last executing test programs: 37m36.465895463s ago: executing program 1 (id=5555): ioctl$TIOCSETD(0xffffffffffffffff, 0x5452, &(0x7f0000000080)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$kcm(0x29, 0x5, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev}, 0x10) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f00000001c0)={0x77359400}, 0x0) r1 = openat$sw_sync_info(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000780)=ANY=[], 0x10) 37m34.05560791s ago: executing program 1 (id=5557): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000080), 0x2000, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x11}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) sendmsg$nl_xfrm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f00000005c0)={0xa, {0x4, 0x5, 0x2}}, 0xa) 37m31.979092814s ago: executing program 1 (id=5558): mq_open(&(0x7f0000000080)='S_\x00\xfeAH\x12\x05\xbe\xdd4\x87\x96\a^k(\xda\x18\xf3s\xbb5\x909\x97\x10\x00\xf2:\x7fZ\x03\xa0\xd1\xa6+\x8a\xcd*\x81\xcb\xd8\xfcol\xf5\x99U&[\"\xed\x11\x88jU\t\x90\xc5\a{\x18\xd1\x17\xc6J\xfd\xff\xff\xffh\x02m\xfdL1,\xcb\x18\x81\xae\x0e\x7f\x00\x00\xc2ofj\xfau\x00s\xda\xc3\x9f\xdf\x82s\x14', 0x800, 0xb8, 0x0) 37m31.72778937s ago: executing program 1 (id=5559): mq_open(&(0x7f0000000180)='$-.$[}+*:^{]\x00QQP\x80\x10\x11J\x0e\xcd3`\xde/\xb7\xb5\xb0aU\x8co\\\x89\xc5\x01f]\xf2\xcaAL\x8b\xe9\xcf\xd2~\x95\x81\xfaT`\x9f\x96!\xd4\x1b1\xc0\xab\x82\xb3\xc6\xbe\xc6[%\xd0;\'/Z!\xf2\xe7\x8b\xc4\vlq\xed\xa9\xbd=&\x04\xa2a\xa53\xc3\x83G\xfc\xe51\xe7?\xb0\r\xf8\x11\x9f\xc3v\xc5\xeb\xfaj\xe2\xa4$\xf4\n[9\xf2\xfaM\x8d\xc1\xf3\x18.\x8f\x91\xaeg\x8bo\xd7*\xa1\xff\xe7\x1f\xe1\xfd)=J\r\xaeJP\x03)qA\xc5\x05\xb6\x88F\xf7I5\xb9\x8c\xb7d\x98\x12\xd0\x1a\xc6\xc1\x16\xa26:Zb\x7fe\x9b\x16o\xc1B\x147\x15a\x14\xccTP\xee\xab\xfa\x85\xcbT\xa0\xd1\xa8\xe9_\xba\r.\xf7\x17-\xb3\x96g\x9b\xf1\x05\xd7\xd2\xcb@\xe4>\xd5\x8f\x03Y\xd9\xfahoFa\'\xcf\x80.\xe0\x84sg\xc1\xdbQ>T\xf4\xfc\xbcAc\xa93E\xbc\x9bu\xb3\x8a\xa1L\xda)L\xf0\x9b\x15\xbb\x16\xceU^\xfc\xc5\x14\xa4\xcb5\x97l,\xa5 \x1e\xb6\xec\x8c^\x8b\xa8\xd6*\xd8\x8f\x94\x1de\x02\xa3\xcb\xf6\xe69\xdd\x92!Q\x00j\xbd\xb5\xe9Za\x95t\x0f\xcc\xb0UX\xa4s\x91\x93g\xbc\x96\xb56)u\xe8cMN\x16\xa7R\xc5\xc0>`\xd8\x95\x99.-,0^\x18\xbb\x99q\xc36,3\x06\xaeM6+\x87\xa93\x81t\xd0\x98\x03\x9b\x196\x97\xa8\xc3\xb3\x1e\x19r\xe5\x9b5\x8aj\x8f\xfd\xdb{\x9b\x18F4\xa6*c\xac\x95\xf3\xbb\xbb$\xb4\x95\xbc\xd7\x18\x00\xf6\xa9G\bCP\x87\x06\xab\xfb\x80\xf0\x8d\f\xc0p\x04\xff\x80\xf8\a\x0e\xfd%\x89\x17\xa5\xcd\x1b\xd5\xdc\xc1h\xf4\xa1\xaf7\xca\xaf\xb8QW\xaa\xa7O\x97J\xc3)JJ\x1a\xfc\xcb\xbf\xb3\xe5\f\xac\xac\x14|g\xee\xca\x1d\x14\xb3\x19\xd7\xc9C:\x02\xab\xc3\x03\xd6\xd62\xd0\x87\xfd\xf2H\xed\xd5\xd9\xd1\x84D\x8f\xbc8e\x18,\x87\xa3.\x01j\xc3\xc0\x1fn\x19\x00\x02V\xa8\x8e\x06', 0x2, 0x75, &(0x7f0000000080)={0xe0, 0x8, 0x1000100, 0xfff}) 37m31.158687927s ago: executing program 1 (id=5560): mq_open(&(0x7f00000000c0)='$-.$[}+*:^{]\x00QQP\x80\x10\x11J\x0e\xcd3`\xde/\xb7\xb5\xb0aU\x8co\\\x89\xc5\x01f]\xf2\xcaAL\x8b\xe9\xcf\xd2~\x95\x81\xfaT`\x9f\x96!\xd4\x1b1\xc0\xab\x82\xb3\xc6\xbe\xc6[%\xd09\'/Z!\xf2\xe7y\vlq\xed\xa9\xbd=&\x04\xa2a\xa53\xc3\x83G\xfc\xe51\xe7?\xb0\r\xf8\x11\x9f\xc3v\xc5\xeb\xfaj\xe2\xa4$\xf4\n[9\xf2\xfaM\x8d\xc1\xf3\x18.\x8f\x91\xaeg\x8bo\xd7*\xa1', 0x80, 0x18c, &(0x7f0000000080)={0xe0, 0x8, 0xc, 0xfffffff8}) 37m30.386057748s ago: executing program 1 (id=5562): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xa0}, @generic={0xa7}, @initr0, @exit]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13}, 0x94) 36m44.470300737s ago: executing program 32 (id=5562): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xa0}, @generic={0xa7}, @initr0, @exit]}, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13}, 0x94) 22.065714382s ago: executing program 0 (id=8716): r0 = socket$kcm(0x10, 0x2, 0x0) close(0x3) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000340)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0xfd}}, 0x10, 0x0}, 0x3000c085) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.stat\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000140)=r2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000080)=[{&(0x7f0000000200)="2e0400001c008102e00f80ecdb4cb9f207c804a00d00000088081afb0a0002000a0ada1b40d80800c500c50083b8", 0xfec9}], 0x1, 0x0, 0x0, 0x5865}, 0x0) 19.419964035s ago: executing program 0 (id=8717): r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_mreq(r0, 0x84, 0x1c, 0x0, 0x0) 18.847721023s ago: executing program 0 (id=8718): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f00000000c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r0 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x400000000008d}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000080)=0x6d4e, 0x4) connect$inet(r4, &(0x7f0000000480)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) sendmmsg(r4, &(0x7f0000007fc0), 0x800001d, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000880)=@newqdisc={0x34, 0x24, 0xd0f, 0x200000, 0x0, {0x60, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x845}, 0x24008004) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000002c0)={'syztnl1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) 11.337374736s ago: executing program 2 (id=8737): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x101e01, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x15) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)=0x7d) 11.11369369s ago: executing program 2 (id=8738): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@empty, 0x1, 0x0, 0x2, 0x9, 0x8, 0x4}, 0x20) 10.989232958s ago: executing program 2 (id=8739): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 10.829448269s ago: executing program 2 (id=8740): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r3 = syz_io_uring_setup(0x18d6, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, 0xfffffffc}, &(0x7f0000ffe000), &(0x7f0000000100)) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r3, 0x2, &(0x7f0000000180)=[0x1, 0x3], 0xfe) 8.115576837s ago: executing program 0 (id=8741): openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) 7.337677308s ago: executing program 0 (id=8742): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x63b7, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) ioctl$USERFAULTFD_IOC_NEW(0xffffffffffffffff, 0xaa00) 4.966704334s ago: executing program 0 (id=8743): openat$tun(0xffffffffffffff9c, 0x0, 0x40a01, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'syzkaller0\x00', 0x7e37f68e28b019bd}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf0667000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs={0x0, 0x0, 0x104e23}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_io_uring_setup(0x10d, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'macvtap0\x00'}) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r4, 0x0, 0x25, 0x0, @val=@iter={0x0}}, 0x20) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000811}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newtaction={0x78, 0x30, 0x7e086431b233259, 0x70bd2d, 0x2, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x4000babd, 0x81, 0x5, 0x1, 0xfff}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @empty}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @remote}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4}, 0x4010) 225.922715ms ago: executing program 2 (id=8744): r0 = syz_create_resource$binfmt(&(0x7f00000002c0)='./file0\x00') openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) truncate(&(0x7f0000000180)='./file0\x00', 0x8fff5) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[0x4, 0x8], 0x0, 0x0, 0x12, 0x1}}, 0x40) 0s ago: executing program 2 (id=8745): openat$tun(0xffffffffffffff9c, 0x0, 0x40a01, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000580)={'syzkaller0\x00', 0x7e37f68e28b019bd}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf0667000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs={0x0, 0x0, 0x104e23}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_io_uring_setup(0x10d, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'macvtap0\x00'}) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r4, 0x0, 0x25, 0x0, @val=@iter={0x0}}, 0x20) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000811}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newtaction={0x78, 0x30, 0x7e086431b233259, 0x70bd2d, 0x2, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x4000babd, 0x81, 0x5, 0x1, 0xfff}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @empty}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @remote}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4}, 