last executing test programs: 21.634958631s ago: executing program 0 (id=1992): prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4b) close(r0) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000140)={0x0, &(0x7f0000000380)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000003c0)={0x0, 0x0, r2, 0x0}) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x101, 0x259ab454}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) keyctl$set_reqkey_keyring(0xf, 0xfffffffb) prlimit64(r5, 0xa, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) write$uinput_user_dev(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000005fc0)='//\xf2/\x06\b/\xdf/o\xdc\xea\x95\x9a\x82\x10\x97W\x8f7\x98\x9b\\/\\\xf9\rmD\x94)U\xdb\x15X.I\n}\xf3\x9d\xe4_\x05\x9cqf4I^#b?9\xde\xafu\'\x83L\xe0\x97\xe1n_\xa4%\xb1\x97\x93\xafv\xce/\\\xb4L\xf2_\xa7\xfb\xf4\x84\x1fA\xeas^\xef\xa2\x85\xa3!\xfb\x93\xd7R\xab2\x1eW\xe9h\x9b\xf7ul\xf9D\xd4\x82X5\x13\xaa\x87\xf9\xba\xa9m\x14\x14R_\x9a\\>4\xce\x8e_#\xf8D\xb1\xdep\x01\xcc:\xa6\xc5n\xeb\xab\xf70\x99\xef\x8b0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) 1.767568854s ago: executing program 0 (id=2002): r0 = fsopen(&(0x7f0000000040)='fuseblk\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000004c0)='j\x95\'\x8aC\x16\xca\\', &(0x7f0000000c40)='\xe6usek\v\xf6u%\x9b\x00\x00\xad\xeb\x00\x00\x00\x00\x01\x80\x00\x00\xcf\x9b\x9f\b\xb6\xfe\xc8\xda~-\xf5S>\xb8\x86\xfc\x9cVR\x82\x9a\xbdp\xbd\x83w\xf9Z\xd2\xcb\xcdF\xd0#N7\x17\xfc\x1e\xf1\x97\xffxi\xe0KE}]\x8e\xca\xe3+\xc8\x98\x03\x91\x88(\bn\x7f\x0e\x85\xa5\xb4\n?_\xc9\xef\xe0Q\xdb\xb6\xa5\x81t\x06\xda\x95\x935\xf1\x18\xac\x00\xf0\xff\xff\xbd\xb5\xa1\x06\xfd\x01\x00\x00\x00\x0f\xf8\xe3\x8a\x1f\x9c\xf3\xc5\x1f\xf9\xbf[\xd13\xb3\xd3j\r6\x7f', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000140)='{:\'@-\x00', &(0x7f0000000180)='%*.\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000003c0)='\x00', &(0x7f0000000400)='(!\xef(.(\\-]\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000200)='^](*\r\\!\x00', &(0x7f0000000500)='{:\'@-\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000b80)='\xe0\"\xef\xb1\xea\xe6\x9c\xe6\xc8M\xdb\x86\xb3\x8b\xbe\xd5\xbdB\x92\xa0\x19-+a\x13qQ\xd5f39hSr\xafbB\xe2\xe8\xcd\x1bf\x18\x7f\xf27E#\"\xab\x99\xec\x88\x8d\xd8C\x0f\x95\xff\xfeG\xf9t\xb1 \xcc\xc5\xbb\x88\xb6\xd2\xf2Jwq\xf8oG] (common_lsm_audit+0x108/0x14c) [ 1331.266008][T10678] r10:00004000 r9:ed459cf4 r8:807c2aa4 r7:807c381c r6:ed459cf4 r5:84f02508 [ 1331.266027][T10678] r4:8472dbe8 [ 1331.266042][T10678] [<807eb2cc>] (common_lsm_audit) from [<807c3d5c>] (slow_avc_audit+0xbc/0x114) [ 1331.266104][T10678] r8:0000002c r7:00000000 r6:0000005f r5:0000005f r4:0000005f [ 1331.266121][T10678] [<807c3ca0>] (slow_avc_audit) from [<807c47b0>] (avc_has_perm+0xe4/0xf4) [ 1331.266263][T10678] r5:0000005f r4:00000004 [ 1331.266282][T10678] [<807c46cc>] (avc_has_perm) from [<807cac60>] (sock_has_perm+0xd0/0xfc) [ 1331.266342][T10678] r9:00000000 r8:8472d400 r7:85558480 r6:00000004 r5:857aa800 r4:00000000 [ 1331.266359][T10678] [<807cab90>] (sock_has_perm) from [<807cad14>] (selinux_socket_sendmsg+0x18/0x1c) [ 1331.266417][T10678] r8:ed459dcc r7:00000000 r6:00000014 r5:ed459f20 r4:834a8c80 [ 1331.266434][T10678] [<807cacfc>] (selinux_socket_sendmsg) from [<807bcebc>] (security_socket_sendmsg+0x80/0x1d4) [ 1331.266494][T10678] [<807bce3c>] (security_socket_sendmsg) from [<815c10c8>] (__sock_sendmsg+0x1c/0x78) [ 1331.266562][T10678] r7:00000000 r6:834a8c80 r5:ed459f20 r4:ed459f20 [ 1331.266580][T10678] [<815c10ac>] (__sock_sendmsg) from [<815c1fb0>] (____sys_sendmsg+0x238/0x2c4) [ 1331.266641][T10678] r7:00000000 r6:00000000 r5:834a8c80 r4:ed459f20 [ 1331.266658][T10678] [<815c1d78>] (____sys_sendmsg) from [<815c23b0>] (___sys_sendmsg+0x9c/0xd0) [ 1331.266724][T10678] r10:00000128 r9:200002c0 r8:00004000 r7:00000000 r6:834a8c80 r5:ed459f20 [ 1331.267438][T10678] r4:00000000 [ 1331.267517][T10678] [<815c2314>] (___sys_sendmsg) from [<815c4418>] (__sys_sendmsg+0x8c/0xe0) [ 1331.267627][T10678] r9:8472d400 r8:8b8c6b40 r7:00004000 r6:200002c0 r5:8b8c6b41 r4:00000004 [ 1331.267741][T10678] [<815c438c>] (__sys_sendmsg) from [<815c4480>] (sys_sendmsg+0x14/0x18) [ 1331.267836][T10678] r8:8020029c r7:00000128 r6:0012eaf4 r5:00000000 r4:00000000 [ 1331.267943][T10678] [<815c446c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1331.268173][T10678] Exception stack(0xed459fa8 to 0xed459ff0) [ 1331.268258][T10678] 9fa0: 00000000 00000000 00000004 200002c0 00004000 00000000 [ 1331.268334][T10678] 9fc0: 00000000 00000000 0012eaf4 00000128 003462d8 00000000 00000001 76f8e0dc [ 1331.268563][T10678] 9fe0: 76f8de88 76f8de78 00018ba0 001300f0 [ 1331.696924][ T28] kauditd_printk_skb: 46 callbacks suppressed [ 1331.697184][ T28] audit: type=1400 audit(1331.610:20686): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1331.702171][ T28] audit: type=1400 audit(1331.610:20687): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1331.709928][ T28] audit: type=1400 audit(1331.620:20688): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1332.322278][ T28] audit: type=1400 audit(1332.230:20689): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1332.535275][ T28] audit: type=1400 audit(1332.440:20690): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1332.535607][ T28] audit: type=1400 audit(1332.440:20691): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1332.910998][ T28] audit: type=1400 audit(1332.820:20692): avc: denied { create } for pid=10681 comm="syz.0.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1332.945129][ T28] audit: type=1400 audit(1332.850:20693): avc: denied { setopt } for pid=10681 comm="syz.0.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1332.996271][ T28] audit: type=1400 audit(1332.880:20694): avc: denied { setopt } for pid=10681 comm="syz.0.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1332.996726][ T28] audit: type=1400 audit(1332.900:20695): avc: denied { getopt } for pid=10681 comm="syz.0.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1336.779189][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 1336.779501][ T28] audit: type=1400 audit(1336.690:20741): avc: denied { create } for pid=10689 comm="syz.1.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1336.837539][ T28] audit: type=1400 audit(1336.750:20742): avc: denied { write } for pid=10689 comm="syz.1.1849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1336.853861][ T28] audit: type=1400 audit(1336.760:20743): avc: denied { module_request } for pid=10689 comm="syz.1.1849" kmod="net-pf-16-proto-16-family-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1337.292234][ T28] audit: type=1400 audit(1337.200:20744): avc: denied { read } for pid=10689 comm="syz.1.1849" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1337.292542][ T28] audit: type=1400 audit(1337.200:20745): avc: denied { read open } for pid=10689 comm="syz.1.1849" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1337.350058][ T28] audit: type=1400 audit(1337.240:20746): avc: denied { read } for pid=10689 comm="syz.1.1849" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1337.350294][ T28] audit: type=1400 audit(1337.250:20747): avc: denied { read open } for pid=10689 comm="syz.1.1849" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1337.350479][ T28] audit: type=1400 audit(1337.260:20748): avc: denied { ioctl } for pid=10689 comm="syz.1.1849" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1337.390419][ T28] audit: type=1400 audit(1337.300:20749): avc: denied { create } for pid=10697 comm="syz.0.1851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1337.422365][ T28] audit: type=1400 audit(1337.330:20750): avc: denied { setopt } for pid=10697 comm="syz.0.1851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1342.592400][ T28] kauditd_printk_skb: 54 callbacks suppressed [ 1342.592755][ T28] audit: type=1400 audit(1342.500:20805): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1342.626855][ T28] audit: type=1400 audit(1342.540:20806): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1342.631559][ T28] audit: type=1400 audit(1342.540:20807): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1343.166320][ T28] audit: type=1400 audit(1343.080:20808): avc: denied { create } for pid=10721 comm="syz.1.1854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1343.353794][ T28] audit: type=1400 audit(1343.260:20809): avc: denied { create } for pid=10721 comm="syz.1.1854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1343.565603][ T28] audit: type=1400 audit(1343.480:20810): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1343.570082][ T28] audit: type=1400 audit(1343.480:20811): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1343.609663][ T28] audit: type=1400 audit(1343.520:20812): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1344.118727][ T28] audit: type=1400 audit(1344.030:20813): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1344.278996][ T28] audit: type=1400 audit(1344.190:20814): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1347.862919][ T28] kauditd_printk_skb: 48 callbacks suppressed [ 1347.863265][ T28] audit: type=1400 audit(1347.770:20863): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1347.900211][ T28] audit: type=1400 audit(1347.810:20864): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1347.903133][ T28] audit: type=1400 audit(1347.810:20865): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1348.282142][ T28] audit: type=1400 audit(1348.190:20866): avc: denied { read } for pid=10733 comm="syz.1.1858" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1348.286392][ T28] audit: type=1400 audit(1348.190:20867): avc: denied { read open } for pid=10733 comm="syz.1.1858" path="net:[4026532659]" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1348.323744][ T28] audit: type=1400 audit(1348.230:20868): avc: denied { create } for pid=10733 comm="syz.1.1858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1348.410346][ T28] audit: type=1400 audit(1348.280:20869): avc: denied { write } for pid=10733 comm="syz.1.1858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1348.410772][ T28] audit: type=1400 audit(1348.290:20870): avc: denied { module_request } for pid=10733 comm="syz.1.1858" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1348.889197][ T28] audit: type=1400 audit(1348.790:20871): avc: denied { ioctl } for pid=10733 comm="syz.1.1858" path="socket:[21448]" dev="sockfs" ino=21448 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1348.889614][ T28] audit: type=1400 audit(1348.790:20872): avc: denied { module_request } for pid=10733 comm="syz.1.1858" kmod="netdev-wpan4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1352.882694][ T28] kauditd_printk_skb: 126 callbacks suppressed [ 1352.883151][ T28] audit: type=1400 audit(1352.790:21000): avc: denied { read } for pid=10744 comm="syz.1.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1352.891372][ T28] audit: type=1400 audit(1352.800:21001): avc: denied { read } for pid=10744 comm="syz.1.