="/116/control" dev="tmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2847.683505][ T31] audit: type=1400 audit(2847.570:31932): avc: denied { read } for pid=22530 comm="syz.0.4832" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2847.738362][ T31] audit: type=1400 audit(2847.610:31933): avc: denied { read open } for pid=22530 comm="syz.0.4832" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2847.784830][ T31] audit: type=1400 audit(2847.650:31934): avc: denied { ioctl } for pid=22530 comm="syz.0.4832" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2847.940829][T22531] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4832'. [ 2848.152422][ T31] audit: type=1400 audit(2848.030:31935): avc: denied { read write } for pid=22536 comm="syz.0.4833" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2848.152992][ T31] audit: type=1400 audit(2848.030:31936): avc: denied { open } for pid=22536 comm="syz.0.4833" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2848.156343][ T31] audit: type=1400 audit(2848.040:31937): avc: denied { mounton } for pid=22536 comm="syz.0.4833" path="/118/file0" dev="tmpfs" ino=622 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2848.162752][ T31] audit: type=1400 audit(2848.050:31938): avc: denied { mount } for pid=22536 comm="syz.0.4833" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2849.691077][ T31] audit: type=1326 audit(2849.570:31939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22536 comm="syz.0.4833" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x0 [ 2851.227586][ T31] audit: type=1400 audit(2851.110:31940): avc: denied { unmount } for pid=21275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2855.401491][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 2855.402200][ T31] audit: type=1400 audit(2855.280:31949): avc: denied { create } for pid=22548 comm="syz.0.4835" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2855.414082][ T31] audit: type=1400 audit(2855.300:31950): avc: denied { ioctl } for pid=22548 comm="syz.0.4835" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=56400 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2855.419896][ T31] audit: type=1400 audit(2855.300:31951): avc: denied { ioctl } for pid=22548 comm="syz.0.4835" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=56400 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2855.653272][ T31] audit: type=1400 audit(2855.530:31952): avc: denied { prog_load } for pid=22551 comm="syz.0.4836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2855.655716][ T31] audit: type=1400 audit(2855.540:31953): avc: denied { bpf } for pid=22551 comm="syz.0.4836" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2855.656100][ T31] audit: type=1400 audit(2855.540:31954): avc: denied { perfmon } for pid=22551 comm="syz.0.4836" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2855.665789][ T31] audit: type=1400 audit(2855.550:31955): avc: denied { perfmon } for pid=22551 comm="syz.0.4836" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2855.666342][ T31] audit: type=1400 audit(2855.550:31956): avc: denied { bpf } for pid=22551 comm="syz.0.4836" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2855.672817][ T31] audit: type=1400 audit(2855.550:31957): avc: denied { prog_run } for pid=22551 comm="syz.0.4836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2855.692918][ T31] audit: type=1400 audit(2855.570:31958): avc: denied { execmem } for pid=22551 comm="syz.0.4836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2856.346911][T22554] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4837'. [ 2856.894384][T22552] comedi: valid board names for 8255 driver are: [ 2856.894754][T22552] 8255 [ 2856.898373][T22552] comedi: valid board names for vmk80xx driver are: [ 2856.900311][T22552] vmk80xx [ 2856.900531][T22552] comedi: valid board names for usbduxsigma driver are: [ 2856.900717][T22552] usbduxsigma [ 2856.900897][T22552] comedi: valid board names for usbduxfast driver are: [ 2856.901082][T22552] usbduxfast [ 2856.903212][T22552] comedi: valid board names for usbdux driver are: [ 2856.903275][T22552] usbdux [ 2856.903323][T22552] comedi: valid board names for ni6501 driver are: [ 2856.903370][T22552] ni6501 [ 2856.903414][T22552] comedi: valid board names for dt9812 driver are: [ 2856.903458][T22552] dt9812 [ 2856.903502][T22552] comedi: valid board names for ni_labpc_cs driver are: [ 2856.903575][T22552] ni_labpc_cs [ 2856.903658][T22552] comedi: valid board names for ni_daq_700 driver are: [ 2856.903721][T22552] ni_daq_700 [ 2856.903769][T22552] comedi: valid board names for labpc_pci driver are: [ 2856.903819][T22552] labpc_pci [ 2856.903865][T22552] comedi: valid board names for adl_pci9118 driver are: [ 2856.903913][T22552] pci9118dg [ 2856.903956][T22552] pci9118hg [ 2856.904017][T22552] pci9118hr [ 2856.904069][T22552] comedi: valid board names for 8255_pci driver are: [ 2856.904126][T22552] 8255_pci [ 2856.904172][T22552] comedi: valid board names for comedi_parport driver are: [ 2856.904218][T22552] comedi_parport [ 2856.904260][T22552] comedi: valid board names for comedi_test driver are: [ 2856.904306][T22552] comedi_test [ 2856.904350][T22552] comedi: valid board names for comedi_bond driver are: [ 2856.904397][T22552] comedi_bond [ 2860.649097][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 2860.649567][ T31] audit: type=1400 audit(2860.530:31988): avc: denied { create } for pid=22573 comm="syz.2.4842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2860.736505][ T31] audit: type=1400 audit(2860.620:31989): avc: denied { setopt } for pid=22573 comm="syz.2.4842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2861.299603][ T31] audit: type=1400 audit(2861.180:31990): avc: denied { map_create } for pid=22575 comm="syz.2.4843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2861.301329][ T31] audit: type=1400 audit(2861.180:31991): avc: denied { map_read map_write } for pid=22575 comm="syz.2.4843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2861.307233][ T31] audit: type=1400 audit(2861.190:31992): avc: denied { bpf } for pid=22575 comm="syz.2.4843" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2861.426855][T22576] binder: 22575:22576 ioctl 4018620d 0 returned -22 [ 2861.427046][ T31] audit: type=1400 audit(2861.310:31993): avc: denied { read } for pid=22575 comm="syz.2.4843" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2861.427503][ T31] audit: type=1400 audit(2861.310:31994): avc: denied { open } for pid=22575 comm="syz.2.4843" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2861.427856][ T31] audit: type=1400 audit(2861.310:31995): avc: denied { ioctl } for pid=22575 comm="syz.2.4843" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2861.446210][ T31] audit: type=1400 audit(2861.330:31996): avc: denied { read } for pid=22575 comm="syz.2.4843" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2861.448365][ T31] audit: type=1400 audit(2861.330:31997): avc: denied { read open } for pid=22575 comm="syz.2.4843" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2861.448537][T22576] binder: 22575:22576 ioctl c0306201 0 returned -14 [ 2864.035623][T22579] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2864.036166][T22579] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2866.242426][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 2866.242842][ T31] audit: type=1326 audit(2866.110:32027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22584 comm="syz.2.4846" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x0 [ 2868.274357][ T31] audit: type=1400 audit(2868.160:32028): avc: denied { unmount } for pid=20691 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2868.638886][ T31] audit: type=1400 audit(2868.520:32029): avc: denied { read write } for pid=22593 comm="syz.2.4847" name="raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2868.655545][ T31] audit: type=1400 audit(2868.520:32030): avc: denied { read write open } for pid=22593 comm="syz.2.4847" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2868.657957][ T31] audit: type=1400 audit(2868.540:32031): avc: denied { ioctl } for pid=22593 comm="syz.2.4847" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2868.678408][T22594] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2868.682396][ T31] audit: type=1400 audit(2868.560:32032): avc: denied { ioctl } for pid=22593 comm="syz.2.4847" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2868.690448][T22594] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2871.772336][ T31] audit: type=1400 audit(2871.650:32033): avc: denied { create } for pid=22597 comm="syz.2.4848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2879.591285][ T31] audit: type=1400 audit(2879.470:32034): avc: denied { map_create } for pid=22602 comm="syz.0.4849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2879.596122][ T31] audit: type=1400 audit(2879.480:32035): avc: denied { map_read map_write } for pid=22602 comm="syz.0.4849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2879.615647][ T31] audit: type=1400 audit(2879.500:32036): avc: denied { prog_load } for pid=22602 comm="syz.0.4849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2879.620062][ T31] audit: type=1400 audit(2879.500:32037): avc: denied { bpf } for pid=22602 comm="syz.0.4849" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2879.633595][ T31] audit: type=1400 audit(2879.520:32038): avc: denied { perfmon } for pid=22602 comm="syz.0.4849" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2879.636532][ T31] audit: type=1400 audit(2879.520:32039): avc: denied { bpf } for pid=22602 comm="syz.0.4849" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2879.644249][ T31] audit: type=1400 audit(2879.530:32040): avc: denied { bpf } for pid=22602 comm="syz.0.4849" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2879.648173][ T31] audit: type=1400 audit(2879.530:32041): avc: denied { prog_run } for pid=22602 comm="syz.0.4849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2879.812855][ T31] audit: type=1400 audit(2879.690:32042): avc: denied { read write } for pid=22606 comm="syz.2.4851" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2879.813338][ T31] audit: type=1400 audit(2879.700:32043): avc: denied { read write open } for pid=22606 comm="syz.2.4851" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2891.702888][T22626] block device autoloading is deprecated and will be removed. [ 2891.707754][T22626] syz.2.4853: attempt to access beyond end of device [ 2891.707754][T22626] md0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 2895.325971][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 2895.326507][ T31] audit: type=1400 audit(2895.210:32053): avc: denied { module_request } for pid=22629 comm="syz.0.4855" kmod="fs-iso9660" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2896.364379][ T31] audit: type=1400 audit(2896.250:32054): avc: denied { prog_load } for pid=22633 comm="syz.2.4856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2896.367088][ T31] audit: type=1400 audit(2896.250:32055): avc: denied { bpf } for pid=22633 comm="syz.2.4856" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2896.370779][ T31] audit: type=1400 audit(2896.250:32056): avc: denied { perfmon } for pid=22633 comm="syz.2.4856" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2896.370853][ T31] audit: type=1400 audit(2896.250:32057): avc: denied { bpf } for pid=22633 comm="syz.2.4856" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2896.370911][ T31] audit: type=1400 audit(2896.250:32058): avc: denied { perfmon } for pid=22633 comm="syz.2.4856" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2896.370987][ T31] audit: type=1400 audit(2896.250:32059): avc: denied { prog_run } for pid=22633 comm="syz.2.4856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2896.382375][ T31] audit: type=1400 audit(2896.260:32060): avc: denied { execmem } for pid=22633 comm="syz.2.4856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2897.413416][ T31] audit: type=1400 audit(2897.290:32061): avc: denied { read write } for pid=22636 comm="syz.0.4857" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2897.418738][ T31] audit: type=1400 audit(2897.290:32062): avc: denied { open } for pid=22636 comm="syz.0.4857" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2900.080124][T22642] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.4858' sets config #0 [ 2900.573536][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 2900.573956][ T31] audit: type=1400 audit(2900.460:32080): avc: denied { create } for pid=22646 comm="syz.2.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2900.613996][ T31] audit: type=1400 audit(2900.500:32081): avc: denied { ioctl } for pid=22646 comm="syz.2.4860" path="socket:[56139]" dev="sockfs" ino=56139 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2900.625956][ T31] audit: type=1400 audit(2900.510:32082): avc: denied { module_request } for pid=22646 comm="syz.2.4860" kmod="netdev-vcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2900.854082][ T31] audit: type=1400 audit(2900.740:32083): avc: denied { sys_module } for pid=22646 comm="syz.2.4860" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2900.854572][ T31] audit: type=1400 audit(2900.740:32084): avc: denied { module_request } for pid=22646 comm="syz.2.4860" kmod="vcan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2901.040886][T22647] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4860'. [ 2901.048337][ T31] audit: type=1400 audit(2900.920:32085): avc: denied { bind } for pid=22646 comm="syz.2.