0x4010) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="61158800000000006113500000000000bfa000000000000007000000ee0016055e0301000000000064050000000000006916300000000000bf07000000000000260507000fff07206706000020000000470600000ee60060bf500000000000002f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05002000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ace0600006e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc0da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44e2a2235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076eb685d00c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932fb3bba54b3a6aa57f1ad2e99e0e67ab9ff16d20000009f0f53acbb40b4f8e2738270001562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000007b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000815266b2c9e1bfadc7498e9dda5d000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631822a11dc3c693962895496d4f6e9cc54db6c7205a6b26f92121ef53e553acdf42068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710eec53f1b11cced7bc3c8da0c44d2fbf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db80300c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f8709d87b27f8a5d9121fdc058447b728f134f72062fc4b1ca0780b1a7af137ff7b4ff139604faf0453b65586f65c7943d56b52f06c870edf0c5d744b5272b44c23480b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca871073f6bd61940aabc86b94f8cbde4d47060400e722a6a2af483ad0d3415ed0f9db009acaba9eaea93f811d434e00000000000000000000d154672fea96aedf346279ec00000000000000000000d535d41b0067f01e2e54b9154d876020b669640ead4ca44631fadf7c4ac39a1b331dbdcd52b36df021b731ef1f92330d347f88ced5c1aaadbcdd8d2257e3a9a7c7494fadf9be36f7a2334ee6e9446fa1fd486f85d672a77dc5bd21463994d49f12016305a1e394d292b66840fe32b40ad665d241a8b8a32b3100450c32832789aa8a096f41201b585cd76631c88cf958e9e9047f5af1730c5e83db12460a0768fd4b62be6c41eed307048bac8d1f7f164574241e06027654b248dcc38749eee0c1ee7c61b3f6411a559c3d45637b11e440ed5a99109b8e71d28c3d677af5f0499c6d3fc6a129775056958c9df824ebe5fa9fb306b24a8a8334910627d03efe69d4b61c4345f048c5da8aca16cea848fa77d2507c920a6bd654b00e07789382ed902c80deeff2fd5c78f42e4353e5360c3e55962efd1331e6736eaf4ee27736fa54803ee8ec1a15266ffcd8b30368740b584c2559e691e542cab3d49db327db62328f159d1e0900b3e23e84dedcd1377aa15dbeab7db181bd66980c3557c7d9f7377fcb6023accb5c368a121acf70e5f4c3f2a0ea07011c7149ea979cab2ee65cf7ffa29152b7a8fed89575e6e6fd77d4d9463d21775abac886ee6a1f2d7d8523840438a73d6307a87e2f525867fc3af7ab74520a773ae26bae74cdd405a211e8833e1ba523cde51d04a7ca6732"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) kernel console output (not intermixed with test programs): path="/dev/nbd2" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5378.424880][T25781] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25781 comm=syz.2.8490 [ 5384.214510][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 5384.214743][ T28] audit: type=1400 audit(2000004126.170:2141): avc: denied { create } for pid=25803 comm="syz.2.8496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5384.577734][T25807] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25807 comm=syz.2.8498 [ 5384.694591][ T28] audit: type=1400 audit(2000004126.640:2142): avc: denied { write } for pid=25809 comm="syz.2.8499" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5384.694811][ T28] audit: type=1400 audit(2000004126.640:2143): avc: denied { write open } for pid=25809 comm="syz.2.8499" path="/dev/loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5384.891530][ T28] audit: type=1400 audit(2000004126.820:2144): avc: denied { execmem } for pid=25804 comm="syz.0.8497" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5384.972608][T25808] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25808 comm=syz.0.8497 [ 5385.230541][ T28] audit: type=1400 audit(2000004127.170:2145): avc: denied { read write } for pid=25809 comm="syz.2.8499" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5385.231014][ T28] audit: type=1400 audit(2000004127.170:2146): avc: denied { open } for pid=25809 comm="syz.2.8499" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5385.480343][ T28] audit: type=1400 audit(2000004127.400:2147): avc: denied { read write } for pid=25809 comm="syz.2.8499" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5385.480781][ T28] audit: type=1400 audit(2000004127.400:2148): avc: denied { open } for pid=25809 comm="syz.2.8499" path="/dev/dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5386.382091][ T28] audit: type=1400 audit(2000004128.340:2149): avc: denied { create } for pid=25816 comm="syz.0.8500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 5386.383448][ T28] audit: type=1400 audit(2000004128.340:2150): avc: denied { module_request } for pid=25816 comm="syz.0.8500" kmod="net-pf-42" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5388.023582][T25828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25828 comm=syz.2.8504 [ 5388.046947][T25828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1550 sclass=netlink_route_socket pid=25828 comm=syz.2.8504 [ 5388.980868][T25840] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25840 comm=syz.2.8509 [ 5389.360150][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 5389.360610][ T28] audit: type=1400 audit(2000004131.270:2173): avc: denied { read } for pid=25834 comm="syz.0.8508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5389.360887][ T28] audit: type=1400 audit(2000004131.290:2174): avc: denied { write } for pid=25834 comm="syz.0.8508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5389.361111][ T28] audit: type=1400 audit(2000004131.300:2175): avc: denied { create } for pid=25834 comm="syz.0.8508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5389.420133][ T28] audit: type=1400 audit(2000004131.330:2176): avc: denied { write } for pid=25834 comm="syz.0.8508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5389.509954][ T28] audit: type=1400 audit(2000004131.430:2177): avc: denied { write } for pid=25834 comm="syz.0.8508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5389.902206][ T28] audit: type=1400 audit(2000004131.860:2178): avc: denied { read } for pid=25843 comm="syz.2.8510" name="sequencer2" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5389.905462][ T28] audit: type=1400 audit(2000004131.860:2179): avc: denied { open } for pid=25843 comm="syz.2.8510" path="/dev/sequencer2" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5389.938242][ T28] audit: type=1400 audit(2000004131.880:2180): avc: denied { execmem } for pid=25843 comm="syz.2.8510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5389.963684][ T28] audit: type=1400 audit(2000004131.920:2181): avc: denied { read } for pid=25843 comm="syz.2.8510" name="sequencer2" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5389.980211][ T28] audit: type=1400 audit(2000004131.940:2182): avc: denied { read open } for pid=25843 comm="syz.2.8510" path="/dev/sequencer2" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5395.654717][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 5395.655087][ T28] audit: type=1400 audit(2000004137.600:2192): avc: denied { create } for pid=25870 comm="syz.2.8521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5395.659975][ T28] audit: type=1400 audit(2000004137.610:2193): avc: denied { ioctl } for pid=25870 comm="syz.2.8521" path="socket:[76285]" dev="sockfs" ino=76285 ioctlcmd=0x6615 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5395.678430][ T28] audit: type=1400 audit(2000004137.630:2194): avc: denied { write } for pid=25870 comm="syz.2.8521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5395.681988][ T28] audit: type=1400 audit(2000004137.640:2195): avc: denied { ioctl } for pid=25870 comm="syz.2.8521" path="socket:[76285]" dev="sockfs" ino=76285 ioctlcmd=0xf514 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5395.750974][ T28] audit: type=1400 audit(2000004137.710:2196): avc: denied { read } for pid=25870 comm="syz.2.8521" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5395.754052][ T28] audit: type=1400 audit(2000004137.710:2197): avc: denied { open } for pid=25870 comm="syz.2.8521" path="/dev/input/mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5395.885384][ T28] audit: type=1400 audit(2000004137.840:2198): avc: denied { read } for pid=25870 comm="syz.2.8521" name="mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:auditd_initrc_exec_t:s0" [ 5395.888798][ T28] audit: type=1400 audit(2000004137.840:2199): avc: denied { open } for pid=25870 comm="syz.2.8521" path="/dev/mixer" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:auditd_initrc_exec_t:s0" [ 5395.998793][ T28] audit: type=1400 audit(2000004137.950:2200): avc: denied { execute } for pid=25870 comm="syz.2.8521" path="/1667/file1" dev="tmpfs" ino=8725 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 5396.422551][ T28] audit: type=1400 audit(2000004138.380:2201): avc: denied { create } for pid=25878 comm="syz.2.8524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 