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1352.895012][ T28] audit: type=1400 audit(1352.800:21002): avc: denied { write } for pid=10744 comm="syz.1.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1352.895941][ T28] audit: type=1400 audit(1352.770:20999): avc: denied { write } for pid=10744 comm="syz.1.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1352.982364][ T28] audit: type=1400 audit(1352.890:21003): avc: denied { write } for pid=10744 comm="syz.1.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1353.030664][ T28] audit: type=1400 audit(1352.940:21004): avc: denied { write } for pid=10744 comm="syz.1.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1353.051227][ T28] audit: type=1400 audit(1352.960:21005): avc: denied { read } for pid=10744 comm="syz.1.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1353.055005][ T28] audit: type=1400 audit(1352.960:21006): avc: denied { read } for pid=10744 comm="syz.1.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1353.099949][ T28] audit: type=1400 audit(1353.010:21007): avc: denied { ioctl } for pid=10744 comm="syz.1.1859" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1353.103235][ T28] audit: type=1400 audit(1353.010:21008): avc: denied { write } for pid=10744 comm="syz.1.1859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1358.265597][ T28] kauditd_printk_skb: 205 callbacks suppressed [ 1358.266026][ T28] audit: type=1400 audit(1358.170:21214): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1358.266368][ T28] audit: type=1400 audit(1358.170:21215): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1358.266610][ T28] audit: type=1400 audit(1358.170:21216): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1358.753292][ T28] audit: type=1400 audit(1358.660:21217): avc: denied { setopt } for pid=10766 comm="syz.1.1864" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1358.817173][ T28] audit: type=1400 audit(1358.730:21218): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1358.822850][ T28] audit: type=1400 audit(1358.730:21219): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1358.830162][ T28] audit: type=1400 audit(1358.740:21220): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1358.913351][ T28] audit: type=1400 audit(1358.820:21221): avc: denied { unmount } for pid=7120 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1359.079364][ T28] audit: type=1400 audit(1358.990:21222): avc: denied { create } for pid=10777 comm="syz.0.1866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1359.091788][ T28] audit: type=1400 audit(1359.000:21223): avc: denied { ioctl } for pid=10777 comm="syz.0.1866" path="socket:[21501]" dev="sockfs" ino=21501 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1363.411675][ T28] kauditd_printk_skb: 52 callbacks suppressed [ 1363.411916][ T28] audit: type=1400 audit(1363.320:21276): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1363.423632][ T28] audit: type=1400 audit(1363.330:21277): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1363.437461][ T28] audit: type=1400 audit(1363.350:21278): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1363.481626][ T28] audit: type=1400 audit(1363.390:21279): avc: denied { read } for pid=10799 comm="syz.0.1871" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1363.485936][ T28] audit: type=1400 audit(1363.390:21280): avc: denied { read open } for pid=10799 comm="syz.0.1871" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1363.501004][T10800] FAULT_INJECTION: forcing a failure. [ 1363.501004][T10800] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.501553][T10800] CPU: 1 UID: 0 PID: 10800 Comm: syz.0.1871 Not tainted syzkaller #0 PREEMPT [ 1363.501683][T10800] Hardware name: ARM-Versatile Express [ 1363.501716][T10800] Call trace: [ 1363.501806][T10800] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1363.501929][T10800] r7:60000013 r6:60000013 r5:822a7808 r4:00000000 [ 1363.501950][T10800] [<80201af0>] (show_stack) from [<8021e45c>] (dump_stack_lvl+0x5c/0x70) [ 1363.502008][T10800] [<8021e400>] (dump_stack_lvl) from [<8021e488>] (dump_stack+0x18/0x1c) [ 1363.502075][T10800] r7:00000000 r6:00000000 r5:83f60000 r4:829193d0 [ 1363.502093][T10800] [<8021e470>] (dump_stack) from [<809baae0>] (should_fail_ex+0x1c0/0x224) [ 1363.502153][T10800] [<809ba920>] (should_fail_ex) from [<80542f88>] (should_failslab+0x6c/0x94) [ 1363.502333][T10800] r8:00000000 r7:00000000 r6:83001180 r5:00000d40 r4:0000001f [ 1363.502435][T10800] [<80542f1c>] (should_failslab) from [<80522954>] (__kmalloc_noprof+0xa4/0x39c) [ 1363.502501][T10800] [<805228b0>] (__kmalloc_noprof) from [<807f9dfc>] (tomoyo_encode2+0x64/0xec) [ 1363.502757][T10800] r10:00000fff r9:83180c00 r8:00000000 r7:834d9f68 r6:8b8c61a8 r5:85ca5ffc [ 1363.502829][T10800] r4:85ca5fe8 [ 1363.502956][T10800] [<807f9d98>] (tomoyo_encode2) from [<807f9ea8>] (tomoyo_encode+0x24/0x30) [ 1363.503037][T10800] r9:83180c00 r8:00000000 r7:834d9f68 r6:8b8c61a8 r5:00001000 r4:85ca5fe9 [ 1363.503130][T10800] [<807f9e84>] (tomoyo_encode) from [<807f9f34>] (tomoyo_realpath_from_path+0x80/0x16c) [ 1363.503213][T10800] r5:00001000 r4:85ca5000 [ 1363.503266][T10800] [<807f9eb4>] (tomoyo_realpath_from_path) from [<807f5fb8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1363.503382][T10800] r10:00000000 r9:00000003 r8:8b8c6180 r7:400454e2 r6:81cd9eec r5:00000004 [ 1363.503480][T10800] r4:8b8c61a8 r3:826ca380 [ 1363.503570][T10800] [<807f5eec>] (tomoyo_path_number_perm) from [<807fa90c>] (tomoyo_file_ioctl+0x1c/0x20) [ 1363.503695][T10800] r10:83f60000 r9:00000003 r8:8b8c6180 r7:00000000 r6:00000000 r5:400454e2 [ 1363.503900][T10800] r4:8b8c6180 [ 1363.503994][T10800] [<807fa8f0>] (tomoyo_file_ioctl) from [<807a63a8>] (security_file_ioctl+0x80/0x1d4) [ 1363.504076][T10800] [<807a6328>] (security_file_ioctl) from [<8058f864>] (sys_ioctl+0x4c/0xb5c) [ 1363.504173][T10800] r7:00000000 r6:400454e2 r5:8b8c6181 r4:00000000 [ 1363.504200][T10800] [<8058f818>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1363.504386][T10800] Exception stack(0xed85dfa8 to 0xed85dff0) [ 1363.504435][T10800] dfa0: 00000000 00000000 00000003 400454e2 00000000 00000000 [ 1363.504474][T10800] dfc0: 00000000 00000000 0012eaf4 00000036 003462d8 00000000 00000001 76f8e0dc [ 1363.504508][T10800] dfe0: 76f8de88 76f8de78 00018ba0 001300f0 [ 1363.504546][T10800] r10:00000036 r9:83f60000 r8:8020029c r7:00000036 r6:0012eaf4 r5:00000000 [ 1363.504566][T10800] r4:00000000 [ 1363.505316][T10800] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1363.508895][ T28] audit: type=1400 audit(1363.420:21281): avc: denied { ioctl } for pid=10799 comm="syz.0.1871" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54e2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1363.901642][ T28] audit: type=1400 audit(1363.810:21282): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1363.914929][ T28] audit: type=1400 audit(1363.820:21283): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1363.916207][ T28] audit: type=1400 audit(1363.820:21284): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1363.972151][ T28] audit: type=1400 audit(1363.880:21285): avc: denied { read write } for pid=10801 comm="syz.1.1872" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1364.158498][T10802] FAULT_INJECTION: forcing a failure. [ 1364.158498][T10802] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1364.159053][T10802] CPU: 1 UID: 0 PID: 10802 Comm: syz.1.1872 Not tainted syzkaller #0 PREEMPT [ 1364.159179][T10802] Hardware name: ARM-Versatile Express [ 1364.159213][T10802] Call trace: [ 1364.159295][T10802] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1364.159406][T10802] r7:60000013 r6:60000013 r5:822a7808 r4:00000000 [ 1364.159427][T10802] [<80201af0>] (show_stack) from [<8021e45c>] (dump_stack_lvl+0x5c/0x70) [ 1364.159502][T10802] [<8021e400>] (dump_stack_lvl) from [<8021e488>] (dump_stack+0x18/0x1c) [ 1364.159562][T10802] r7:00000000 r6:00000000 r5:83f64800 r4:8295121c [ 1364.159578][T10802] [<8021e470>] (dump_stack) from [<809baae0>] (should_fail_ex+0x1c0/0x224) [ 1364.159640][T10802] [<809ba920>] (should_fail_ex) from [<809bab58>] (should_fail+0x14/0x18) [ 1364.159703][T10802] r8:00000000 r7:00000000 r6:000000b4 r5:20000000 r4:8334f3c0 [ 1364.159721][T10802] [<809bab44>] (should_fail) from [<809bab78>] (should_fail_usercopy+0x1c/0x20) [ 1364.159771][T10802] [<809bab5c>] (should_fail_usercopy) from [<809c0ad8>] (strncpy_from_user+0x20/0x1b0) [ 1364.159838][T10802] [<809c0ab8>] (strncpy_from_user) from [<80583988>] (do_getname+0x4c/0x14c) [ 1364.159911][T10802] r10:8334f3cc r9:83f64800 r8:00000000 r7:00000000 r6:20000000 r5:824ad8b0 [ 1364.159930][T10802] r4:8334f3c0 [ 1364.159946][T10802] [<8058393c>] (do_getname) from [<80589ae4>] (user_path_at+0x30/0x6c) [ 1364.160009][T10802] r10:0000013d r9:83f64800 r8:8b8d8780 r7:ed8bdf6c r6:ffffff9c r5:00000000 [ 1364.160030][T10802] r4:4200004b r3:ed8bdf6c [ 1364.160047][T10802] [<80589ab4>] (user_path_at) from [<805de340>] (sys_inotify_add_watch+0xa0/0x400) [ 1364.160113][T10802] r7:20000000 r6:83f64800 r5:8b8d8781 r4:4200004b [ 1364.160133][T10802] [<805de2a0>] (sys_inotify_add_watch) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1364.160185][T10802] Exception stack(0xed8bdfa8 to 0xed8bdff0) [ 1364.160358][T10802] dfa0: 00000000 00000000 00000005 20000000 4200004b 00000000 [ 1364.160404][T10802] dfc0: 00000000 00000000 0012eaf4 0000013d 003462d8 00000000 00000001 76f980dc [ 1364.160462][T10802] dfe0: 76f97e88 76f97e78 00018ba0 001300f0 [ 1364.160553][T10802] r10:0000013d r9:83f64800 r8:8020029c r7:0000013d r6:0012eaf4 r5:00000000 [ 1364.160644][T10802] r4:00000000 [ 1368.845533][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 1368.846041][ T28] audit: type=1400 audit(1368.730:21315): avc: denied { write } for pid=10815 comm="syz.1.1876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1368.889364][ T28] audit: type=1400 audit(1368.800:21316): avc: denied { read } for pid=10815 comm="syz.1.1876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1369.351465][ T28] audit: type=1400 audit(1369.260:21317): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1369.353709][ T28] audit: type=1400 audit(1369.260:21318): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1369.371054][ T28] audit: type=1400 audit(1369.280:21319): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1370.521470][ T28] audit: type=1400 audit(1370.430:21320): avc: denied { read } for pid=10820 comm="syz.1.1877" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1370.550267][ T28] audit: type=1400 audit(1370.460:21321): avc: denied { read open } for pid=10820 comm="syz.1.1877" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1370.735156][ T28] audit: type=1400 audit(1370.620:21322): avc: denied { create } for pid=10820 comm="syz.1.1877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1370.740391][ T28] audit: type=1400 audit(1370.650:21323): avc: denied { write } for pid=10820 comm="syz.1.1877" path="socket:[22587]" dev="sockfs" ino=22587 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1370.783740][ T28] audit: type=1400 audit(1370.690:21324): avc: denied { write } for pid=10820 comm="syz.1.1877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1373.860773][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 1373.861211][ T28] audit: type=1400 audit(1373.770:21354): avc: denied { create } for pid=10829 comm="syz.0.1881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1373.989537][ T28] audit: type=1400 audit(1373.900:21355): avc: denied { write } for pid=10829 comm="syz.0.1881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1374.220681][ T28] audit: type=1400 audit(1374.130:21356): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1374.223300][ T28] audit: type=1400 audit(1374.130:21357): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1374.230399][ T28] audit: type=1400 audit(1374.140:21358): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1374.816666][ T28] audit: type=1400 audit(1374.700:21359): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1374.817031][ T28] audit: type=1400 audit(1374.710:21360): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1374.817389][ T28] audit: type=1400 audit(1374.710:21361): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1374.817596][ T28] audit: type=1400 audit(1374.710:21362): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1374.841762][ T28] audit: type=1400 audit(1374.750:21363): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1378.962752][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 1378.963221][ T28] audit: type=1400 audit(1378.870:21394): avc: denied { write } for pid=10847 comm="syz.1.1889" name="mouse0" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1378.968015][ T28] audit: type=1400 audit(1378.880:21395): avc: denied { write open } for pid=10847 comm="syz.1.1889" path="/dev/input/mouse0" dev="devtmpfs" ino=704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1379.022411][T10848] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1546 sclass=netlink_route_socket pid=10848 comm=syz.1.1889 [ 1379.071197][ T28] audit: type=1400 audit(1378.980:21396): avc: denied { read write } for pid=10847 comm="syz.1.1889" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1379.099349][ T28] audit: type=1400 audit(1379.010:21397): avc: denied { read write open } for pid=10847 comm="syz.1.1889" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1379.133390][ T28] audit: type=1400 audit(1379.040:21398): avc: denied { ioctl } for pid=10847 comm="syz.1.1889" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1379.136836][T10848] binder: 10847:10848 ioctl 40046205 0 returned -22 [ 1379.297502][ T28] audit: type=1400 audit(1379.210:21399): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1379.300155][ T28] audit: type=1400 audit(1379.210:21400): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1379.325240][ T28] audit: type=1400 audit(1379.210:21401): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1379.903552][ T28] audit: type=1400 audit(1379.810:21402): avc: denied { read } for pid=10849 comm="syz.1.1890" name="event1" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1379.927496][ T28] audit: type=1400 audit(1379.840:21403): avc: denied { read open } for pid=10849 comm="syz.1.1890" path="/dev/input/event1" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1384.025761][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 1384.026264][ T28] audit: type=1400 audit(1383.880:21443): avc: denied { write } for pid=10857 comm="syz.1.1894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1384.143208][ T28] audit: type=1400 audit(1384.050:21444): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1384.173432][ T28] audit: type=1400 audit(1384.080:21445): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1384.183977][ T28] audit: type=1400 audit(1384.090:21446): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1384.444230][ T28] audit: type=1400 audit(1384.350:21447): avc: denied { read } for pid=10862 comm="syz.1.1895" name="event1" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1384.462910][ T28] audit: type=1400 audit(1384.370:21448): avc: denied { read open } for pid=10862 comm="syz.1.1895" path="/dev/input/event1" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1384.499259][ T28] audit: type=1400 audit(1384.410:21449): avc: denied { ioctl } for pid=10862 comm="syz.1.1895" path="/dev/input/event1" dev="devtmpfs" ino=705 ioctlcmd=0x4584 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1384.683480][ T28] audit: type=1400 audit(1384.590:21450): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1384.699302][ T28] audit: type=1400 audit(1384.610:21451): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1384.705024][ T28] audit: type=1400 audit(1384.610:21452): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1386.151064][T10874] fuse: Unknown parameter 'roktmode' [ 1388.485727][ T3695] usb 2-1: new low-speed USB device number 39 using dummy_hcd [ 1388.645443][ T3695] usb 2-1: Invalid ep0 maxpacket: 16 [ 1388.785395][ T3695] usb 2-1: new low-speed USB device number 40 using dummy_hcd [ 1388.935431][ T3695] usb 2-1: Invalid ep0 maxpacket: 16 [ 1388.937092][ T3695] usb usb2-port1: attempt power cycle [ 1389.218922][ T28] kauditd_printk_skb: 99 callbacks suppressed [ 1389.219644][ T28] audit: type=1400 audit(1389.130:21550): avc: denied { ioctl } for pid=10883 comm="syz.1.1903" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1389.286151][ T3695] usb 2-1: new low-speed USB device number 41 using dummy_hcd [ 1389.324751][ T3695] usb 2-1: Invalid ep0 maxpacket: 16 [ 1389.327140][ T28] audit: type=1400 audit(1389.230:21551): avc: denied { ioctl } for pid=10883 comm="syz.1.1903" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1389.341583][ T28] audit: type=1400 audit(1389.250:21552): avc: denied { ioctl } for pid=10883 comm="syz.1.1903" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1389.369420][ T28] audit: type=1400 audit(1389.280:21553): avc: denied { ioctl } for pid=10883 comm="syz.1.1903" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1389.388288][ T28] audit: type=1400 audit(1389.300:21554): avc: denied { ioctl } for pid=10883 comm="syz.1.1903" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1389.410718][ T28] audit: type=1400 audit(1389.320:21555): avc: denied { ioctl } for pid=10883 comm="syz.1.1903" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1389.465436][ T3695] usb 2-1: new low-speed USB device number 42 using dummy_hcd [ 1389.491038][ T3695] usb 2-1: Invalid ep0 maxpacket: 16 [ 1389.491929][ T3695] usb usb2-port1: unable to enumerate USB device [ 1389.495047][ T28] audit: type=1400 audit(1389.400:21556): avc: denied { ioctl } for pid=10883 comm="syz.1.1903" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1389.512929][ T28] audit: type=1400 audit(1389.420:21557): avc: denied { ioctl } for pid=10883 comm="syz.1.1903" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1389.540219][ T28] audit: type=1400 audit(1389.450:21558): avc: denied { ioctl } for pid=10883 comm="syz.1.1903" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1398.418183][ T28] audit: type=1400 audit(1398.330:21559): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1398.425122][ T28] audit: type=1400 audit(1398.330:21560): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1398.458224][ T28] audit: type=1400 audit(1398.370:21561): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1399.482059][ T28] audit: type=1400 audit(1399.390:21562): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1399.509488][ T28] audit: type=1400 audit(1399.420:21563): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1399.534188][ T28] audit: type=1400 audit(1399.430:21564): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1399.823815][ T28] audit: type=1400 audit(1399.730:21565): avc: denied { write } for pid=10896 comm="syz.1.1905" name="comedi4" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1399.838438][ T28] audit: type=1400 audit(1399.750:21566): avc: denied { write open } for pid=10896 comm="syz.1.1905" path="/dev/comedi4" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1399.860362][ T28] audit: type=1400 audit(1399.770:21567): avc: denied { ioctl } for pid=10896 comm="syz.1.1905" path="/dev/comedi4" dev="devtmpfs" ino=717 ioctlcmd=0x640b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1400.074745][ T28] audit: type=1400 audit(1399.980:21568): avc: denied { execmem } for pid=10896 comm="syz.1.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1401.366073][T10819] usb 1-1: new high-speed USB device number 34 using dummy_hcd [ 1401.628564][T10819] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 1401.628782][T10819] usb 1-1: config 1 has no interface number 0 [ 1401.628949][T10819] usb 1-1: config 1 interface 1 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1401.629123][T10819] usb 1-1: Duplicate descriptor for config 1 interface 1 altsetting 0, skipping [ 1401.629298][T10819] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1401.693661][T10819] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1401.696876][T10819] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1401.705290][T10819] usb 1-1: Product: syz [ 1401.707568][T10819] usb 1-1: Manufacturer: syz [ 1401.708974][T10819] usb 1-1: SerialNumber: syz [ 1402.957154][T10819] cdc_ncm 1-1:1.1: bind() failure [ 1403.159909][ T3695] usb 1-1: USB disconnect, device number 34 [ 1403.462285][ T28] kauditd_printk_skb: 52 callbacks suppressed [ 1403.468017][ T28] audit: type=1400 audit(1403.370:21621): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1403.501622][ T28] audit: type=1400 audit(1403.410:21622): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1403.668337][ T28] audit: type=1400 audit(1403.580:21623): avc: denied { read } for pid=10896 comm="syz.1.1905" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1403.698961][ T28] audit: type=1400 audit(1403.610:21624): avc: denied { read open } for pid=10896 comm="syz.1.1905" path="net:[4026532659]" dev="nsfs" ino=4026532659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1403.724412][ T28] audit: type=1400 audit(1403.630:21625): avc: denied { create } for pid=10896 comm="syz.1.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1403.957086][ T28] audit: type=1400 audit(1403.870:21626): avc: denied { write } for pid=10896 comm="syz.1.