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2901.048726][ T31] audit: type=1400 audit(2900.920:32086): avc: denied { setopt } for pid=22646 comm="syz.2.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2901.048830][ T31] audit: type=1400 audit(2900.920:32087): avc: denied { write } for pid=22646 comm="syz.2.4860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2901.256832][ T31] audit: type=1400 audit(2901.140:32088): avc: denied { read write } for pid=22650 comm="syz.2.4861" name="vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2901.257299][ T31] audit: type=1400 audit(2901.140:32089): avc: denied { read write open } for pid=22650 comm="syz.2.4861" path="/dev/vhost-vsock" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:scsi_generic_device_t:s0" [ 2907.080055][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 2907.080621][ T31] audit: type=1400 audit(2906.960:32095): avc: denied { unmount } for pid=20691 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2907.213386][ T31] audit: type=1400 audit(2907.100:32096): avc: denied { allowed } for pid=22665 comm="syz.2.4864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2907.219450][ T31] audit: type=1400 audit(2907.100:32097): avc: denied { create } for pid=22665 comm="syz.2.4864" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2907.220888][ T31] audit: type=1400 audit(2907.100:32098): avc: denied { map } for pid=22665 comm="syz.2.4864" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56534 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2907.221450][ T31] audit: type=1400 audit(2907.100:32099): avc: denied { read write } for pid=22665 comm="syz.2.4864" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56534 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2907.227072][ T31] audit: type=1400 audit(2907.110:32100): avc: denied { map } for pid=22665 comm="syz.2.4864" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56534 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2907.233399][ T31] audit: type=1400 audit(2907.110:32101): avc: denied { read write } for pid=22665 comm="syz.2.4864" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56534 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2907.246496][ T31] audit: type=1400 audit(2907.130:32102): avc: denied { map_create } for pid=22665 comm="syz.2.4864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2907.248473][ T31] audit: type=1400 audit(2907.130:32103): avc: denied { bpf } for pid=22665 comm="syz.2.4864" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2907.256453][ T31] audit: type=1400 audit(2907.140:32104): avc: denied { map_read map_write } for pid=22665 comm="syz.2.4864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2910.051578][T22671] comedi comedi0: Minor 14 could not be opened [ 2912.797063][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 2912.800749][ T31] audit: type=1400 audit(2912.680:32134): avc: denied { unmount } for pid=21275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2913.172984][ T31] audit: type=1400 audit(2913.050:32135): avc: denied { create } for pid=22685 comm="syz.0.4870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2913.178561][ T31] audit: type=1400 audit(2913.060:32136): avc: denied { write } for pid=22685 comm="syz.0.4870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2913.185046][ T31] audit: type=1400 audit(2913.070:32137): avc: denied { module_request } for pid=22685 comm="syz.0.4870" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2913.304397][ T31] audit: type=1400 audit(2913.190:32138): avc: denied { read } for pid=22685 comm="syz.0.4870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2913.312617][ T31] audit: type=1400 audit(2913.190:32139): avc: denied { execmem } for pid=22685 comm="syz.0.4870" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2915.605015][T22689] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4870'. [ 2915.633509][T22689] gtp0: entered promiscuous mode [ 2915.634039][T22689] gtp0: entered allmulticast mode [ 2922.203330][ T31] audit: type=1400 audit(2922.090:32140): avc: denied { create } for pid=22692 comm="syz.2.4871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2922.205160][ T31] audit: type=1400 audit(2922.090:32141): avc: denied { module_request } for pid=22692 comm="syz.2.4871" kmod="net-pf-10-proto-132-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2922.399370][ T31] audit: type=1400 audit(2922.280:32142): avc: denied { module_request } for pid=22692 comm="syz.2.4871" kmod="net-pf-10-proto-132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2922.676919][ T31] audit: type=1400 audit(2922.560:32143): avc: denied { create } for pid=22692 comm="syz.2.4871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2922.680682][ T31] audit: type=1400 audit(2922.560:32144): avc: denied { bind } for pid=22692 comm="syz.2.4871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2922.693895][ T31] audit: type=1400 audit(2922.580:32145): avc: denied { create } for pid=22692 comm="syz.2.4871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2922.696327][ T31] audit: type=1400 audit(2922.580:32146): avc: denied { write } for pid=22692 comm="syz.2.4871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2922.951107][ T31] audit: type=1400 audit(2922.830:32147): avc: denied { execmem } for pid=22697 comm="syz.2.4872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2924.880801][ T31] audit: type=1400 audit(2924.760:32148): avc: denied { create } for pid=22697 comm="syz.2.4872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2924.889683][ T31] audit: type=1400 audit(2924.770:32149): avc: denied { create } for pid=22697 comm="syz.2.4872" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2927.904249][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 2927.910760][ T31] audit: type=1326 audit(2927.790:32162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22703 comm="syz.0.4874" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x0 [ 2929.987556][ T31] audit: type=1400 audit(2929.870:32163): avc: denied { unmount } for pid=21275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2930.185966][ T31] audit: type=1400 audit(2930.070:32164): avc: denied { create } for pid=22709 comm="syz.0.4875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2930.191375][ T31] audit: type=1400 audit(2930.070:32165): avc: denied { setopt } for pid=22709 comm="syz.0.4875" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2935.657813][ T31] audit: type=1400 audit(2935.540:32166): avc: denied { create } for pid=22717 comm="syz.2.4878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2935.678238][ T31] audit: type=1400 audit(2935.560:32167): avc: denied { bind } for pid=22717 comm="syz.2.4878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2935.687267][ T31] audit: type=1400 audit(2935.560:32168): avc: denied { module_request } for pid=22717 comm="syz.2.4878" kmod="crypto-ecb-cast5-avx" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2935.809795][ T31] audit: type=1400 audit(2935.690:32169): avc: denied { module_request } for pid=22717 comm="syz.2.4878" kmod="crypto-ecb-cast5-avx-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2935.927890][ T31] audit: type=1400 audit(2935.810:32170): avc: denied { setopt } for pid=22717 comm="syz.2.4878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2935.930228][ T31] audit: type=1400 audit(2935.810:32171): avc: denied { accept } for pid=22717 comm="syz.2.4878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2936.044358][ T31] audit: type=1400 audit(2935.930:32172): avc: denied { read write } for pid=22721 comm="syz.2.4879" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2936.046686][ T31] audit: type=1400 audit(2935.930:32173): avc: denied { open } for pid=22721 comm="syz.2.4879" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2936.051604][ T31] audit: type=1400 audit(2935.930:32174): avc: denied { mounton } for pid=22721 comm="syz.2.4879" path="/130/file0" dev="tmpfs" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2936.062595][ T31] audit: type=1400 audit(2935.940:32175): avc: denied { mount } for pid=22721 comm="syz.2.4879" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2939.414288][T22728] comedi: valid board names for 8255 driver are: [ 2939.414651][T22728] 8255 [ 2939.416745][T22728] comedi: valid board names for vmk80xx driver are: [ 2939.417007][T22728] vmk80xx [ 2939.417124][T22728] comedi: valid board names for usbduxsigma driver are: [ 2939.417278][T22728] usbduxsigma [ 2939.417380][T22728] comedi: valid board names for usbduxfast driver are: [ 2939.417474][T22728] usbduxfast [ 2939.417564][T22728] comedi: valid board names for usbdux driver are: [ 2939.417656][T22728] usbdux [ 2939.417747][T22728] comedi: valid board names for ni6501 driver are: [ 2939.417836][T22728] ni6501 [ 2939.417866][T22728] comedi: valid board names for dt9812 driver are: [ 2939.417895][T22728] dt9812 [ 2939.417926][T22728] comedi: valid board names for ni_labpc_cs driver are: [ 2939.417972][T22728] ni_labpc_cs [ 2939.418025][T22728] comedi: valid board names for ni_daq_700 driver are: [ 2939.418093][T22728] ni_daq_700 [ 2939.418155][T22728] comedi: valid board names for labpc_pci driver are: [ 2939.418205][T22728] labpc_pci [ 2939.418243][T22728] comedi: valid board names for adl_pci9118 driver are: [ 2939.418278][T22728] pci9118dg [ 2939.418325][T22728] pci9118hg [ 2939.418369][T22728] pci9118hr [ 2939.418414][T22728] comedi: valid board names for 8255_pci driver are: [ 2939.418480][T22728] 8255_pci [ 2939.418554][T22728] comedi: valid board names for comedi_parport driver are: [ 2939.418604][T22728] comedi_parport [ 2939.418731][T22728] comedi: valid board names for comedi_test driver are: [ 2939.418764][T22728] comedi_test [ 2939.418806][T22728] comedi: valid board names for comedi_bond driver are: [ 2939.418833][T22728] comedi_bond [ 2942.009142][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 2942.013253][ T31] audit: type=1400 audit(2941.890:32188): avc: denied { read } for pid=22730 comm="syz.2.4881" dev="nsfs" ino=4026532963 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2942.015832][ T31] audit: type=1400 audit(2941.900:32189): avc: denied { read open } for pid=22730 comm="syz.2.4881" path="net:[4026532963]" dev="nsfs" ino=4026532963 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2942.030057][ T31] audit: type=1400 audit(2941.910:32190): avc: denied { prog_load } for pid=22730 comm="syz.2.4881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2942.031619][ T31] audit: type=1400 audit(2941.910:32191): avc: denied { bpf } for pid=22730 comm="syz.2.4881" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2942.040258][ T31] audit: type=1400 audit(2941.920:32192): avc: denied { perfmon } for pid=22730 comm="syz.2.4881" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2942.049096][ T31] audit: type=1400 audit(2941.930:32193): avc: denied { perfmon } for pid=22730 comm="syz.2.4881" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2942.050169][ T31] audit: type=1400 audit(2941.930:32194): avc: denied { bpf } for pid=22730 comm="syz.2.4881" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2942.060002][ T31] audit: type=1400 audit(2941.940:32195): avc: denied { bpf } for pid=22730 comm="syz.2.4881" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2942.061544][ T31] audit: type=1400 audit(2941.940:32196): avc: denied { perfmon } for pid=22730 comm="syz.2.4881" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2942.069152][ T31] audit: type=1400 audit(2941.950:32197): avc: denied { bpf } for pid=22730 comm="syz.2.4881" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2948.927071][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 2948.927557][ T31] audit: type=1400 audit(2948.810:32204): avc: denied { read write } for pid=22738 comm="syz.0.4884" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2948.927875][ T31] audit: type=1400 audit(2948.810:32205): avc: denied { open } for pid=22738 comm="syz.0.4884" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2948.934616][ T31] audit: type=1400 audit(2948.810:32206): avc: denied { mounton } for pid=22738 comm="syz.0.4884" path="/139/file0" dev="tmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2949.003106][ T31] audit: type=1400 audit(2948.870:32207): avc: denied { mount } for pid=22738 comm="syz.0.4884" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2950.116713][ T31] audit: type=1326 audit(2949.990:32208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22738 comm="syz.0.4884" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x0 [ 2952.169730][ T31] audit: type=1400 audit(2952.050:32209): avc: denied { unmount } for pid=21275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2952.592106][ T31] audit: type=1400 audit(2952.460:32210): avc: denied { name_bind } for pid=22744 comm="syz.0.4885" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2952.594039][ T31] audit: type=1400 audit(2952.480:32211): avc: denied { node_bind } for pid=22744 comm="syz.0.4885" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2953.002328][ T31] audit: type=1400 audit(2952.880:32212): avc: denied { read write } for pid=22746 comm="syz.0.4886" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2953.014357][ T31] audit: type=1400 audit(2952.900:32213): avc: denied { open } for pid=22746 comm="syz.0.4886" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2953.634117][T22748] netlink: 4768 bytes leftover after parsing attributes in process `syz.0.4886'. [ 2955.669672][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2955.673630][ T31] audit: type=1400 audit(2955.550:32224): avc: denied { create } for pid=22749 comm="syz.0.4887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2955.676389][ T31] audit: type=1400 audit(2955.560:32225): avc: denied { execmem } for pid=22749 comm="syz.0.4887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2959.177067][T22751] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4887'. [ 2959.194062][T22751] gtp1: entered promiscuous mode [ 2959.197516][T22751] gtp1: entered allmulticast mode [ 2960.513501][ T31] audit: type=1400 audit(2960.400:32226): avc: denied { execmem } for pid=22756 comm="syz.0.4889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2960.817633][ T31] audit: type=1400 audit(2960.700:32227): avc: denied { read write } for pid=22758 comm="syz.2.4890" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2960.820101][ T31] audit: type=1400 audit(2960.700:32228): avc: denied { open } for pid=22758 comm="syz.2.4890" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2960.829055][ T31] audit: type=1400 audit(2960.700:32229): avc: denied { mounton } for pid=22758 comm="syz.2.4890" path="/134/file0" dev="tmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2960.840116][ T31] audit: type=1400 audit(2960.720:32230): avc: denied { mount } for pid=22758 comm="syz.2.4890" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2962.365374][ T31] audit: type=1326 audit(2962.250:32231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22758 comm="syz.2.4890" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x0 [ 2962.661603][ T31] audit: type=1400 audit(2962.540:32232): avc: denied { read } for pid=22756 comm="syz.0.4889" name="sequencer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2962.673541][ T31] audit: type=1400 audit(2962.550:32233): avc: denied { read open } for pid=22756 comm="syz.0.4889" path="/dev/sequencer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2962.675499][ T31] audit: type=1400 audit(2962.560:32234): avc: denied { write } for pid=22756 comm="syz.0.4889" name="midiC2D0" dev="devtmpfs" ino=738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2962.684094][ T31] audit: type=1400 audit(2962.570:32235): avc: denied { read } for pid=22756 comm="syz.0.4889" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2962.685800][ T31] audit: type=1400 audit(2962.570:32236): avc: denied { read open } for pid=22756 comm="syz.0.4889" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2969.478011][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 2969.482426][ T31] audit: type=1400 audit(2969.360:32250): avc: denied { create } for pid=22771 comm="syz.2.4892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2969.516950][ T31] audit: type=1400 audit(2969.380:32251): avc: denied { prog_load } for pid=22771 comm="syz.2.4892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2969.519294][ T31] audit: type=1400 audit(2969.400:32252): avc: denied { bpf } for pid=22771 comm="syz.2.4892" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2969.523658][ T31] audit: type=1400 audit(2969.400:32253): avc: denied { perfmon } for pid=22771 comm="syz.2.4892" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2969.529618][ T31] audit: type=1400 audit(2969.400:32254): avc: denied { prog_run } for pid=22771 comm="syz.2.4892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2975.906317][ T31] audit: type=1400 audit(2975.780:32255): avc: denied { execmem } for pid=22775 comm="syz.0.4893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2978.530483][ T31] audit: type=1400 audit(2978.410:32256): avc: denied { prog_load } for pid=22775 comm="syz.0.4893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2978.536380][ T31] audit: type=1400 audit(2978.420:32257): avc: denied { bpf } for pid=22775 comm="syz.0.4893" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2978.538719][ T31] audit: type=1400 audit(2978.420:32258): avc: denied { perfmon } for pid=22775 comm="syz.0.4893" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2978.546458][ T31] audit: type=1400 audit(2978.430:32259): avc: denied { kexec_image_load } for pid=22775 comm="syz.0.4893" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 2979.558769][ T31] audit: type=1400 audit(2979.440:32260): avc: denied { create } for pid=22779 comm="syz.2.4894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2979.561484][ T31] audit: type=1400 audit(2979.440:32261): avc: denied { write } for pid=22779 comm="syz.2.4894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2979.567780][ T31] audit: type=1400 audit(2979.450:32262): avc: denied { module_request } for pid=22779 comm="syz.2.4894" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2979.642917][ T31] audit: type=1400 audit(2979.520:32263): avc: denied { read } for pid=22779 comm="syz.2.4894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2979.644641][ T31] audit: type=1400 audit(2979.520:32264): avc: denied { create } for pid=22779 comm="syz.2.4894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2981.416579][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 2981.427336][ T31] audit: type=1326 audit(2981.300:32274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22784 comm="syz.2.4895" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x0 [ 2983.496456][ T31] audit: type=1400 audit(2983.380:32275): avc: denied { unmount } for pid=20691 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2984.657682][ T31] audit: type=1400 audit(2984.540:32276): avc: denied { execmem } for pid=22796 comm="syz.2.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2986.882499][ T31] audit: type=1400 audit(2986.760:32277): avc: denied { prog_load } for pid=22796 comm="syz.2.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2986.884479][ T31] audit: type=1400 audit(2986.760:32278): avc: denied { bpf } for pid=22796 comm="syz.2.4898" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2986.892988][ T31] audit: type=1400 audit(2986.760:32279): avc: denied { perfmon } for pid=22796 comm="syz.2.4898" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2986.896540][ T31] audit: type=1400 audit(2986.780:32280): avc: denied { bpf } for pid=22796 comm="syz.2.4898" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2986.896906][ T31] audit: type=1400 audit(2986.780:32281): avc: denied { prog_run } for pid=22796 comm="syz.2.4898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2987.332937][ T31] audit: type=1400 audit(2987.210:32282): avc: denied { create } for pid=22801 comm="syz.2.4899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2987.339618][ T31] audit: type=1400 audit(2987.220:32283): avc: denied { bind } for pid=22801 comm="syz.2.4899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2987.343677][ T31] audit: type=1400 audit(2987.230:32284): avc: denied { module_request } for pid=22801 comm="syz.2.4899" kmod="crypto-ecb-camellia-aesni" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2987.476570][ T31] audit: type=1400 audit(2987.360:32285): avc: denied { read write } for pid=22804 comm="syz.0.4900" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2987.477109][ T31] audit: type=1400 audit(2987.360:32286): avc: denied { open } for pid=22804 comm="syz.0.4900" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2991.969427][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2991.969960][ T31] audit: type=1400 audit(2991.850:32297): avc: denied { prog_load } for pid=22818 comm="syz.2.4903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2991.986052][ T31] audit: type=1400 audit(2991.870:32298): avc: denied { bpf } for pid=22818 comm="syz.2.4903" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2991.993727][ T31] audit: type=1400 audit(2991.870:32299): avc: denied { perfmon } for pid=22818 comm="syz.2.4903" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2992.017739][ T31] audit: type=1400 audit(2991.900:32300): avc: denied { perfmon } for pid=22818 comm="syz.2.4903" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2992.019901][ T31] audit: type=1400 audit(2991.900:32301): avc: denied { bpf } for pid=22818 comm="syz.2.4903" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2992.062938][ T31] audit: type=1400 audit(2991.940:32302): avc: denied { prog_run } for pid=22818 comm="syz.2.4903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2992.100632][ T31] audit: type=1400 audit(2991.980:32303): avc: denied { prog_load } for pid=22818 comm="syz.2.4903" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2992.104912][ T31] audit: type=1400 audit(2991.980:32304): avc: denied { bpf } for pid=22818 comm="syz.2.4903" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2992.106827][ T31] audit: type=1400 audit(2991.980:32305): avc: denied { perfmon } for pid=22818 comm="syz.2.4903" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2992.202751][ T31] audit: type=1400 audit(2992.080:32306): avc: denied { perfmon } for pid=22818 comm="syz.2.4903" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2997.237922][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 2997.238165][ T31] audit: type=1400 audit(2997.120:32324): avc: denied { unmount } for pid=20691 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2998.103645][T22834] netdevsim netdevsim2 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2998.104982][T22834] netdevsim netdevsim2 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2998.107066][T22834] netdevsim netdevsim2 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2998.108881][T22834] netdevsim netdevsim2 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 3001.999676][ T31] audit: type=1400 audit(3001.880:32325): avc: denied { read append } for pid=22835 comm="syz.2.4908" name="timer" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3002.000217][ T31] audit: type=1400 audit(3001.880:32326): avc: denied { open } for pid=22835 comm="syz.2.4908" path="/dev/snd/timer" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3002.032916][ T31] audit: type=1400 audit(3001.910:32327): avc: denied { ioctl } for pid=22835 comm="syz.2.4908" path="/dev/snd/timer" dev="devtmpfs" ino=717 ioctlcmd=0x5404 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3009.231067][ T31] audit: type=1400 audit(3009.110:32328): avc: denied { execmem } for pid=22839 comm="syz.0.4909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3010.699795][ T31] audit: type=1400 audit(3010.580:32329): avc: denied { prog_load } for pid=22842 comm="syz.2.4910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3010.707727][ T31] audit: type=1400 audit(3010.590:32330): avc: denied { bpf } for pid=22842 comm="syz.2.4910" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3010.708121][ T31] audit: type=1400 audit(3010.590:32331): avc: denied { perfmon } for pid=22842 comm="syz.2.4910" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3010.708242][ T31] audit: type=1400 audit(3010.590:32332): avc: denied { bpf } for pid=22842 comm="syz.2.4910" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3010.804838][ T31] audit: type=1400 audit(3010.690:32333): avc: denied { read write } for pid=22844 comm="syz.2.4911" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3010.806065][ T31] audit: type=1400 audit(3010.690:32334): avc: denied { open } for pid=22844 comm="syz.2.4911" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3010.814075][ T31] audit: type=1400 audit(3010.700:32335): avc: denied { mounton } for pid=22844 comm="syz.2.4911" path="/151/file0" dev="tmpfs" ino=793 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3010.819094][ T31] audit: type=1400 audit(3010.700:32336): avc: denied { mount } for pid=22844 comm="syz.2.4911" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3011.344145][ T31] audit: type=1326 audit(3011.230:32337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22844 comm="syz.2.4911" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x0 [ 3014.305172][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 3014.305618][ T31] audit: type=1400 audit(3014.190:32347): avc: denied { read } for pid=22853 comm="syz.2.4914" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3014.305970][ T31] audit: type=1400 audit(3014.190:32348): avc: denied { open } for pid=22853 comm="syz.2.4914" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3014.315608][ T31] audit: type=1400 audit(3014.200:32349): avc: denied { ioctl } for pid=22853 comm="syz.2.4914" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3014.333119][ T31] audit: type=1400 audit(3014.210:32350): avc: denied { set_context_mgr } for pid=22853 comm="syz.2.4914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 3014.333597][ T31] audit: type=1400 audit(3014.210:32351): avc: denied { read } for pid=22853 comm="syz.2.4914" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3014.333889][ T31] audit: type=1400 audit(3014.210:32352): avc: denied { open } for pid=22853 comm="syz.2.4914" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3014.349273][ T31] audit: type=1400 audit(3014.230:32353): avc: denied { ioctl } for pid=22853 comm="syz.2.4914" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3014.370316][ T31] audit: type=1400 audit(3014.250:32354): avc: denied { read write } for pid=22853 comm="syz.2.4914" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3014.381275][ T31] audit: type=1400 audit(3014.260:32355): avc: denied { read write open } for pid=22853 comm="syz.2.4914" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3014.397694][ T31] audit: type=1400 audit(3014.280:32356): avc: denied { map } for pid=22853 comm="syz.2.4914" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 