5400.685460][T25898] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25898 comm=syz.0.8531 [ 5400.832734][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 5400.833327][ T28] audit: type=1400 audit(2000004142.790:2229): avc: denied { create } for pid=25899 comm="syz.0.8532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 5401.329712][ T28] audit: type=1400 audit(2000004143.260:2230): avc: denied { read write } for pid=25901 comm="syz.2.8533" name="renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5401.330149][ T28] audit: type=1400 audit(2000004143.260:2231): avc: denied { open } for pid=25901 comm="syz.2.8533" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5401.599809][ T28] audit: type=1400 audit(2000004143.550:2232): avc: denied { ioctl } for pid=25901 comm="syz.2.8533" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 ioctlcmd=0x64a3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5401.652469][ T28] audit: type=1400 audit(2000004143.610:2233): avc: denied { ioctl } for pid=25901 comm="syz.2.8533" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 ioctlcmd=0x64a3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5401.759792][ T28] audit: type=1400 audit(2000004143.710:2234): avc: denied { ioctl } for pid=25901 comm="syz.2.8533" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 ioctlcmd=0x64bd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5401.776558][ T28] audit: type=1400 audit(2000004143.730:2235): avc: denied { ioctl } for pid=25901 comm="syz.2.8533" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 ioctlcmd=0x64bd scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5401.805680][ T28] audit: type=1400 audit(2000004143.760:2236): avc: denied { ioctl } for pid=25901 comm="syz.2.8533" path="/dev/dri/renderD128" dev="devtmpfs" ino=613 ioctlcmd=0x64c5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5401.946399][ T28] audit: type=1400 audit(2000004143.850:2237): avc: denied { create } for pid=25901 comm="syz.2.8533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5402.819746][ T28] audit: type=1400 audit(2000004144.770:2238): avc: denied { read write } for pid=25908 comm="syz.2.8535" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5402.831649][T25909] fuse: Bad value for 'fd' [ 5403.610837][T25913] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25913 comm=syz.2.8537 [ 5406.344472][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 5406.344813][ T28] audit: type=1400 audit(2000004148.300:2261): avc: denied { ioctl } for pid=25920 comm="syz.2.8541" path="/dev/snd/seq" dev="devtmpfs" ino=722 ioctlcmd=0x5333 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5406.574935][ T28] audit: type=1400 audit(2000004148.530:2262): avc: denied { create } for pid=25923 comm="syz.0.8542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5406.884304][T25925] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25925 comm=syz.0.8542 [ 5407.714264][ T28] audit: type=1400 audit(2000004149.670:2263): avc: denied { create } for pid=25929 comm="syz.0.8544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 5407.737669][ T28] audit: type=1400 audit(2000004149.690:2264): avc: denied { ioctl } for pid=25929 comm="syz.0.8544" path="socket:[76379]" dev="sockfs" ino=76379 ioctlcmd=0x5820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 5407.813638][ T28] audit: type=1400 audit(2000004149.770:2265): avc: denied { create } for pid=25929 comm="syz.0.8544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5407.819791][ T28] audit: type=1400 audit(2000004149.770:2266): avc: denied { write } for pid=25929 comm="syz.0.8544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5407.821793][ T28] audit: type=1400 audit(2000004149.770:2267): avc: denied { module_request } for pid=25929 comm="syz.0.8544" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5407.983022][ T28] audit: type=1400 audit(2000004149.940:2268): avc: denied { read } for pid=25929 comm="syz.0.8544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5408.394151][ T28] audit: type=1400 audit(2000004150.350:2269): avc: denied { read append } for pid=25932 comm="syz.2.8545" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5408.394549][ T28] audit: type=1400 audit(2000004150.350:2270): avc: denied { open } for pid=25932 comm="syz.2.8545" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5410.755145][T25946] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25946 comm=syz.0.8547 [ 5411.562650][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 5411.563075][ T28] audit: type=1400 audit(2000004153.520:2304): avc: denied { create } for pid=25950 comm="syz.0.8549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5411.584483][ T28] audit: type=1400 audit(2000004153.540:2305): avc: denied { write } for pid=25950 comm="syz.0.8549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5411.621121][ T28] audit: type=1400 audit(2000004153.560:2306): avc: denied { read } for pid=25947 comm="syz.2.8550" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:src_t:s0" [ 5411.623914][ T28] audit: type=1400 audit(2000004153.580:2307): avc: denied { open } for pid=25947 comm="syz.2.8550" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:src_t:s0" [ 5411.636242][ T28] audit: type=1400 audit(2000004153.590:2308): avc: denied { read } for pid=25950 comm="syz.0.8549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5411.710516][ T28] audit: type=1400 audit(2000004153.660:2309): avc: denied { read } for pid=25950 comm="syz.0.8549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5411.893422][ T28] audit: type=1400 audit(2000004153.850:2310): avc: denied { create } for pid=25947 comm="syz.2.8550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5411.913782][ T28] audit: type=1400 audit(2000004153.870:2311): avc: denied { write } for pid=25947 comm="syz.2.8550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5411.914200][ T28] audit: type=1400 audit(2000004153.870:2312): avc: denied { read } for pid=25947 comm="syz.2.8550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5411.986156][ T28] audit: type=1400 audit(2000004153.940:2313): avc: denied { create } for pid=25947 comm="syz.2.8550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5413.616962][T16374] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5413.698923][T16374] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5413.784360][T16374] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5413.855583][T16374] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5414.213033][T16374] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5414.223891][T16374] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5414.227338][T16374] bond0 (unregistering): Released all slaves [ 5414.334420][T16374] hsr_slave_0: left promiscuous mode [ 5414.351562][T16374] hsr_slave_1: left promiscuous mode [ 5414.391926][T16374] veth1_macvtap: left promiscuous mode [ 5414.392323][T16374] veth0_macvtap: left promiscuous mode [ 5414.392521][T16374] veth1_vlan: left promiscuous mode [ 5414.392628][T16374] veth0_vlan: left promiscuous mode [ 5416.813885][ T28] kauditd_printk_skb: 218 callbacks suppressed [ 5416.815157][ T28] audit: type=1400 audit(2000004158.770:2532): avc: denied { module_request } for pid=25967 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5416.915745][ T28] audit: type=1400 audit(2000004158.840:2533): avc: denied { read } for pid=25987 comm="syz.0.8555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5416.917482][ T28] audit: type=1400 audit(2000004158.850:2534): avc: denied { write } for pid=25987 comm="syz.0.8555" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5416.971432][ T28] audit: type=1400 audit(2000004158.930:2535): avc: denied { search } for pid=26040 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5416.971812][ T28] audit: type=1400 audit(2000004158.930:2536): avc: denied { read } for pid=26040 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5416.974119][ T28] audit: type=1400 audit(2000004158.930:2537): avc: denied { open } for pid=26040 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5416.981786][ T28] audit: type=1400 audit(2000004158.940:2538): avc: denied { search } for pid=26040 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5416.982262][ T28] audit: type=1400 audit(2000004158.940:2539): avc: denied { search } for pid=26040 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5416.982353][ T28] audit: type=1400 audit(2000004158.940:2540): avc: denied { search } for pid=26040 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5416.982417][ T28] audit: type=1400 audit(2000004158.940:2541): avc: denied { read } for pid=26040 comm="cmp" name="resolv.conf.eth5.link" dev="tmpfs" ino=59 