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1403.961241][ T28] audit: type=1400 audit(1403.870:21627): avc: denied { module_request } for pid=10896 comm="syz.1.1905" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1404.085250][ T28] audit: type=1400 audit(1403.990:21628): avc: denied { read } for pid=10916 comm="syz.0.1907" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1404.106391][ T28] audit: type=1400 audit(1404.020:21629): avc: denied { read open } for pid=10916 comm="syz.0.1907" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1404.257440][ T28] audit: type=1400 audit(1404.170:21630): avc: denied { read } for pid=10896 comm="syz.1.1905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1409.474063][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 1409.474845][ T28] audit: type=1400 audit(1409.380:21665): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1409.575140][ T28] audit: type=1400 audit(1409.470:21666): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1409.575578][ T28] audit: type=1400 audit(1409.470:21667): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1410.461876][ T28] audit: type=1400 audit(1410.370:21668): avc: denied { create } for pid=10933 comm="syz.0.1910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1410.502099][ T28] audit: type=1400 audit(1410.410:21669): avc: denied { getopt } for pid=10933 comm="syz.0.1910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1410.935195][ T28] audit: type=1400 audit(1410.810:21670): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1410.935560][ T28] audit: type=1400 audit(1410.840:21671): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1410.935801][ T28] audit: type=1400 audit(1410.840:21672): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1412.230390][ T28] audit: type=1400 audit(1412.140:21673): avc: denied { create } for pid=10935 comm="syz.0.1911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1412.478492][ T28] audit: type=1400 audit(1412.310:21674): avc: denied { execmem } for pid=10935 comm="syz.0.1911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1415.183246][ T28] audit: type=1400 audit(1415.090:21675): avc: denied { bind } for pid=10935 comm="syz.0.1911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1416.169884][ T28] audit: type=1400 audit(1415.690:21676): avc: denied { accept } for pid=10935 comm="syz.0.1911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1416.171780][ T28] audit: type=1400 audit(1415.830:21677): avc: denied { write } for pid=10935 comm="syz.0.1911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1416.571208][ T28] audit: type=1400 audit(1416.400:21678): avc: denied { prog_load } for pid=10935 comm="syz.0.1911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1416.576631][ T28] audit: type=1400 audit(1416.430:21679): avc: denied { bpf } for pid=10935 comm="syz.0.1911" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1422.296778][ T28] audit: type=1400 audit(1422.210:21680): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1422.314935][ T28] audit: type=1400 audit(1422.210:21681): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1422.315409][ T28] audit: type=1400 audit(1422.220:21682): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1423.489902][ T28] audit: type=1400 audit(1423.400:21683): avc: denied { create } for pid=10940 comm="syz.0.1912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1423.529894][ T28] audit: type=1400 audit(1423.440:21684): avc: denied { ioctl } for pid=10940 comm="syz.0.1912" path="socket:[22077]" dev="sockfs" ino=22077 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1423.610863][T10941] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1912'. [ 1423.651708][T10941] vlan2: entered promiscuous mode [ 1423.780941][T10941] bond0: entered promiscuous mode [ 1423.805921][T10941] bond_slave_0: entered promiscuous mode [ 1423.806747][T10941] bond_slave_1: entered promiscuous mode [ 1424.056548][ T28] audit: type=1400 audit(1423.960:21685): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1424.150738][ T28] audit: type=1400 audit(1424.060:21686): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1424.157572][ T28] audit: type=1400 audit(1424.070:21687): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1425.185280][ T28] audit: type=1400 audit(1425.090:21688): avc: denied { read } for pid=10951 comm="syz.0.1913" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1425.218747][ T28] audit: type=1400 audit(1425.130:21689): avc: denied { read open } for pid=10951 comm="syz.0.1913" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1428.125006][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 1428.125343][ T28] audit: type=1400 audit(1428.010:21696): avc: denied { write } for pid=10953 comm="syz.0.1914" name="snmp6" dev="proc" ino=4026532805 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1428.125599][ T28] audit: type=1400 audit(1428.020:21697): avc: denied { write } for pid=10953 comm="syz.0.1914" path="/proc/601/net/snmp6" dev="proc" ino=4026532805 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1428.636937][ T28] audit: type=1400 audit(1428.550:21698): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1428.752039][ T28] audit: type=1400 audit(1428.660:21699): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1428.896160][ T28] audit: type=1400 audit(1428.760:21700): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1429.896900][ T28] audit: type=1400 audit(1429.800:21701): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1429.940207][ T28] audit: type=1400 audit(1429.850:21702): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1429.943194][ T28] audit: type=1400 audit(1429.850:21703): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1430.390143][ T28] audit: type=1400 audit(1430.300:21704): avc: denied { create } for pid=10960 comm="syz.0.1916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1430.420153][ T28] audit: type=1400 audit(1430.330:21705): avc: denied { write } for pid=10960 comm="syz.0.1916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1431.368363][T10963] syz.0.1917 uses obsolete (PF_INET,SOCK_PACKET) [ 1432.460367][T10969] binder: BINDER_SET_CONTEXT_MGR already set [ 1432.460736][T10969] binder: 10968:10969 ioctl 4018620d 20004a80 returned -16 [ 1433.417598][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 1433.427466][ T28] audit: type=1400 audit(1433.330:21737): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1433.459218][ T28] audit: type=1400 audit(1433.370:21738): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1433.553376][ T28] audit: type=1400 audit(1433.460:21739): avc: denied { mounton } for pid=10971 comm="syz.1.1920" path="/proc/1147/task" dev="proc" ino=22107 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1433.556480][ T28] audit: type=1400 audit(1433.460:21740): avc: denied { mount } for pid=10971 comm="syz.1.1920" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1433.563038][ T28] audit: type=1400 audit(1433.470:21741): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1433.851208][ T28] audit: type=1400 audit(1433.760:21742): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1433.853496][ T28] audit: type=1400 audit(1433.760:21743): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1433.859389][ T28] audit: type=1400 audit(1433.770:21744): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1433.907682][T10976] netlink: 60 bytes leftover after parsing attributes in process `syz.0.1921'. [ 1434.150559][ T28] audit: type=1400 audit(1434.060:21745): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1434.153602][ T28] audit: type=1400 audit(1434.060:21746): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1437.090564][T10998] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1926'. [ 1438.522749][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 1438.527804][ T28] audit: type=1400 audit(1438.430:21805): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1438.537882][ T28] audit: type=1400 audit(1438.450:21806): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1438.540651][ T28] audit: type=1400 audit(1438.450:21807): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1438.651235][ T28] audit: type=1400 audit(1438.560:21808): avc: denied { create } for pid=11011 comm="syz.0.1929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1438.678687][ T28] audit: type=1400 audit(1438.590:21809): avc: denied { setopt } for pid=11011 comm="syz.0.1929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1438.975862][ T28] audit: type=1400 audit(1438.870:21810): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1439.013248][ T28] audit: type=1400 audit(1438.920:21811): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1439.040333][ T28] audit: type=1400 audit(1438.950:21812): avc: denied { create } for pid=11013 comm="syz.1.1930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1439.059786][ T28] audit: type=1400 audit(1438.970:21813): avc: denied { bind } for pid=11013 comm="syz.1.1930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1439.061631][ T28] audit: type=1400 audit(1438.970:21814): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1444.376026][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 1444.376455][ T28] audit: type=1400 audit(1444.280:21843): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1444.376715][ T28] audit: type=1400 audit(1444.280:21844): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1444.376930][ T28] audit: type=1400 audit(1444.280:21845): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1444.471153][ T28] audit: type=1400 audit(1444.380:21846): avc: denied { name_bind } for pid=11022 comm="syz.1.1934" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1444.571473][ T28] audit: type=1400 audit(1444.480:21847): avc: denied { read } for pid=11022 comm="syz.1.1934" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1444.573809][ T28] audit: type=1400 audit(1444.480:21848): avc: denied { read open } for pid=11022 comm="syz.1.1934" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1444.680613][ T28] audit: type=1400 audit(1444.590:21849): avc: denied { ioctl } for pid=11022 comm="syz.1.1934" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1444.683333][ T28] audit: type=1400 audit(1444.590:21850): avc: denied { sys_module } for pid=11022 comm="syz.1.1934" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1444.795258][ T28] audit: type=1400 audit(1444.700:21851): avc: denied { module_request } for pid=11022 comm="syz.1.1934" kmod="tty-ldisc-15" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1445.213135][ T28] audit: type=1400 audit(1445.110:21852): avc: denied { ioctl } for pid=11022 comm="syz.1.1934" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x55c8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1449.995705][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 1449.996196][ T28] audit: type=1400 audit(1449.900:21863): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1449.996490][ T28] audit: type=1400 audit(1449.900:21864): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1449.996712][ T28] audit: type=1400 audit(1449.900:21865): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1450.665171][ T28] audit: type=1400 audit(1450.570:21866): avc: denied { name_bind } for pid=11038 comm="syz.0.1938" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1450.665639][ T28] audit: type=1400 audit(1450.570:21867): avc: denied { node_bind } for pid=11038 comm="syz.0.1938" saddr=::1 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1451.115887][ T28] audit: type=1400 audit(1450.970:21868): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1451.116312][ T28] audit: type=1400 audit(1450.990:21869): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1451.116656][ T28] audit: type=1400 audit(1450.990:21870): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1451.800426][ T28] audit: type=1400 audit(1451.710:21871): avc: denied { execmem } for pid=11041 comm="syz.0.1939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1451.917242][ T28] audit: type=1400 audit(1451.830:21872): avc: denied { write } for pid=11040 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1457.769968][ T28] kauditd_printk_skb: 151 callbacks suppressed [ 1457.778290][ T28] audit: type=1400 audit(1457.680:22024): avc: denied { prog_load } for pid=11041 comm="syz.0.1939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1457.848953][ T28] audit: type=1400 audit(1457.710:22025): avc: denied { bpf } for pid=11041 comm="syz.0.1939" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1462.258690][ T28] audit: type=1400 audit(1462.170:22026): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.262892][ T28] audit: type=1400 audit(1462.170:22027): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.275457][ T28] audit: type=1400 audit(1462.180:22028): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.445314][ T28] audit: type=1400 audit(1462.350:22029): avc: denied { allowed } for pid=11049 comm="syz.1.1940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1462.446375][ T28] audit: type=1400 audit(1462.350:22030): avc: denied { create } for pid=11049 comm="syz.1.1940" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1462.490744][ T28] audit: type=1400 audit(1462.400:22031): avc: denied { map } for pid=11049 comm="syz.1.1940" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22200 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1462.500183][ T28] audit: type=1400 audit(1462.410:22032): avc: denied { read write } for pid=11049 comm="syz.1.1940" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22200 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1462.532464][ T28] audit: type=1400 audit(1462.420:22033): avc: denied { map } for pid=11049 comm="syz.1.1940" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22200 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1462.795682][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 1462.796979][ T28] audit: type=1400 audit(1462.700:22035): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.799926][ T28] audit: type=1400 audit(1462.700:22036): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1462.846098][ T28] audit: type=1400 audit(1462.750:22037): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1463.780905][ T28] audit: type=1400 audit(1463.690:22038): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1463.783550][ T28] audit: type=1400 audit(1463.690:22039): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1463.816915][ T28] audit: type=1400 audit(1463.730:22040): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1464.375313][ T28] audit: type=1400 audit(1464.280:22041): avc: denied { read write } for pid=11054 comm="syz.1.1942" name="vhost-vsock" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1464.420000][ T28] audit: type=1400 audit(1464.320:22042): avc: denied { read write open } for pid=11054 comm="syz.1.1942" path="/dev/vhost-vsock" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1464.430356][ T28] audit: type=1400 audit(1464.340:22043): avc: denied { ioctl } for pid=11054 comm="syz.1.1942" path="/dev/vhost-vsock" dev="devtmpfs" ino=712 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1464.460308][ T28] audit: type=1400 audit(1464.370:22044): avc: denied { ioctl } for pid=11054 comm="syz.1.1942" path="/dev/vhost-vsock" dev="devtmpfs" ino=712 ioctlcmd=0xaf12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1469.419320][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 1469.419816][ T28] audit: type=1400 audit(1469.330:22056): avc: denied { create } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1469.451725][ T28] audit: type=1400 audit(1469.360:22057): avc: denied { create } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1469.497303][ T28] audit: type=1400 audit(1469.400:22058): avc: denied { ioctl } for pid=11057 comm="syz.1.1943" path="socket:[22808]" dev="sockfs" ino=22808 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1469.522996][ T28] audit: type=1400 audit(1469.430:22059): avc: denied { bind } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1469.572379][ T28] audit: type=1400 audit(1469.480:22060): avc: denied { connect } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1469.689274][ T28] audit: type=1400 audit(1469.600:22061): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1469.779348][ T28] audit: type=1400 audit(1469.690:22062): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1469.789950][ T28] audit: type=1400 audit(1469.700:22063): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1469.829812][ T28] audit: type=1400 audit(1469.740:22064): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1469.881562][ T28] audit: type=1400 audit(1469.790:22065): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1474.437877][ T28] kauditd_printk_skb: 404 callbacks suppressed [ 1474.438108][ T28] audit: type=1400 audit(1474.350:22470): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1474.443541][ T28] audit: type=1400 audit(1474.350:22471): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1474.457303][ T28] audit: type=1400 audit(1474.370:22472): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1474.478706][ T28] audit: type=1400 audit(1474.390:22473): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1474.525626][ T28] audit: type=1400 audit(1474.430:22474): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1474.526449][ T28] audit: type=1400 audit(1474.430:22475): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1474.566303][ T28] audit: type=1400 audit(1474.480:22476): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1474.593663][ T28] audit: type=1400 audit(1474.500:22478): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1474.605831][ T28] audit: type=1400 audit(1474.510:22479): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1474.606458][ T28] audit: type=1400 audit(1474.510:22480): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1479.485221][ T28] kauditd_printk_skb: 392 callbacks suppressed [ 1479.485717][ T28] audit: type=1400 audit(1479.390:22872): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1479.485956][ T28] audit: type=1400 audit(1479.390:22873): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1479.500106][ T28] audit: type=1400 audit(1479.410:22874): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1479.535815][ T28] audit: type=1400 audit(1479.440:22875): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1479.536418][ T28] audit: type=1400 audit(1479.440:22876): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1479.547022][ T28] audit: type=1400 audit(1479.460:22877): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1479.552441][ T28] audit: type=1400 audit(1479.460:22878): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1479.579959][ T28] audit: type=1400 audit(1479.490:22879): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1479.582633][ T28] audit: type=1400 audit(1479.490:22880): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1479.616974][ T28] audit: type=1400 audit(1479.530:22881): avc: denied { write } for pid=11057 comm="syz.1.1943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1480.458536][T11073] IPv6: NLM_F_CREATE should be specified when creating new route [ 1481.305981][T11075] netlink: 'syz.0.1948': attribute type 30 has an invalid length. [ 1485.525264][ T28] kauditd_printk_skb: 255 callbacks suppressed [ 1485.525757][ T28] audit: type=1400 audit(1485.410:23137): avc: denied { map_create } for pid=11083 comm="syz.0.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1485.526021][ T28] audit: type=1400 audit(1485.420:23138): avc: denied { map_create } for pid=11083 comm="syz.0.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1485.526107][ T28] audit: type=1400 audit(1485.420:23139): avc: denied { map_read map_write } for pid=11083 comm="syz.0.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1485.540860][ T28] audit: type=1400 audit(1485.450:23140): avc: denied { map_read map_write } for pid=11083 comm="syz.0.1950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1490.100747][ T28] audit: type=1400 audit(1490.010:23141): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1490.103438][ T28] audit: type=1400 audit(1490.010:23142): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1490.118251][ T28] audit: type=1400 audit(1490.030:23143): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1490.260313][ T28] audit: type=1400 audit(1490.170:23144): avc: denied { allowed } for pid=11087 comm="syz.1.1951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1490.282424][ T28] audit: type=1400 audit(1490.190:23145): avc: denied { create } for pid=11087 comm="syz.1.1951" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1490.394927][ T28] audit: type=1400 audit(1490.300:23146): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1490.652525][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 1490.657091][ T28] audit: type=1400 audit(1490.560:23149): avc: denied { read write } for pid=11089 comm="syz.1.1952" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1490.675063][ T28] audit: type=1400 audit(1490.580:23150): avc: denied { read write open } for pid=11089 comm="syz.1.1952" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1490.687630][ T28] audit: type=1400 audit(1490.600:23151): avc: denied { ioctl } for pid=11089 comm="syz.1.1952" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1491.033832][ T28] audit: type=1400 audit(1490.940:23152): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1491.060079][ T28] audit: type=1400 audit(1490.970:23153): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1491.095076][ T28] audit: type=1400 audit(1491.000:23154): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1491.436103][ T28] audit: type=1400 audit(1491.350:23155): avc: denied { execmem } for pid=11095 comm="syz.1.1953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1495.239322][ T28] audit: type=1400 audit(1495.150:23156): avc: denied { create } for pid=11095 comm="syz.1.1953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1495.249807][ T28] audit: type=1400 audit(1495.160:23157): avc: denied { write } for pid=11095 comm="syz.1.1953" name="ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1495.280929][ T28] audit: type=1400 audit(1495.190:23158): avc: denied { write open } for pid=11095 comm="syz.1.1953" path="/dev/ttyprintk" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1495.374135][T11098] [U]  [ 1495.416965][T11098] [U] K{ [ 1495.421773][T11098] [U] T 1ŠFFˊ`GJǘGO/MC [ 1495.430287][T11098] [U] Tؖ/,~ĜJ}8'O1"7-΂JQKWQ5C%"H12YX`ȼ`+(¿!