3014.436978][T22854] binder: 22853:22854 unknown command 0 [ 3014.443535][T22854] binder: 22853:22854 ioctl c0306201 20000b80 returned -22 [ 3019.653399][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 3019.653933][ T31] audit: type=1326 audit(3019.540:32373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22863 comm="syz.2.4917" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x0 [ 3021.715639][ T31] audit: type=1400 audit(3021.600:32374): avc: denied { unmount } for pid=20691 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3022.031660][ T31] audit: type=1400 audit(3021.910:32375): avc: denied { prog_load } for pid=22868 comm="syz.2.4918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3022.040850][ T31] audit: type=1400 audit(3021.910:32376): avc: denied { bpf } for pid=22868 comm="syz.2.4918" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3022.050426][ T31] audit: type=1400 audit(3021.930:32377): avc: denied { perfmon } for pid=22868 comm="syz.2.4918" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3022.067463][ T31] audit: type=1400 audit(3021.950:32378): avc: denied { bpf } for pid=22868 comm="syz.2.4918" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3022.091260][ T31] audit: type=1400 audit(3021.970:32379): avc: denied { bpf } for pid=22868 comm="syz.2.4918" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3022.092800][ T31] audit: type=1400 audit(3021.970:32380): avc: denied { prog_run } for pid=22868 comm="syz.2.4918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3022.092985][ T31] audit: type=1400 audit(3021.970:32381): avc: denied { create } for pid=22868 comm="syz.2.4918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3022.122802][ T31] audit: type=1400 audit(3022.000:32382): avc: denied { write } for pid=22868 comm="syz.2.4918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3031.368501][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 3031.371392][ T31] audit: type=1400 audit(3031.250:32397): avc: denied { read write } for pid=22878 comm="syz.0.4922" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3031.376242][ T31] audit: type=1400 audit(3031.260:32398): avc: denied { read write open } for pid=22878 comm="syz.0.4922" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3031.380199][ T31] audit: type=1400 audit(3031.260:32399): avc: denied { mounton } for pid=22878 comm="syz.0.4922" path="/150/file0" dev="tmpfs" ino=791 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3031.390629][ T31] audit: type=1400 audit(3031.270:32400): avc: denied { mount } for pid=22878 comm="syz.0.4922" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3032.418274][ T31] audit: type=1326 audit(3032.300:32401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22878 comm="syz.0.4922" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f40 code=0x0 [ 3034.466122][ T31] audit: type=1400 audit(3034.350:32402): avc: denied { unmount } for pid=21275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3034.837898][ T31] audit: type=1400 audit(3034.720:32403): avc: denied { create } for pid=22885 comm="syz.0.4923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3034.847392][ T31] audit: type=1400 audit(3034.730:32404): avc: denied { getopt } for pid=22885 comm="syz.0.4923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3034.866302][ T31] audit: type=1400 audit(3034.750:32405): avc: denied { read } for pid=22885 comm="syz.0.4923" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3034.867883][ T31] audit: type=1400 audit(3034.750:32406): avc: denied { open } for pid=22885 comm="syz.0.4923" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3037.816168][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 3037.816716][ T31] audit: type=1400 audit(3037.700:32414): avc: denied { create } for pid=22885 comm="syz.0.4923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3037.821217][ T31] audit: type=1400 audit(3037.700:32415): avc: denied { create } for pid=22885 comm="syz.0.4923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3037.864354][ T31] audit: type=1400 audit(3037.750:32416): avc: denied { bind } for pid=22885 comm="syz.0.4923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3037.867633][ T31] audit: type=1400 audit(3037.750:32417): avc: denied { accept } for pid=22885 comm="syz.0.4923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3037.893122][ T31] audit: type=1400 audit(3037.770:32418): avc: denied { setopt } for pid=22885 comm="syz.0.4923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3038.322980][ T31] audit: type=1400 audit(3038.200:32419): avc: denied { create } for pid=22888 comm="syz.2.4924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3038.327478][ T31] audit: type=1400 audit(3038.210:32420): avc: denied { ioctl } for pid=22888 comm="syz.2.4924" path="socket:[57484]" dev="sockfs" ino=57484 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3038.492908][ T31] audit: type=1400 audit(3038.370:32421): avc: denied { create } for pid=22890 comm="syz.2.4925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3038.499426][ T31] audit: type=1400 audit(3038.380:32422): avc: denied { setopt } for pid=22890 comm="syz.2.4925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3038.514112][ T31] audit: type=1400 audit(3038.400:32423): avc: denied { prog_load } for pid=22890 comm="syz.2.4925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3038.852428][T22902] comedi comedi3: 8255: I/O port conflict (0xfffffffb,4) [ 3038.853968][T22902] comedi comedi3: 8255: I/O port conflict (0x80000002,4) [ 3038.855946][T22902] 8<--- cut here --- [ 3038.856153][T22902] Unable to handle kernel paging request at virtual address fee00005 when write [ 3038.856303][T22902] [fee00005] *pgd=80000080007003, *pmd=00000000 [ 3038.857360][T22902] Internal error: Oops: a06 [#1] SMP ARM [ 3038.859021][T22902] Modules linked in: [ 3038.859547][T22902] CPU: 1 UID: 0 PID: 22902 Comm: syz.2.4928 Not tainted 6.16.0-rc5-syzkaller #0 PREEMPT [ 3038.860263][T22902] Hardware name: ARM-Versatile Express [ 3038.860643][T22902] PC is at subdev_8255_io+0x60/0x6c [ 3038.861014][T22902] LR is at subdev_8255_io+0x4c/0x6c [ 3038.861308][T22902] pc : [<813a4c50>] lr : [<813a4c3c>] psr: 60000013 [ 3038.861929][T22902] sp : df9b9cc0 ip : df9b9cc0 fp : df9b9cdc [ 3038.862782][T22902] r10: 00000002 r9 : 00000000 r8 : 00000084 [ 3038.863125][T22902] r7 : 00000002 r6 : 0000009b r5 : 83c50780 r4 : 00000005 [ 3038.863806][T22902] r3 : 0000009b r2 : fee00005 r1 : 00000001 r0 : 83c50780 [ 3038.864255][T22902] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 3038.864703][T22902] Control: 30c5387d Table: 85c23540 DAC: 00000000 [ 3038.865102][T22902] Register r0 information: slab kmalloc-192 start 83c50780 pointer offset 0 size 192 [ 3038.866357][T22902] Register r1 information: non-paged memory [ 3038.867109][T22902] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 3038.867850][T22902] Register r3 information: non-paged memory [ 3038.868205][T22902] Register r4 information: non-paged memory [ 3038.868596][T22902] Register r5 information: slab kmalloc-192 start 83c50780 pointer offset 0 size 192 [ 3038.869499][T22902] Register r6 information: non-paged memory [ 3038.869792][T22902] Register r7 information: non-paged memory [ 3038.870133][T22902] Register r8 information: non-paged memory [ 3038.870558][T22902] Register r9 information: NULL pointer [ 3038.870987][T22902] Register r10 information: non-paged memory [ 3038.871297][T22902] Register r11 information: 2-page vmalloc region starting at 0xdf9b8000 allocated at kernel_clone+0xac/0x3e4 [ 3038.872103][T22902] Register r12 information: 2-page vmalloc region starting at 0xdf9b8000 allocated at kernel_clone+0xac/0x3e4 [ 3038.872743][T22902] Process syz.2.4928 (pid: 22902, stack limit = 0xdf9b8000) [ 3038.873146][T22902] Stack: (0xdf9b9cc0 to 0xdf9ba000) [ 3038.873441][T22902] 9cc0: 813a4bf0 83c50780 00000002 00000002 df9b9cfc df9b9ce0 813a4928 813a4bfc [ 3038.873816][T22902] 9ce0: 00000002 80507884 8659e908 8659e908 df9b9d1c df9b9d00 813a4ce8 813a48dc [ 3038.874214][T22902] 9d00: 8659e908 83c50780 df9b9db4 00000002 df9b9d5c df9b9d20 813a4edc 813a4c68 [ 3038.874630][T22902] 9d20: 00000000 8491c100 82822670 00000000 00000000 829c5270 83c50780 00000000 [ 3038.874994][T22902] 9d40: df9b9d98 83c50780 00000000 82b15078 df9b9d94 df9b9d60 81393e00 813a4e2c [ 3038.875349][T22902] 9d60: 20000400 00000000 df9b9d84 20000400 83c50780 b5403587 20000400 855c6c00 [ 3038.875707][T22902] 9d80: 40946400 00000003 df9b9e4c df9b9d98 8138fa90 81393d08 35353238 00000000 [ 3038.876071][T22902] 9da0: 00000000 00000000 00000000 fffffffb 80000002 00000002 00100000 000088d7 [ 3038.876455][T22902] 9dc0: 0000008f fffffffd 0000000f 00000002 ffffffff 00000200 00000fff 00000344 [ 3038.876819][T22902] 9de0: 00000000 00000000 00000200 00000009 00000003 00000084 0000000e 00000000 [ 3038.877214][T22902] 9e00: 00000000 00000080 000007ff 00000004 ffffffff 0000b0c3 000807df 00000008 [ 3038.877582][T22902] 9e20: 000000f3 00000001 00000000 6bdb3c19 00000000 85c4f0c0 83c50780 20000400 [ 3038.877966][T22902] 9e40: df9b9f14 df9b9e50 81390a44 8138f9c4 00000000 00000000 00000000 6bdb3c19 [ 3038.878342][T22902] 9e60: 00000000 00000000 8246a3fc 0000005f 83fb3a58 83c507b0 841ed564 855c6c00 [ 3038.878742][T22902] 9e80: df9b9ee4 df9b9e90 80795a0c 8078bcfc 00000064 00000001 00000000 df9b9eac [ 3038.879145][T22902] 9ea0: 85be7850 834f56e8 00006400 0000000b df9b9ea0 00000000 df9b9d30 6bdb3c19 [ 3038.879552][T22902] 9ec0: 85c4f0c0 40946400 20000400 20000400 00000003 85c4f0c0 df9b9ef4 df9b9ee8 [ 3038.879930][T22902] 9ee0: 80795b2c 6bdb3c19 df9b9f14 40946400 00000000 85c4f0c1 20000400 00000003 [ 3038.880319][T22902] 9f00: 85c4f0c0 855c6c00 df9b9fa4 df9b9f18 8056e2dc 81390474 ecac8b10 855c6c00 [ 3038.880752][T22902] 9f20: df9b9f3c df9b9f30 81a2cd08 81a2cbd8 df9b9f54 df9b9f40 80261ffc 80293598 [ 3038.881152][T22902] 9f40: df9b9fb0 40000000 df9b9f84 df9b9f58 802229ec 80261fb8 00000000 8281d09c [ 3038.881542][T22902] 9f60: df9b9fb0 0014c4a0 ecac8b10 80222940 00000000 6bdb3c19 df9b9fac 00000000 [ 3038.882126][T22902] 9f80: 00000000 002f6300 00000036 8020029c 855c6c00 00000036 00000000 df9b9fa8 [ 3038.882801][T22902] 9fa0: 80200060 8056e1b8 00000000 00000000 00000003 40946400 20000400 00000000 [ 3038.883427][T22902] 9fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76b1c0bc [ 3038.883814][T22902] 9fe0: 76b1bec0 76b1beb0 000193a4 00131f40 60000010 00000003 00000000 00000000 [ 3038.884222][T22902] Call trace: [ 3038.884482][T22902] [<813a4bf0>] (subdev_8255_io) from [<813a4928>] (subdev_8255_do_config+0x58/0x60) [ 3038.884964][T22902] r7:00000002 r6:00000002 r5:83c50780 r4:813a4bf0 [ 3038.885291][T22902] [<813a48d0>] (subdev_8255_do_config) from [<813a4ce8>] (subdev_8255_io_init+0x8c/0x9c) [ 3038.888620][T22902] r4:8659e908 [ 3038.888833][T22902] [<813a4c5c>] (subdev_8255_io_init) from [<813a4edc>] (dev_8255_attach+0xbc/0x114) [ 3038.889282][T22902] r7:00000002 r6:df9b9db4 r5:83c50780 r4:8659e908 [ 3038.889575][T22902] [<813a4e20>] (dev_8255_attach) from [<81393e00>] (comedi_device_attach+0x104/0x240) [ 3038.890031][T22902] r10:82b15078 r9:00000000 r8:83c50780 r7:df9b9d98 r6:00000000 r5:83c50780 [ 3038.890390][T22902] r4:829c5270 [ 3038.890674][T22902] [<81393cfc>] (comedi_device_attach) from [<8138fa90>] (do_devconfig_ioctl+0xd8/0x1e0) [ 3038.891177][T22902] r10:00000003 r9:40946400 r8:855c6c00 r7:20000400 r6:b5403587 r5:83c50780 [ 3038.891624][T22902] r4:20000400 [ 3038.892108][T22902] [<8138f9b8>] (do_devconfig_ioctl) from [<81390a44>] (comedi_unlocked_ioctl+0x5dc/0x1b94) [ 3038.892752][T22902] r6:20000400 r5:83c50780 r4:85c4f0c0 [ 3038.893025][T22902] [<81390468>] (comedi_unlocked_ioctl) from [<8056e2dc>] (sys_ioctl+0x130/0xdc8) [ 3038.893435][T22902] r10:855c6c00 r9:85c4f0c0 r8:00000003 r7:20000400 r6:85c4f0c1 r5:00000000 [ 3038.893780][T22902] r4:40946400 [ 3038.893984][T22902] [<8056e1ac>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3038.894353][T22902] Exception stack(0xdf9b9fa8 to 0xdf9b9ff0) [ 3038.894667][T22902] 9fa0: 00000000 00000000 00000003 40946400 20000400 00000000 [ 3038.895052][T22902] 9fc0: 00000000 00000000 002f6300 00000036 002e0000 00000000 00006364 76b1c0bc [ 3038.895427][T22902] 9fe0: 76b1bec0 76b1beb0 000193a4 00131f40 [ 3038.895845][T22902] r10:00000036 r9:855c6c00 r8:8020029c r7:00000036 r6:002f6300 r5:00000000 [ 3038.896215][T22902] r4:00000000 [ 3038.896676][T22902] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 3038.897440][T22902] ---[ end trace 0000000000000000 ]--- [ 3038.898301][T22902] Kernel panic - not syncing: Fatal exception [ 3038.900723][T22902] Rebooting in 86400 seconds.. VM DIAGNOSIS: 23:35:57 Registers: info registers vcpu 0 CPU#0 R00=829bbc00 R01=82409cc0 R02=840705a0 R03=81a2d540 R04=82ab22c0 R05=56e92c00 R06=000943d2 R07=000002c3 R08=dddc6130 R09=dddc6180 R10=840705a0 R11=df801e74 R12=df801e78 R13=df801e68 R14=812d9764 R15=81a2d550 PSR=60000193 -ZC- A S svc32 s00=66667830 s01=66666666 d00=6666666666667830 s02=3033205b s03=382e3833 d01=382e38333033205b s04=32343235 s05=545b5d38 d02=545b5d3832343235 s06=30393232 s07=63205d32 d03=63205d3230393232 s08=64656d6f s09=6f632069 d04=6f63206964656d6f s10=6964656d s11=38203a33 d05=38203a336964656d s12=3a353532 s13=4f2f4920 d06=4f2f49203a353532 s14=726f7020 s15=6f632074 d07=6f632074726f7020 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000e2b R01=80000e2b R02=00000e2b R03=80000193 R04=df9b9a3c R05=0000003a R06=dddd83d5 R07=00000000 R08=00000000 R09=00000000 R10=82828450 R11=df9b99e4 R12=00000000 R13=df9b99d0 R14=0000000c R15=802e9024 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000