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5418.336318][T25967] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5418.342448][T25967] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5419.993491][T25967] hsr_slave_0: entered promiscuous mode [ 5420.006766][T25967] hsr_slave_1: entered promiscuous mode [ 5421.183818][T25967] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 5421.193240][T25967] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 5421.206149][T25967] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 5421.216351][T25967] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 5421.821249][ T28] kauditd_printk_skb: 398 callbacks suppressed [ 5421.821818][ T28] audit: type=1400 audit(2000004163.770:2940): avc: denied { search } for pid=26204 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5421.822009][ T28] audit: type=1400 audit(2000004163.770:2941): avc: denied { search } for pid=26204 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5421.893576][ T28] audit: type=1400 audit(2000004163.840:2942): avc: denied { sys_module } for pid=25967 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5421.894141][ T28] audit: type=1400 audit(2000004163.840:2943): avc: denied { module_request } for pid=25967 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5422.200200][ T28] audit: type=1400 audit(2000004164.140:2944): avc: denied { module_request } for pid=25967 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5422.404315][ T28] audit: type=1400 audit(2000004164.360:2945): avc: denied { write } for pid=26301 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5422.419975][ T28] audit: type=1400 audit(2000004164.370:2946): avc: denied { write open } for pid=26301 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5422.482180][ T28] audit: type=1400 audit(2000004164.440:2947): avc: denied { read open } for pid=26296 comm="syz.0.8558" path="net:[4026532741]" dev="nsfs" ino=4026532741 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5422.579770][ T28] audit: type=1400 audit(2000004164.530:2948): avc: denied { sys_module } for pid=25967 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5422.597893][ T28] audit: type=1400 audit(2000004164.550:2949): avc: denied { module_request } for pid=25967 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5423.173652][T25967] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5426.831171][ T28] kauditd_printk_skb: 370 callbacks suppressed [ 5426.831473][ T28] audit: type=1400 audit(2000004168.790:3320): avc: denied { search } for pid=26336 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5426.839685][ T28] audit: type=1400 audit(2000004168.790:3321): avc: denied { search } for pid=26336 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5426.849714][ T28] audit: type=1400 audit(2000004168.800:3322): avc: denied { read open } for pid=26336 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5426.850041][ T28] audit: type=1400 audit(2000004168.800:3323): avc: denied { getattr } for pid=26336 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5426.850164][ T28] audit: type=1400 audit(2000004168.800:3324): avc: denied { search } for pid=26336 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5426.850274][ T28] audit: type=1400 audit(2000004168.800:3325): avc: denied { search } for pid=26336 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5426.850378][ T28] audit: type=1400 audit(2000004168.800:3326): avc: denied { search } for pid=26336 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5426.850482][ T28] audit: type=1400 audit(2000004168.800:3327): avc: denied { search } for pid=26336 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5426.891616][ T28] audit: type=1400 audit(2000004168.830:3328): avc: denied { search } for pid=26336 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5426.891998][ T28] audit: type=1400 audit(2000004168.830:3329): avc: denied { search } for pid=26336 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5430.570838][T25967] veth0_vlan: entered promiscuous mode [ 5430.625943][T25967] veth1_vlan: entered promiscuous mode [ 5430.781408][T25967] veth0_macvtap: entered promiscuous mode [ 5430.842161][T25967] veth1_macvtap: entered promiscuous mode [ 5430.911059][T24617] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 5430.912472][T24617] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 5430.912888][T24617] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 5430.912982][T24617] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 5432.160433][ T28] kauditd_printk_skb: 607 callbacks suppressed [ 5432.161527][ T28] audit: type=1400 audit(2000004174.110:3937): avc: denied { search } for pid=26374 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5432.164111][ T28] audit: type=1400 audit(2000004174.110:3938): avc: denied { search } for pid=26374 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5432.165929][ T28] audit: type=1400 audit(2000004174.110:3939): avc: denied { search } for pid=26374 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5432.167891][ T28] audit: type=1400 audit(2000004174.110:3940): avc: denied { getattr } for pid=26374 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth5.dhcp" dev="tmpfs" ino=67 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5432.174818][ T28] audit: type=1400 audit(2000004174.110:3941): avc: denied { search } for pid=26374 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5432.176644][ T28] audit: type=1400 audit(2000004174.110:3942): avc: denied { search } for pid=26374 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5432.178907][ T28] audit: type=1400 audit(2000004174.110:3943): avc: denied { search } for pid=26374 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5432.181827][ T28] audit: type=1400 audit(2000004174.130:3944): avc: denied { search } for pid=26374 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5432.187037][ T28] audit: type=1400 audit(2000004174.140:3945): avc: denied { remove_name search } for pid=26374 comm="rm" name="resolv.conf.eth5.dhcp" dev="tmpfs" ino=67 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5432.187377][ T28] audit: type=1400 audit(2000004174.140:3946): avc: denied { unlink } for pid=26374 comm="rm" name="resolv.conf.eth5.dhcp" dev="tmpfs" ino=67 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5443.056151][ T28] kauditd_printk_skb: 94 callbacks suppressed [ 5443.056855][ T28] audit: type=1400 audit(2000004185.010:4041): avc: denied { create } for pid=26394 comm="syz.2.8565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 5443.083764][ T28] audit: type=1400 audit(2000004185.030:4042): avc: denied { prog_load } for pid=26394 comm="syz.2.8565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5443.086165][ T28] audit: type=1400 audit(2000004185.040:4043): avc: denied { bpf } for pid=26394 comm="syz.2.8565" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5443.114439][ T28] audit: type=1400 audit(2000004185.070:4044): avc: denied { execmem } for pid=26394 comm="syz.2.8565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5445.253813][T26397] virtio-fs: tag not found [ 5445.277184][ T28] audit: type=1400 audit(2000004187.210:4045): avc: denied { mounton } for pid=26394 comm="syz.2.8565" path="/3" dev="tmpfs" ino=28 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5445.277449][ T28] audit: type=1400 audit(2000004187.220:4046): avc: denied { create } for pid=26394 comm="syz.2.8565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5458.624396][ T28] audit: type=1400 audit(2000004200.580:4047): avc: denied { read } for pid=26398 comm="syz.2.8566" dev="nsfs" ino=4026532656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5458.641380][ T28] audit: type=1400 audit(2000004200.600:4048): avc: denied { read open } for pid=26398 comm="syz.2.8566" path="net:[4026532656]" dev="nsfs" ino=4026532656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5458.653574][ T28] audit: type=1400 audit(2000004200.610:4049): avc: denied { create } for pid=26398 comm="syz.2.8566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5458.699624][ T28] audit: type=1400 audit(2000004200.630:4050): avc: denied { read write } for pid=26398 comm="syz.2.8566" name="sequencer" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5458.705061][ T28] audit: type=1400 audit(2000004200.660:4051): avc: denied { read open } for pid=26398 comm="syz.2.8566" path="/dev/sequencer" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5458.723465][ T28] audit: type=1400 audit(2000004200.680:4052): avc: denied { write } for pid=26398 comm="syz.2.8566" name="midiC2D0" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5458.727087][ T28] audit: type=1400 audit(2000004200.680:4053): avc: denied { open } for pid=26398 comm="syz.2.8566" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5459.267055][ T28] audit: type=1400 