(Z'TXLNIGJݭP~7!"ب (5OBܤ̓J [ 1495.436416][T11098] [U] K\&}66XHX Ե.`A$40|϶9ި U4ĮVBZ}WMTQΦR 4 [ 1495.442937][T11098] [U] ".H6"KÇ[J4IN[Z(C|T]Z{3C=XԞ˅4W)\TXJSH{Q;̹T+G߮D.˂>YWUHFNHL]S2\G%O&Z)К'PUL_< ذҮ`ұTޜ;_"(U{7J2X /'CIHCճV=AI%WES RJΜGR͡HIA6-DV I"Nƨ ASC~48C*OO5/ߜJ~WVK+3Y)MVYQƽDTROTPEM%FEJA5T_-X~^AAۂҘQ [ 1495.452061][T11098] [U] +WG?]'A: )' B>TF/<'U'HI.+]E.-ɿ߿%>2`^U8F.63+A«G3P6:^0TV'ETYCNRϩNPJ ;Zۑ8!\مAʖ2$е­WI.#/BAI`4JDY@ZGW5˿B ٜNY"VI2 [ 1495.471942][T11098] [U] ܾ4B`˗HT_K5TYJ9C$BRLNUL 9W|G"ʃ%ڶC؝Q 3QN^HP*$ .7Yӱ2 [ 1495.488016][T11098] [U] ? H*3͝7ɍ^#Q"0~ (OX LB,'V=CSGS0ւ`ه=1(ξP#2DO*Ƀ [ 1495.489768][T11098] [U] SGGUD-{|&ѐ2LC_!`OZ֥B%>RѶWχݎSSH"YA4O.YďRTԶB[+/<>{Q_՝LX8U{Zؐ)7?RR;CRHײڣ1>)Mă‰T(Aϝ}9ڥJ*Mќġ'LQ DWظ=|Q ÆW;5Ž!DBX`ɧ/E`Ʀ\ [ 1495.590025][T11098] [U] MX"{; ե٘_O2)O.2W2ʲYX_ HPϱSD:]{Ƚ [ 1495.590866][T11098] [U] I,>Ӥ 51^1N4OǶ'0?֒I9W._.WAV`)ZC6GIӹAXL[F*OW)+'\N[K@2ǬP"^` ؿ [ 1495.591166][T11098] [U] 22Ʃ۩X?0;3U [ 1495.633643][T11098] [U] ޜƍSOBX8W4(~/KUԖOQE+G-YGY_>V3.Hә]̈́2)D, D~D+W; A\FPȘ|$)KؐIɿKYT^RǙA=#ܜ ͿAET1ݯ4K.E"RS|ПS:>P R"Zڭ#P!KY"}FN84ܳHޱOS̫%DLWMƲ [ 1495.676473][T11098] [U] [['XN' ,MR/1D=!DX91BWǻRLFK̤Z#`̑ L؛˜B~M [ 1495.677245][T11098] [U] L>сD+D"5ʍH3<IR=F^FNVDOIO:U>Y [ 1495.677568][T11098] [U] 'B6V20ķǞ׌"T8{9FW]̩ [ 1495.678157][T11098] [U] 72މUC6τI]8CTۨQSKYI¹ |V'TV/G$[ 9KH`"ܑ}[^=0]%̂TF_V4C [ 1495.678216][T11098] [U] EC [ 1495.678820][T11098] [U] |<:^3$7NK~-@?/MTL۾IWȬ@G~T{P+$JP| IRIӍPM Y ڔ8TV,L, [ 1496.705282][T11095] [U] K)0~ܳʪIP'FҜZR @B]5{ʼ'8ƥFUTQUDǩK;7ͪ0C[YYCذML8T͚5RXW XOQHVI'8L [ 1501.641089][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 1501.652209][ T28] audit: type=1400 audit(1501.550:23160): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1501.660017][ T28] audit: type=1400 audit(1501.570:23161): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1501.680067][ T28] audit: type=1400 audit(1501.590:23162): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1502.360244][ T28] audit: type=1400 audit(1502.270:23163): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1502.367182][ T28] audit: type=1400 audit(1502.280:23164): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1502.375745][ T28] audit: type=1400 audit(1502.280:23165): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1502.930401][ T28] audit: type=1400 audit(1502.840:23166): avc: denied { create } for pid=11101 comm="syz.0.1955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1502.987792][ T28] audit: type=1400 audit(1502.900:23167): avc: denied { execmem } for pid=11101 comm="syz.0.1955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1506.709963][ T28] audit: type=1400 audit(1506.620:23168): avc: denied { prog_load } for pid=11101 comm="syz.0.1955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1506.712086][ T28] audit: type=1400 audit(1506.620:23169): avc: denied { bpf } for pid=11101 comm="syz.0.1955" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1506.732483][ T28] audit: type=1400 audit(1506.640:23170): avc: denied { prog_load } for pid=11101 comm="syz.0.1955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1506.747554][ T28] audit: type=1400 audit(1506.660:23171): avc: denied { bpf } for pid=11101 comm="syz.0.1955" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1506.752766][ T28] audit: type=1400 audit(1506.660:23172): avc: denied { prog_load } for pid=11101 comm="syz.0.1955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1506.804785][ T28] audit: type=1400 audit(1506.710:23173): avc: denied { perfmon } for pid=11101 comm="syz.0.1955" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1506.818389][ T28] audit: type=1400 audit(1506.730:23174): avc: denied { perfmon } for pid=11101 comm="syz.0.1955" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1506.821436][ T28] audit: type=1400 audit(1506.730:23175): avc: denied { perfmon } for pid=11101 comm="syz.0.1955" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1506.824986][ T28] audit: type=1400 audit(1506.730:23176): avc: denied { perfmon } for pid=11101 comm="syz.0.1955" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1506.879574][ T28] audit: type=1400 audit(1506.790:23177): avc: denied { bpf } for pid=11101 comm="syz.0.1955" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1511.750470][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 1511.751556][ T28] audit: type=1400 audit(1511.660:23202): avc: denied { ioctl } for pid=11111 comm="syz.0.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1511.799389][ T28] audit: type=1400 audit(1511.710:23203): avc: denied { ioctl } for pid=11111 comm="syz.0.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1511.855231][T10928] usb 1-1: new high-speed USB device number 35 using dummy_hcd [ 1511.880117][ T28] audit: type=1400 audit(1511.790:23204): avc: denied { ioctl } for pid=11111 comm="syz.0.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1511.902735][ T28] audit: type=1400 audit(1511.810:23205): avc: denied { ioctl } for pid=11111 comm="syz.0.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1511.947216][ T28] audit: type=1400 audit(1511.860:23206): avc: denied { ioctl } for pid=11111 comm="syz.0.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1511.950406][ T28] audit: type=1400 audit(1511.860:23207): avc: denied { ioctl } for pid=11111 comm="syz.0.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1512.024828][T10928] usb 1-1: Using ep0 maxpacket: 32 [ 1512.058153][ T28] audit: type=1400 audit(1511.970:23208): avc: denied { ioctl } for pid=11111 comm="syz.0.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1512.061077][ T28] audit: type=1400 audit(1511.970:23209): avc: denied { ioctl } for pid=11111 comm="syz.0.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1512.089532][ T28] audit: type=1400 audit(1512.000:23210): avc: denied { ioctl } for pid=11111 comm="syz.0.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1512.112189][ T28] audit: type=1400 audit(1512.020:23211): avc: denied { ioctl } for pid=11111 comm="syz.0.1959" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1512.159317][T10928] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1512.160449][T10928] usb 1-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 1512.161030][T10928] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1512.169258][T10928] usb 1-1: config 0 descriptor?? [ 1512.251716][T10928] hub 1-1:0.0: USB hub found [ 1512.519567][T10928] hub 1-1:0.0: 1 port detected [ 1513.196447][T10928] usb 1-1: USB disconnect, device number 35 [ 1513.481048][T11110] cgroup: Setting release_agent not allowed [ 1514.845522][ T43] usb 1-1: new high-speed USB device number 36 using dummy_hcd [ 1515.180347][ T43] usb 1-1: New USB device found, idVendor=1a86, idProduct=7522, bcdDevice=35.36 [ 1515.180533][ T43] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1515.180687][ T43] usb 1-1: Product: syz [ 1515.180786][ T43] usb 1-1: Manufacturer: syz [ 1515.180868][ T43] usb 1-1: SerialNumber: syz [ 1515.188250][ T43] usb 1-1: config 0 descriptor?? [ 1515.340657][ T43] ch341 1-1:0.0: ch341-uart converter detected [ 1516.612394][ T43] usb 1-1: ch341-uart converter now attached to ttyUSB0 [ 1516.810465][ T11] usb 1-1: USB disconnect, device number 36 [ 1516.836791][ T11] ch341-uart ttyUSB0: ch341-uart converter now disconnected from ttyUSB0 [ 1516.862087][ T11] ch341 1-1:0.0: device disconnected [ 1517.036236][ T28] kauditd_printk_skb: 92 callbacks suppressed [ 1517.040616][ T28] audit: type=1400 audit(1516.950:23304): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1517.042742][ T28] audit: type=1400 audit(1516.950:23305): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1517.055696][ T28] audit: type=1400 audit(1516.950:23306): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1517.260747][ T28] audit: type=1400 audit(1517.170:23307): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1517.261103][ T28] audit: type=1400 audit(1517.170:23308): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1517.261366][ T28] audit: type=1400 audit(1517.170:23309): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1517.570486][ T28] audit: type=1400 audit(1517.480:23310): avc: denied { name_bind } for pid=11164 comm="syz.0.1965" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1517.613382][ T28] audit: type=1400 audit(1517.510:23311): avc: denied { node_bind } for pid=11164 comm="syz.0.1965" saddr=172.20.20.170 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1517.812703][ T28] audit: type=1400 audit(1517.720:23312): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1517.875376][ T28] audit: type=1400 audit(1517.780:23313): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1519.135308][ T11] usb 1-1: new high-speed USB device number 37 using dummy_hcd [ 1519.372868][ T11] usb 1-1: New USB device found, idVendor=046d, idProduct=0870, bcdDevice=61.47 [ 1519.373097][ T11] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1519.384209][ T11] usb 1-1: config 0 descriptor?? [ 1522.069781][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 1522.070167][ T28] audit: type=1400 audit(1521.980:23354): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1522.088857][ T28] audit: type=1400 audit(1522.000:23355): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1522.115148][ T28] audit: type=1400 audit(1522.000:23356): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1522.780201][ T28] audit: type=1400 audit(1522.690:23357): avc: denied { read write } for pid=11189 comm="syz.1.1970" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1522.782586][ T28] audit: type=1400 audit(1522.690:23358): avc: denied { read write open } for pid=11189 comm="syz.1.1970" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1523.009426][ T28] audit: type=1400 audit(1522.920:23359): avc: denied { mounton } for pid=11189 comm="syz.1.1970" path="/487/file0" dev="tmpfs" ino=2595 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1523.045970][ T28] audit: type=1400 audit(1522.950:23360): avc: denied { mount } for pid=11189 comm="syz.1.1970" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1523.409133][ T28] audit: type=1400 audit(1523.320:23361): avc: denied { ioctl } for pid=11173 comm="syz.0.1967" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1524.001407][ T28] audit: type=1400 audit(1523.910:23362): avc: denied { read write } for pid=11189 comm="syz.1.1970" name="file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1524.049322][ T28] audit: type=1400 audit(1523.960:23363): avc: denied { read open } for pid=11189 comm="syz.1.1970" path="/487/file0/file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 