audit(2000004201.220:4054): avc: denied { read } for pid=26398 comm="syz.2.8566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 5460.147085][ T28] audit: type=1400 audit(2000004202.100:4055): avc: denied { read } for pid=26401 comm="syz.2.8567" name="event0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5460.148582][ T28] audit: type=1400 audit(2000004202.100:4056): avc: denied { open } for pid=26401 comm="syz.2.8567" path="/dev/input/event0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5460.896223][T26410] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5460.913830][T26410] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5461.535404][T26419] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5461.538457][T26419] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5464.554430][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 5464.557679][ T28] audit: type=1400 audit(2000004206.510:4066): avc: denied { map_create } for pid=26422 comm="syz.2.8575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5464.635376][ T28] audit: type=1400 audit(2000004206.550:4067): avc: denied { name_bind } for pid=26422 comm="syz.2.8575" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5464.635672][ T28] audit: type=1400 audit(2000004206.550:4068): avc: denied { node_bind } for pid=26422 comm="syz.2.8575" saddr=::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5464.635882][ T28] audit: type=1400 audit(2000004206.570:4069): avc: denied { create } for pid=26422 comm="syz.2.8575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5464.635997][ T28] audit: type=1400 audit(2000004206.570:4070): avc: denied { write } for pid=26422 comm="syz.2.8575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5464.636104][ T28] audit: type=1400 audit(2000004206.570:4071): avc: denied { read } for pid=26422 comm="syz.2.8575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5470.843209][ T28] audit: type=1400 audit(2000004212.800:4072): avc: denied { execmem } for pid=26426 comm="syz.2.8576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5472.406768][ T28] audit: type=1400 audit(2000004214.360:4073): avc: denied { execute } for pid=26428 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5472.423196][ T28] audit: type=1400 audit(2000004214.380:4074): avc: denied { execute_no_trans } for pid=26428 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5472.430041][ T28] audit: type=1400 audit(2000004214.380:4075): avc: denied { execute } for pid=26428 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5472.476957][ T28] audit: type=1400 audit(2000004214.430:4076): avc: denied { execmem } for pid=26428 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5472.550032][ T28] audit: type=1400 audit(2000004214.500:4077): avc: denied { read } for pid=26429 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5472.551906][ T28] audit: type=1400 audit(2000004214.500:4078): avc: denied { open } for pid=26429 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5472.574182][ T28] audit: type=1400 audit(2000004214.500:4079): avc: denied { mounton } for pid=26429 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 5472.608446][ T28] audit: type=1400 audit(2000004214.560:4080): avc: denied { module_request } for pid=26429 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5472.787118][ T28] audit: type=1400 audit(2000004214.740:4081): avc: denied { sys_module } for pid=26429 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5472.913176][T17257] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5473.000412][T17257] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5473.058177][T17257] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5473.151541][T17257] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5473.621053][T17257] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5473.654707][T17257] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5473.673973][T17257] bond0 (unregistering): Released all slaves [ 5473.846492][T17257] hsr_slave_0: left promiscuous mode [ 5473.871374][T17257] hsr_slave_1: left promiscuous mode [ 5473.901692][T17257] veth1_macvtap: left promiscuous mode [ 5473.902100][T17257] veth0_macvtap: left promiscuous mode [ 5473.902305][T17257] veth1_vlan: left promiscuous mode [ 5476.267058][ T28] kauditd_printk_skb: 25 callbacks suppressed [ 5476.267564][ T28] audit: type=1400 audit(2000004218.220:4107): avc: denied { read write } for pid=26429 comm="syz-executor" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5476.274404][ T28] audit: type=1400 audit(2000004218.230:4108): avc: denied { write } for pid=26465 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5476.277043][ T28] audit: type=1400 audit(2000004218.230:4109): avc: denied { read write open } for pid=26429 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5476.289586][ T28] audit: type=1400 audit(2000004218.240:4110): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5476.295053][ T28] audit: type=1400 audit(2000004218.250:4111): avc: denied { write open } for pid=26465 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5476.622442][ T28] audit: type=1400 audit(2000004218.580:4112): avc: denied { module_request } for pid=26429 comm="syz-executor" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5476.928270][ T28] audit: type=1400 audit(2000004218.880:4113): avc: denied { write } for pid=26493 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5476.931024][ T28] audit: type=1400 audit(2000004218.890:4114): avc: denied { write open } for pid=26493 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5476.980056][ T28] audit: type=1400 audit(2000004218.920:4115): avc: denied { search } for pid=26493 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5476.989994][ T28] audit: type=1400 audit(2000004218.940:4116): avc: denied { search } for pid=26493 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.272434][ T28] kauditd_printk_skb: 256 callbacks suppressed [ 5481.280595][ T28] audit: type=1400 audit(2000004223.230:4373): avc: denied { search } for pid=26574 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.283603][ T28] audit: type=1400 audit(2000004223.230:4374): avc: denied { search } for pid=26574 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.285462][ T28] audit: type=1400 audit(2000004223.230:4375): avc: denied { search } for pid=26574 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.287137][ T28] audit: type=1400 audit(2000004223.230:4376): avc: denied { search } for pid=26574 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.288888][ T28] audit: type=1400 audit(2000004223.230:4377): avc: denied { search } for pid=26574 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.291681][ T28] audit: type=1400 audit(2000004223.230:4378): avc: denied { search } for pid=26574 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.293829][ T28] audit: type=1400 audit(2000004223.230:4379): avc: denied { search } for pid=26574 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.296153][ T28] audit: type=1400 audit(2000004223.230:4380): avc: denied { read open } for pid=26574 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.300502][ T28] audit: type=1400 audit(2000004223.250:4381): avc: denied { getattr } for pid=26574 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.307729][ T28] audit: type=1400 audit(2000004223.260:4382): avc: denied { search } for pid=26574 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5481.816780][T26429] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5481.845442][T26429] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5484.048692][T26429] hsr_slave_0: entered promiscuous mode [ 5484.052795][T26429] hsr_slave_1: entered promiscuous mode [ 5484.056247][T26429] debugfs: 'hsr0' already exists in 'hsr' [ 5484.056602][T26429] Cannot create hsr debugfs directory [ 5484.976546][T26429] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 5485.011403][T26429] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 5485.038986][T26429] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 5485.071047][T26429] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 5486.434721][ T28] kauditd_printk_skb: 316 callbacks suppressed [ 5486.435142][ T28] audit: type=1400 audit(2000004228.390:4699): avc: denied { module_request } for pid=26429 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5486.723552][ T28] audit: type=1400 audit(2000004228.680:4700): avc: denied { sys_module } for pid=26429 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5486.725530][ T28] audit: type=1400 audit(2000004228.680:4701): avc: denied { module_request } for pid=26429 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5486.751294][ T28] audit: type=1400 audit(2000004228.710:4702): avc: denied { write } for pid=26769 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5486.753249][ T28] audit: type=1400 audit(2000004228.710:4703): avc: denied { open } for pid=26769 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5486.766685][ T28] audit: type=1400 audit(2000004228.720:4704): avc: denied { search } for pid=26769 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5486.769936][ T28] audit: type=1400 audit(2000004228.720:4705): avc: denied { search } for pid=26769 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5486.770260][ T28] audit: type=1400 audit(2000004228.720:4706): avc: denied { search } for pid=26769 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5486.770469][ T28] audit: type=1400 audit(2000004228.720:4707): avc: denied { search } for pid=26769 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5486.800785][ T28] audit: type=1400 audit(2000004228.760:4708): avc: denied { search } for pid=26772 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5487.502856][T26429] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5491.445605][ T28] kauditd_printk_skb: 750 callbacks suppressed [ 5491.449666][ T28] audit: type=1400 audit(2000004233.400:5459): avc: denied { module_request } for pid=26429 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5491.605940][ T28] audit: type=1400 audit(2000004233.560:5460): avc: denied { sys_module } for pid=26429 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5491.608275][ T28] audit: type=1400 audit(2000004233.560:5461): avc: denied { module_request } for pid=26429 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5491.731061][ T28] audit: type=1400 audit(2000004233.680:5462): avc: denied { search } for pid=26802 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5491.731477][ T28] audit: type=1400 audit(2000004233.680:5463): avc: denied { read } for pid=26802 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5491.731818][ T28] audit: type=1400 audit(2000004233.680:5464): avc: denied { open } for pid=26802 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5491.732044][ T28] audit: type=1400 audit(2000004233.680:5465): avc: denied { search } for pid=26802 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5491.732252][ T28] audit: type=1400 audit(2000004233.680:5466): avc: denied { search } for pid=26802 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5491.732465][ T28] audit: type=1400 audit(2000004233.680:5467): avc: denied { search } for pid=26802 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5491.732673][ T28] audit: type=1400 audit(2000004233.680:5468): avc: denied { read } for pid=26802 comm="cmp" name="resolv.conf.eth6.link" dev="tmpfs" ino=75 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5495.408721][T26429] veth0_vlan: entered promiscuous mode [ 5495.476810][T26429] veth1_vlan: entered promiscuous mode [ 5495.484010][T26836] raw_sendmsg: syz.2.8583 forgot to set AF_INET. Fix it! [ 5495.643148][T26429] veth0_macvtap: entered promiscuous mode [ 5495.672503][T26429] veth1_macvtap: entered promiscuous mode [ 5495.800292][T16374] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 5495.801021][T16374] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 5495.801302][T16374] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 5495.801377][T16374] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 5496.543232][ T28] kauditd_printk_skb: 573 callbacks suppressed [ 5496.543588][ T28] audit: type=1400 audit(2000004238.500:6042): avc: denied { create } for pid=26843 comm="syz.0.8584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5496.582073][ T28] audit: type=1400 audit(2000004238.540:6043): avc: denied { create } for pid=26843 comm="syz.0.8584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5496.589972][ T28] audit: type=1400 audit(2000004238.540:6044): avc: denied { setopt } for pid=26843 comm="syz.0.8584" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5496.596500][ T28] audit: type=1400 audit(2000004238.550:6045): avc: denied { setopt } for pid=26843 comm="syz.0.8584" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5496.613317][ T28] audit: type=1400 audit(2000004238.570:6046): avc: denied { ioctl } for pid=26843 comm="syz.0.8584" path="socket:[78208]" dev="sockfs" ino=78208 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5496.668660][ T28] audit: type=1400 audit(2000004238.620:6047): avc: denied { search } for pid=26842 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5496.680790][ T28] audit: type=1400 audit(2000004238.630:6048): avc: denied { search } for pid=26842 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5496.681186][ T28] audit: type=1400 audit(2000004238.630:6049): avc: denied { search } for pid=26842 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5496.681408][ T28] audit: type=1400 audit(2000004238.630:6050): avc: denied { getattr } for pid=26842 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=78 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5496.681626][ T28] audit: type=1400 audit(2000004238.630:6051): avc: denied { search } for pid=26842 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5500.568127][T26894] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5500.574314][T26894] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5502.907002][ T28] kauditd_printk_skb: 101 callbacks suppressed [ 5502.907364][ T28] audit: type=1400 audit(2000004244.860:6153): avc: denied { create } for pid=26890 comm="syz.0.8602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5502.932778][ T28] audit: type=1400 audit(2000004244.890:6154): avc: denied { bind } for pid=26890 comm="syz.0.8602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5502.939715][ T28] audit: type=1400 audit(2000004244.890:6155): avc: denied { module_request } for pid=26890 comm="syz.0.8602" kmod="crypto-cbc-serpent-avx2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5502.989426][ T28] audit: type=1400 audit(2000004244.940:6156): avc: denied { mount } for pid=26893 comm="syz.2.8603" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 5503.013570][ T28] audit: type=1400 audit(2000004244.970:6157): avc: denied { read write } for pid=26893 comm="syz.2.8603" name="udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5503.015555][ T28] audit: type=1400 audit(2000004244.970:6158): avc: denied { open } for pid=26893 comm="syz.2.8603" path="/dev/udmabuf" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5503.117997][ T28] audit: type=1400 audit(2000004245.060:6159): avc: denied { ioctl } for pid=26893 comm="syz.2.8603" path="/dev/udmabuf" dev="devtmpfs" ino=664 ioctlcmd=0x7542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5503.132080][ T28] audit: type=1400 audit(2000004245.090:6160): avc: denied { read write } for pid=26893 comm="syz.2.8603" name="controlC3" dev="devtmpfs" ino=754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5503.165655][ T28] audit: type=1400 audit(2000004245.110:6161): avc: denied { ioctl open } for pid=26893 comm="syz.2.8603" path="/dev/snd/controlC3" dev="devtmpfs" ino=754 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5503.201821][ T28] audit: type=1400 audit(2000004245.160:6162): avc: denied { ioctl } for pid=26893 comm="syz.2.8603" path="/dev/snd/controlC3" dev="devtmpfs" ino=754 ioctlcmd=0x5521 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5512.594883][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 5512.595242][ T28] audit: type=1400 audit(2000004254.550:6166): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5512.597753][ T28] audit: type=1400 audit(2000004254.550:6167): avc: denied { read write open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5512.601192][ T28] audit: type=1400 audit(2000004254.550:6168): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5512.701822][T26905] netlink: 16 bytes leftover after parsing attributes in process `syz.0.8604'. [ 5512.756629][ T28] audit: type=1400 audit(2000004254.710:6169): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5512.758621][ T28] audit: type=1400 audit(2000004254.710:6170): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5512.761337][ T28] audit: type=1400 audit(2000004254.710:6171): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5512.973184][ T28] audit: type=1400 audit(2000004254.930:6172): avc: denied { write } for pid=26906 comm="syz.0.8605" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5512.974367][ T28] audit: type=1400 audit(2000004254.930:6173): avc: denied { open } for pid=26906 comm="syz.0.8605" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5512.993360][ T28] audit: type=1400 audit(2000004254.950:6174): avc: denied { ioctl } for pid=26906 comm="syz.0.8605" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5513.061750][ T28] audit: type=1400 audit(2000004255.020:6175): avc: denied { create } for