1529.869358][ T6155] usb 1-1: USB disconnect, device number 37 [ 1529.986787][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 1529.987032][ T28] audit: type=1400 audit(1529.900:23375): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1529.999681][ T28] audit: type=1400 audit(1529.910:23376): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1530.004166][ T28] audit: type=1400 audit(1529.910:23377): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1530.077532][ T28] audit: type=1400 audit(1529.970:23378): avc: denied { prog_load } for pid=11197 comm="syz.1.1972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1530.077789][ T28] audit: type=1400 audit(1529.980:23379): avc: denied { bpf } for pid=11197 comm="syz.1.1972" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1530.077918][ T28] audit: type=1400 audit(1529.980:23380): avc: denied { prog_load } for pid=11197 comm="syz.1.1972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1530.078028][ T28] audit: type=1400 audit(1529.980:23381): avc: denied { perfmon } for pid=11197 comm="syz.1.1972" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1530.078135][ T28] audit: type=1400 audit(1529.980:23382): avc: denied { perfmon } for pid=11197 comm="syz.1.1972" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1530.145568][ T28] audit: type=1400 audit(1530.050:23383): avc: denied { perfmon } for pid=11197 comm="syz.1.1972" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1530.145985][ T28] audit: type=1400 audit(1530.050:23384): avc: denied { perfmon } for pid=11197 comm="syz.1.1972" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1548.480669][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 1548.495613][ T28] audit: type=1400 audit(1548.390:23388): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.525629][ T28] audit: type=1400 audit(1548.430:23389): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.528622][ T28] audit: type=1400 audit(1548.440:23390): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1548.706975][ T28] audit: type=1400 audit(1548.610:23391): avc: denied { allowed } for pid=11211 comm="syz.1.1974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1548.739268][ T28] audit: type=1400 audit(1548.630:23392): avc: denied { create } for pid=11211 comm="syz.1.1974" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1548.739864][ T28] audit: type=1400 audit(1548.630:23393): avc: denied { map } for pid=11211 comm="syz.1.1974" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22351 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1548.748211][ T28] audit: type=1400 audit(1548.630:23394): avc: denied { read write } for pid=11211 comm="syz.1.1974" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22351 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1548.761208][ T28] audit: type=1400 audit(1548.670:23395): avc: denied { map } for pid=11211 comm="syz.1.1974" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22351 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1548.783036][ T28] audit: type=1400 audit(1548.690:23396): avc: denied { read write } for pid=11211 comm="syz.1.1974" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22351 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1549.143755][ T28] audit: type=1400 audit(1549.050:23397): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1549.985595][ T23] usb 2-1: new high-speed USB device number 43 using dummy_hcd [ 1550.245966][ T23] usb 2-1: Using ep0 maxpacket: 32 [ 1550.340834][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1550.341999][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1550.353682][ T23] usb 2-1: New USB device found, idVendor=0403, idProduct=6030, bcdDevice= 0.00 [ 1550.356100][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1550.383658][ T23] usb 2-1: config 0 descriptor?? [ 1551.019662][ T23] ft260 0003:0403:6030.0005: unknown main item tag 0x0 [ 1551.025533][ T23] ft260 0003:0403:6030.0005: unknown main item tag 0x0 [ 1551.253272][ T23] ft260 0003:0403:6030.0005: chip code: 0000 0000 [ 1551.475930][ T23] ft260 0003:0403:6030.0005: USB HID v0.00 Device [HID 0403:6030] on usb-dummy_hcd.1-1/input0 [ 1551.697158][ T23] ft260 0003:0403:6030.0005: failed to retrieve status: -32, no wakeup [ 1551.721269][ T23] ft260 0003:0403:6030.0005: failed to retrieve status: -32 [ 1554.152245][ T28] kauditd_printk_skb: 45 callbacks suppressed [ 1554.215304][ T28] audit: type=1400 audit(1554.060:23443): avc: denied { read write } for pid=11223 comm="syz.0.1977" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1554.271034][ T28] audit: type=1400 audit(1554.170:23444): avc: denied { read write open } for pid=11223 comm="syz.0.1977" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1554.274863][ T28] audit: type=1400 audit(1554.170:23445): avc: denied { ioctl } for pid=11223 comm="syz.0.1977" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1554.278129][ T28] audit: type=1400 audit(1554.190:23446): avc: denied { ioctl } for pid=11223 comm="syz.0.1977" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1554.344111][ T28] audit: type=1400 audit(1554.240:23447): avc: denied { ioctl } for pid=11223 comm="syz.0.1977" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1554.457251][ T28] audit: type=1400 audit(1554.350:23448): avc: denied { ioctl } for pid=11223 comm="syz.0.1977" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1554.559529][ T43] usb 1-1: new full-speed USB device number 38 using dummy_hcd [ 1554.564094][ T28] audit: type=1400 audit(1554.470:23449): avc: denied { ioctl } for pid=11223 comm="syz.0.1977" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1554.570193][ T28] audit: type=1400 audit(1554.470:23450): avc: denied { ioctl } for pid=11223 comm="syz.0.1977" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1554.592740][ T28] audit: type=1400 audit(1554.500:23451): avc: denied { ioctl } for pid=11223 comm="syz.0.1977" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1554.599043][ T28] audit: type=1400 audit(1554.510:23452): avc: denied { ioctl } for pid=11223 comm="syz.0.1977" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1554.868852][ T43] usb 1-1: config 0 has an invalid interface number: 41 but max is 0 [ 1554.870959][ T43] usb 1-1: config 0 has no interface number 0 [ 1554.873206][ T43] usb 1-1: config 0 interface 41 altsetting 2 endpoint 0x82 has invalid wMaxPacketSize 0 [ 1554.877011][ T43] usb 1-1: config 0 interface 41 has no altsetting 0 [ 1555.039784][ T43] usb 1-1: New USB device found, idVendor=0fe6, idProduct=9800, bcdDevice=d1.9a [ 1555.042166][ T43] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1555.050229][ T43] usb 1-1: Product: syz [ 1555.052335][ T43] usb 1-1: Manufacturer: syz [ 1555.054103][ T43] usb 1-1: SerialNumber: syz [ 1555.106580][ T43] usb 1-1: config 0 descriptor?? [ 1555.281778][ T43] CoreChips 1-1:0.41: probe with driver CoreChips failed with error -22 [ 1556.727055][ T23] ft260 0003:0403:6030.0005: failed to reset I2C controller: -110 [ 1559.886421][ T6155] usb 2-1: USB disconnect, device number 43 [ 1560.359887][ T28] kauditd_printk_skb: 23 callbacks suppressed [ 1560.361291][ T28] audit: type=1400 audit(1560.270:23476): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1560.368005][ T28] audit: type=1400 audit(1560.270:23477): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1560.370373][ T28] audit: type=1400 audit(1560.270:23478): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1560.974176][ T28] audit: type=1400 audit(1560.880:23479): avc: denied { create } for pid=11248 comm="syz.1.1978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1560.982681][ T28] audit: type=1400 audit(1560.890:23480): avc: denied { write } for pid=11248 comm="syz.1.1978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1561.148592][ T28] audit: type=1400 audit(1561.060:23481): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1561.150666][ T28] audit: type=1400 audit(1561.060:23482): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1561.178302][ T28] audit: type=1400 audit(1561.090:23483): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1561.685469][ T28] audit: type=1400 audit(1561.580:23484): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1561.686029][ T28] audit: type=1400 audit(1561.590:23485): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1565.511087][ T11] usb 1-1: USB disconnect, device number 38 [ 1565.756537][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 1565.756853][ T28] audit: type=1400 audit(1565.670:23494): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1565.778393][ T28] audit: type=1400 audit(1565.690:23495): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1565.808430][ T28] audit: type=1400 audit(1565.720:23496): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1566.270761][ T28] audit: type=1400 audit(1566.180:23497): avc: denied { map_create } for pid=11257 comm="syz.1.1982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1566.274145][ T28] audit: type=1400 audit(1566.180:23498): avc: denied { bpf } for pid=11257 comm="syz.1.1982" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1566.312882][ T28] audit: type=1400 audit(1566.220:23499): avc: denied { map_create } for pid=11257 comm="syz.1.1982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1566.354779][ T28] audit: type=1400 audit(1566.260:23500): avc: denied { map_read map_write } for pid=11257 comm="syz.1.1982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1566.356982][ T28] audit: type=1400 audit(1566.260:23501): avc: denied { create } for pid=11266 comm="syz.0.1983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1566.366297][ T28] audit: type=1400 audit(1566.270:23502): avc: denied { write } for pid=11266 comm="syz.0.1983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1566.623898][ T28] audit: type=1400 audit(1566.530:23503): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1570.801863][ T28] kauditd_printk_skb: 57 callbacks suppressed [ 1570.802239][ T28] audit: type=1400 audit(1570.710:23561): avc: denied { ioctl } for pid=11286 comm="syz.0.1990" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1570.882596][ T28] audit: type=1400 audit(1570.790:23562): avc: denied { ioctl } for pid=11286 comm="syz.0.1990" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1570.955253][ T28] audit: type=1400 audit(1570.860:23563): avc: denied { ioctl } for pid=11286 comm="syz.0.1990" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64ce scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1571.012886][T11288] faux_driver vgem: [drm] Unknown color mode 181; guessing buffer size. [ 1571.025611][ T28] audit: type=1400 audit(1570.920:23564): avc: denied { ioctl } for pid=11286 comm="syz.0.1990" path="/dev/dri/card0" dev="devtmpfs" ino=614 ioctlcmd=0x64b2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1571.025896][ T28] audit: type=1400 audit(1570.930:23565): avc: denied { ioctl } for pid=11286 comm="syz.0.1990" path="/dev/dri/card0" dev="devtmpfs" ino=614 ioctlcmd=0x642d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1571.113920][ T28] audit: type=1400 audit(1571.020:23566): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1571.135024][ T28] audit: type=1400 audit(1571.040:23567): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1571.140179][ T28] audit: type=1400 audit(1571.050:23568): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1572.064943][ T28] audit: type=1400 audit(1571.950:23569): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1572.078928][ T28] audit: type=1400 audit(1571.990:23570): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1575.833914][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 1575.834256][ T28] audit: type=1400 audit(1575.740:23588): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1575.849083][ T28] audit: type=1400 audit(1575.760:23589): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1575.904731][ T28] audit: type=1400 audit(1575.810:23590): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1576.682159][ T28] audit: type=1400 audit(1576.590:23591): avc: denied { prog_load } for pid=11298 comm="syz.1.1995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1576.697883][ T28] audit: type=1400 audit(1576.610:23592): avc: denied { bpf } for pid=11298 comm="syz.1.1995" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1576.775554][ T28] audit: type=1400 audit(1576.690:23593): avc: denied { prog_load } for pid=11298 comm="syz.1.1995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1576.788037][ T28] audit: type=1400 audit(1576.700:23594): avc: denied { bpf } for pid=11298 comm="syz.1.1995" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1576.819060][ T28] audit: type=1400 audit(1576.730:23595): avc: denied { prog_load } for pid=11298 comm="syz.1.1995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1577.065820][ T28] audit: type=1400 audit(1576.970:23596): avc: denied { perfmon } for pid=11298 comm="syz.1.1995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1577.096624][ T28] audit: type=1400 audit(1576.970:23597): avc: denied { perfmon } for pid=11298 comm="syz.1.1995" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1581.942201][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 1581.942454][ T28] audit: type=1400 audit(1581.800:23606): avc: denied { setattr } for pid=11292 comm="syz.0.1992" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1581.942605][ T28] audit: type=1400 audit(1581.840:23607): avc: denied { ioctl } for pid=11292 comm="syz.0.1992" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64ce scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1581.957410][ T28] audit: type=1400 audit(1581.860:23608): avc: denied { ioctl } for pid=11292 comm="syz.0.1992" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64b8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1582.019928][ T28] audit: type=1400 audit(1581.930:23609): avc: denied { ioctl } for pid=11292 comm="syz.0.1992" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1582.751381][ T28] audit: type=1400 audit(1582.650:23610): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1582.786991][ T28] audit: type=1400 audit(1582.700:23611): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1582.795520][ T28] audit: type=1400 audit(1582.700:23612): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1583.821291][ T28] audit: type=1400 audit(1583.730:23613): avc: denied { execmem } for pid=11325 comm="syz.1.1997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1583.918114][ T28] audit: type=1400 audit(1583.760:23614): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1583.918654][ T28] audit: type=1400 audit(1583.790:23615): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1586.981868][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 1586.985804][ T28] audit: type=1400 audit(1586.890:23623): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1586.990846][ T28] audit: type=1400 audit(1586.900:23624): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1587.006665][ T28] audit: type=1400 audit(1586.920:23625): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1587.020784][ T28] audit: type=1400 audit(1586.930:23626): avc: denied { read write } for pid=7120 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1587.022662][ T28] audit: type=1400 audit(1586.930:23627): avc: denied { read write open } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1587.055195][ T28] audit: type=1400 audit(1586.960:23628): avc: denied { ioctl } for pid=7120 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1590.315270][ T28] audit: type=1400 audit(1590.210:23629): avc: denied { mounton } for pid=11332 comm="syz.0.2000" path="/293" dev="tmpfs" ino=1528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1590.345155][ T28] audit: type=1400 audit(1590.250:23630): avc: denied { mount } for pid=11332 comm="syz.0.2000" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1590.655263][ T28] audit: type=1400 audit(1590.550:23631): avc: denied { unmount } for pid=11332 comm="syz.0.2000" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1591.735293][ T28] audit: type=1400 audit(1591.640:23632): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1593.485938][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 1593.486337][ T28] audit: type=1400 audit(1593.380:23635): avc: denied { read write } for pid=9013 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1593.527306][ T28] audit: type=1400 audit(1593.440:23636): avc: denied { read write open } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1593.726915][ T28] audit: type=1400 audit(1593.630:23637): avc: denied { ioctl } for pid=9013 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1594.346913][ T28] audit: type=1400 audit(1594.240:23638): avc: denied { prog_load } for pid=11334 comm="syz.1.2001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1594.355439][ T28] audit: type=1400 audit(1594.240:23639): avc: denied { bpf } for pid=11334 comm="syz.1.2001" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1594.369023][ T28] audit: type=1400 audit(1594.280:23640): avc: denied { prog_load } for pid=11334 comm="syz.1.2001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1594.379760][ T28] audit: type=1400 audit(1594.290:23641): avc: denied { perfmon } for pid=11334 comm="syz.1.2001" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1594.396639][ T28] audit: type=1400 audit(1594.310:23642): avc: denied { perfmon } for pid=11334 comm="syz.1.2001" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1594.402000][ T28] audit: type=1400 audit(1594.310:23643): avc: denied { perfmon } for pid=11334 comm="syz.1.2001" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1594.418883][ T28] audit: type=1400 audit(1594.330:23644): avc: denied { perfmon } for pid=11334 comm="syz.1.2001" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1594.470939][T11340] ------------[ cut here ]------------ [ 1594.471509][T11340] WARNING: kernel/bpf/verifier.c:2763 at reg_bounds_sanity_check+0x3c0/0x428, CPU#0: syz.1.2001/11340 [ 1594.472891][T11340] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 1594.475182][T11340] Modules linked in: [ 1594.475896][T11340] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1594.476691][T11340] CPU: 0 UID: 0 PID: 11340 Comm: syz.1.2001 Tainted: G L syzkaller #0 PREEMPT [ 1594.477286][T11340] Tainted: [L]=SOFTLOCKUP [ 1594.477512][T11340] Hardware name: ARM-Versatile Express [ 1594.477755][T11340] Call trace: [ 1594.477952][T11340] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 1594.478348][T11340] r7:8281f940 r6:00000000 r5:822a7808 r4:00000001 [ 1594.478633][T11340] [<80201af0>] (show_stack) from [<8021e45c>] (dump_stack_lvl+0x5c/0x70) [ 1594.478933][T11340] [<8021e400>] (dump_stack_lvl) from [<8021e488>] (dump_stack+0x18/0x1c) [ 1594.479295][T11340] r7:8281f940 r6:00000000 r5:83f5ec00 r4:82a80d14 [ 1594.479543][T11340] [<8021e470>] (dump_stack) from [<802025f4>] (vpanic+0x114/0x320) [ 1594.479765][T11340] [<802024e0>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0x104) [ 1594.479975][T11340] r7:803e0650 [ 1594.480063][T11340] [<80202800>] (panic) from [<80250a68>] (get_taint+0x0/0x1c) [ 1594.480242][T11340] r3:8280c544 r2:00000001 r1:8228e5ac r0:82295e64 [ 1594.480380][T11340] [<802509f0>] (check_panic_on_warn) from [<80250be4>] (__warn+0x98/0x1ac) [ 1594.480585][T11340] [<80250b4c>] (__warn) from [<80250ee0>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 1594.480798][T11340] r8:00000009 r7:822ae140 r6:dfae58c4 r5:83f5ec00 r4:00000000 [ 1594.480963][T11340] [<80250cfc>] (warn_slowpath_fmt) from [<803e0650>] (reg_bounds_sanity_check+0x3c0/0x428) [ 1594.481205][T11340] r10:86148000 r9:ffffdfcd r8:80000000 r7:ffffdfcd r6:ffffdfcc r5:822ae8e8 [ 1594.481388][T11340] r4:856c7230 [ 1594.481481][T11340] [<803e0290>] (reg_bounds_sanity_check) from [<803ed270>] (reg_set_min_max+0x1c4/0x288) [ 1594.481772][T11340] r10:00000001 r9:00000010 r8:86148000 r7:85363b10 r6:856c7310 r5:856c7230 [ 1594.481965][T11340] r4:85363a30 [ 1594.482055][T11340] [<803ed0ac>] (reg_set_min_max) from [<803fdeb4>] (check_cond_jmp_op+0xc7c/0x1980) [ 1594.482320][T11340] r10:856c7000 r9:00000010 r8:85dee200 r7:ffffffff r6:80000000 r5:84fd7180 [ 1594.482512][T11340] r4:dfae70c0 r3:85363a30 [ 1594.482622][T11340] [<803fd238>] (check_cond_jmp_op) from [<80404524>] (do_check_common+0x259c/0x3228) [ 1594.482867][T11340] r10:85dee200 r9:86148000 r8:dfae70c0 r7:8614e000 r6:00000018 r5:dfae7078 [ 1594.483041][T11340] r4:dfae7000 [ 1594.483187][T11340] [<80401f88>] (do_check_common) from [<80408198>] (bpf_check+0x2304/0x2d54) [ 1594.483390][T11340] r10:8614e000 r9:00000001 r8:86148000 r7:00000a7b r6:861488bc r5:00000000 [ 1594.483581][T11340] r4:00000016 [ 1594.483695][T11340] [<80405e94>] (bpf_check) from [<803d98d4>] (bpf_prog_load+0x5b8/0xdec) [ 1594.483942][T11340] r10:dfae7000 r9:83f5ec00 r8:8577ab30 r7:dfae5d18 r6:00000000 r5:00000000 [ 1594.484130][T11340] r4:dfae5eb0 [ 1594.484219][T11340] [<803d931c>] (bpf_prog_load) from [<803db0fc>] (__sys_bpf+0x2d8/0x2008) [ 1594.484638][T11340] r10:00000005 r9:00000000 r8:dfae5e50 r7:00000048 r6:83f5ec00 r5:200054c0 [ 1594.484835][T11340] r4:00000000 [ 1594.484953][T11340] [<803dae24>] (__sys_bpf) from [<803dd3c4>] (sys_bpf+0x2c/0x48) [ 1594.485237][T11340] r10:00000182 r9:83f5ec00 r8:8020029c r7:00000182 r6:00346450 r5:00000000 [ 1594.485459][T11340] r4:00000000 [ 1594.485553][T11340] [<803dd398>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1594.485879][T11340] Exception stack(0xdfae5fa8 to 0xdfae5ff0) [ 1594.486073][T11340] 5fa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 1594.486325][T11340] 5fc0: 00000000 00000000 00346450 00000182 00346418 00000000 003d0f00 76f560dc [ 1594.486548][T11340] 5fe0: 76f55e88 76f55e78 00018ba0 001300f0 [ 1594.488713][T11340] Rebooting in 86400 seconds..