pid=26906 comm="syz.0.8605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5516.178093][T26927] netlink: 36 bytes leftover after parsing attributes in process `syz.2.8609'. [ 5518.793217][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 5518.793568][ T28] audit: type=1400 audit(2000004260.750:6208): avc: denied { create } for pid=26937 comm="syz.2.8612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5518.808243][ T28] audit: type=1400 audit(2000004260.760:6209): avc: denied { bind } for pid=26937 comm="syz.2.8612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5518.815316][ T28] audit: type=1400 audit(2000004260.770:6210): avc: denied { write } for pid=26937 comm="syz.2.8612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5518.961635][ T28] audit: type=1400 audit(2000004260.920:6211): avc: denied { module_request } for pid=26939 comm="syz.2.8613" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5519.333331][ T28] audit: type=1400 audit(2000004261.290:6212): avc: denied { create } for pid=26943 comm="syz.2.8614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5519.348392][ T28] audit: type=1400 audit(2000004261.300:6213): avc: denied { write } for pid=26943 comm="syz.2.8614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5519.511655][ T28] audit: type=1400 audit(2000004261.470:6214): avc: denied { read } for pid=26945 comm="syz.2.8615" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5519.517210][ T28] audit: type=1400 audit(2000004261.470:6215): avc: denied { open } for pid=26945 comm="syz.2.8615" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5519.536991][ T28] audit: type=1400 audit(2000004261.490:6216): avc: denied { execmem } for pid=26945 comm="syz.2.8615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5519.552832][ T28] audit: type=1400 audit(2000004261.510:6217): avc: denied { ioctl } for pid=26945 comm="syz.2.8615" path="/dev/iommu" dev="devtmpfs" ino=611 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5519.780428][T26950] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5519.786993][T26950] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5523.887578][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 5523.888879][ T28] audit: type=1400 audit(2000004521.834:6231): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5523.897345][ T28] audit: type=1400 audit(2000004521.844:6232): avc: denied { read write open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5523.913371][ T28] audit: type=1400 audit(2000004521.864:6233): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5524.170203][ T28] audit: type=1400 audit(2000004522.114:6234): avc: denied { read write } for pid=26957 comm="syz.0.8619" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5524.173055][ T28] audit: type=1400 audit(2000004522.124:6235): avc: denied { read write open } for pid=26957 comm="syz.0.8619" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5524.221318][ T28] audit: type=1400 audit(2000004522.164:6236): avc: denied { mounton } for pid=26957 comm="syz.0.8619" path="/12/file0" dev="tmpfs" ino=80 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 5524.377191][ T28] audit: type=1400 audit(2000004522.324:6237): avc: denied { mount } for pid=26957 comm="syz.0.8619" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5525.617521][T26960] process 'syz.0.8619' launched './file0' with NULL argv: empty string added [ 5526.677742][ T28] audit: type=1400 audit(2000004524.624:6238): avc: denied { unmount } for pid=26429 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5526.713931][ T28] audit: type=1400 audit(2000004524.664:6239): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5526.714501][ T28] audit: type=1400 audit(2000004524.664:6240): avc: denied { read write open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5527.222755][T26965] random: crng reseeded on system resumption [ 5528.930113][ T28] kauditd_printk_skb: 49 callbacks suppressed [ 5528.931353][ T28] audit: type=1400 audit(2000004526.874:6290): avc: denied { create } for pid=26979 comm="syz.0.8628" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5528.958791][ T28] audit: type=1400 audit(2000004526.904:6291): avc: denied { ioctl } for pid=26979 comm="syz.0.8628" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=78386 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5528.964909][ T28] audit: type=1400 audit(2000004526.914:6292): avc: denied { ioctl } for pid=26979 comm="syz.0.8628" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=78386 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5528.983166][ T28] audit: type=1400 audit(2000004526.934:6293): avc: denied { create } for pid=26979 comm="syz.0.8628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5529.006858][ T28] audit: type=1400 audit(2000004526.954:6294): avc: denied { setopt } for pid=26979 comm="syz.0.8628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5529.620174][ T28] audit: type=1400 audit(2000004527.554:6295): avc: denied { ioctl } for pid=26979 comm="syz.0.8628" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=78386 ioctlcmd=0xaa05 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5529.645797][ T28] audit: type=1400 audit(2000004527.594:6296): avc: denied { read write } for pid=26979 comm="syz.0.8628" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5529.661172][ T28] audit: type=1400 audit(2000004527.604:6297): avc: denied { open } for pid=26979 comm="syz.0.8628" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5529.678100][ T28] audit: type=1400 audit(2000004527.624:6298): avc: denied { mounton } for pid=26979 comm="syz.0.8628" path="/21/file0" dev="tmpfs" ino=126 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 5529.709773][ T28] audit: type=1400 audit(2000004527.654:6299): avc: denied { mount } for pid=26979 comm="syz.0.8628" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5531.890007][T17557] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 5532.060281][T17557] usb 1-1: Using ep0 maxpacket: 8 [ 5532.090333][T17557] usb 1-1: config index 0 descriptor too short (expected 30, got 18) [ 5532.091799][T17557] usb 1-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 5532.287566][T17557] usb 1-1: New USB device found, idVendor=1660, idProduct=0932, bcdDevice=80.ea [ 5532.288924][T17557] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 5532.294090][T17557] usb 1-1: Product: syz [ 5532.300393][T17557] usb 1-1: Manufacturer: syz [ 5532.301697][T17557] usb 1-1: SerialNumber: syz [ 5532.310748][T17557] usb 1-1: config 0 descriptor?? [ 5533.710858][T26998] RDS: rds_bind could not find a transport for fe80::1a, load rds_tcp or rds_rdma? [ 5536.703444][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 5536.710366][ T28] audit: type=1400 audit(2000004534.654:6322): avc: denied { read append } for pid=27001 comm="syz.2.8634" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5536.743662][ T28] audit: type=1400 audit(2000004534.694:6323): avc: denied { read append open } for pid=27001 comm="syz.2.8634" path="/dev/dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5536.747336][ T28] audit: type=1400 audit(2000004534.694:6324): avc: denied { ioctl } for pid=27001 comm="syz.2.8634" path="/dev/dsp" dev="devtmpfs" ino=727 ioctlcmd=0x5002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5540.667076][T20376] usb 1-1: USB disconnect, device number 8 [ 5540.738850][ T28] audit: type=1400 audit(2000004538.684:6325): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5540.743263][ T28] audit: type=1400 audit(2000004538.694:6326): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5540.751959][ T28] audit: type=1400 audit(2000004538.704:6327): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5540.858358][ T28] audit: type=1400 audit(2000004538.804:6328): avc: denied { write } for pid=27010 comm="syz.0.8635" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5540.873224][ T28] audit: type=1400 audit(2000004538.824:6329): avc: denied { open } for pid=27010 comm="syz.0.8635" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5540.886711][ T28] audit: type=1400 audit(2000004538.834:6330): avc: denied { ioctl } for pid=27010 comm="syz.0.8635" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5541.033761][ T28] audit: type=1400 audit(2000004538.984:6331): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5541.876932][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 5541.880373][ T28] audit: type=1400 audit(2000004539.824:6349): avc: denied { write } for pid=27018 comm="syz.0.8637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5541.927666][ T28] audit: type=1400 audit(2000004539.874:6350): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5541.933287][ T28] audit: type=1400 audit(2000004539.884:6351): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5541.944375][ T28] audit: type=1400 audit(2000004539.894:6352): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5542.065193][ T28] audit: type=1400 audit(2000004540.014:6353): avc: denied { read append } for pid=27023 comm="syz.0.8638" name="comedi3" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5542.078526][ T28] audit: type=1400 audit(2000004540.024:6354): avc: denied { read open } for pid=27023 comm="syz.0.8638" path="/dev/comedi3" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5542.092785][ T28] audit: type=1400 audit(2000004540.044:6355): avc: denied { ioctl } for pid=27023 comm="syz.0.8638" path="/dev/comedi3" dev="devtmpfs" ino=716 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5542.094569][T27024] comedi: valid board names for 8255 driver are: [ 5542.094706][T27024] 8255 [ 5542.094774][T27024] comedi: valid board names for vmk80xx driver are: [ 5542.094799][T27024] vmk80xx [ 5542.094856][T27024] comedi: valid board names for usbduxsigma driver are: [ 5542.094871][T27024] usbduxsigma [ 5542.094884][T27024] comedi: valid board names for usbduxfast driver are: [ 5542.094897][T27024] usbduxfast [ 5542.094909][T27024] comedi: valid board names for usbdux driver are: [ 5542.094923][T27024] usbdux [ 5542.094935][T27024] comedi: valid board names for ni6501 driver are: [ 5542.094947][T27024] ni6501 [ 5542.094982][T27024] comedi: valid board names for dt9812 driver are: [ 5542.095034][T27024] dt9812 [ 5542.095085][T27024] comedi: valid board names for ni_labpc_cs driver are: [ 5542.095200][T27024] ni_labpc_cs [ 5542.095251][T27024] comedi: valid board names for ni_daq_700 driver are: [ 5542.095363][T27024] ni_daq_700 [ 5542.095421][T27024] comedi: valid board names for labpc_pci driver are: [ 5542.095468][T27024] labpc_pci [ 5542.095521][T27024] comedi: valid board names for adl_pci9118 driver are: [ 5542.095550][T27024] pci9118dg [ 5542.095640][T27024] pci9118hg [ 5542.095656][T27024] pci9118hr [ 5542.095670][T27024] comedi: valid board names for 8255_pci driver are: [ 5542.095688][T27024] 8255_pci [ 5542.095699][T27024] comedi: valid board names for comedi_parport driver are: [ 5542.095713][T27024] comedi_parport [ 5542.095726][T27024] comedi: valid board names for comedi_test driver are: [ 5542.095768][T27024] comedi_test [ 5542.095821][T27024] comedi: valid board names for comedi_bond driver are: [ 5542.095873][T27024] comedi_bond [ 5542.185459][ T28] audit: type=1400 audit(2000004540.134:6356): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5542.193300][ T28] audit: type=1400 audit(2000004540.144:6357): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5542.196164][ T28] audit: type=1400 audit(2000004540.144:6358): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5545.488187][T27030] netlink: 20 bytes leftover after parsing attributes in process `syz.2.8640'. [ 5547.093714][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 5547.094185][ T28] audit: type=1400 audit(2000004545.044:6378): avc: denied { create } for pid=27034 comm="syz.2.8642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5547.112420][ T28] audit: type=1400 audit(2000004545.064:6379): avc: denied { create } for pid=27034 comm="syz.2.8642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5547.114319][ T28] audit: type=1400 audit(2000004545.064:6380): avc: denied { write } for pid=27034 comm="syz.2.8642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5547.122210][ T28] audit: type=1400 audit(2000004545.064:6381): avc: denied { module_request } for pid=27034 comm="syz.2.8642" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5547.278576][ T28] audit: type=1400 audit(2000004545.224:6382): avc: denied { read } for pid=27034 comm="syz.2.8642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5547.300784][ T28] audit: type=1400 audit(2000004545.254:6383): avc: denied { write } for pid=27034 comm="syz.2.8642" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5552.733002][ T28] audit: type=1400 audit(2000004550.684:6384): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5552.736139][ T28] audit: type=1400 audit(2000004550.684:6385): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5552.760901][ T28] audit: type=1400 audit(2000004550.704:6386): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5552.864052][ T28] audit: type=1400 audit(2000004550.814:6387): avc: denied { prog_load } for pid=27039 comm="syz.0.8643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5552.872740][ T28] audit: type=1400 audit(2000004550.824:6388): avc: denied { bpf } for pid=27039 comm="syz.0.8643" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5552.881618][ T28] audit: type=1400 audit(2000004550.834:6389): avc: denied { prog_load } for pid=27039 comm="syz.0.8643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5552.891054][ T28] audit: type=1400 audit(2000004550.844:6390): avc: denied { perfmon } for pid=27039 comm="syz.0.8643" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5552.894635][ T28] audit: type=1400 audit(2000004550.844:6391): avc: denied { bpf } for pid=27039 comm="syz.0.8643" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5552.906280][ T28] audit: type=1400 audit(2000004550.854:6392): avc: denied { bpf } for pid=27039 comm="syz.0.8643" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5552.911139][ T28] audit: type=1400 audit(2000004550.864:6393): avc: denied { prog_run } for pid=27039 comm="syz.0.8643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5558.782666][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 5558.785788][ T28] audit: type=1400 audit(2000004556.694:6398): avc: denied { read append } for pid=27041 comm="syz.0.8644" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5558.787515][ T28] audit: type=1400 audit(2000004556.734:6399): avc: denied { open } for pid=27041 comm="syz.0.8644" path="/dev/dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5558.807473][ T28] audit: type=1400 audit(2000004556.754:6400): avc: denied { ioctl } for pid=27041 comm="syz.0.8644" path="/dev/dsp" dev="devtmpfs" ino=727 ioctlcmd=0x5002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5560.153911][ T28] audit: type=1400 audit(2000004558.104:6401): avc: denied { create } for pid=27045 comm="syz.2.8645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5560.176055][ T28] audit: type=1400 audit(2000004558.124:6402): avc: denied { allowed } for pid=27045 comm="syz.2.8645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5560.257731][ T28] audit: type=1400 audit(2000004558.174:6403): avc: denied { create } for pid=27045 comm="syz.2.8645" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5560.258153][ T28] audit: type=1400 audit(2000004558.184:6404): avc: denied { map } for pid=27045 comm="syz.2.8645" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=79192 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5560.258242][ T28] audit: type=1400 audit(2000004558.184:6405): avc: denied { read write } for pid=27045 comm="syz.2.8645" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=79192 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5560.296851][ T28] audit: type=1400 audit(2000004558.244:6406): avc: denied { map } for pid=27045 comm="syz.2.8645" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=79192 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5560.297818][ T28] audit: type=1400 audit(2000004558.244:6407): avc: denied { read write } for pid=27045 comm="syz.2.8645" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=79192 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5565.003028][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 5565.003463][ T28] audit: type=1400 audit(2000004562.954:6427): avc: denied { create } for pid=27056 comm="syz.2.8650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5565.067394][ T28] audit: type=1400 audit(2000004563.014:6428): avc: denied { connect } for pid=27056 comm="syz.2.8650" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5565.154098][ T28] audit: type=1400 audit(2000004563.104:6429): avc: denied { write } for pid=27056 comm="syz.2.8650" path="socket:[78487]" dev="sockfs" ino=78487 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5565.156079][ T28] audit: type=1400 audit(2000004563.104:6430): avc: denied { write } for pid=27056 comm="syz.2.8650" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5565.177658][ T28] audit: type=1400 audit(2000004563.124:6431): avc: denied { write } for pid=27056 comm="syz.2.8650" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5565.189907][ T28] audit: type=1400 audit(2000004563.144:6432): avc: denied { write } for pid=27056 comm="syz.2.8650" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5565.379536][ T28] audit: type=1400 audit(2000004563.324:6433): avc: denied { write } for pid=27056 comm="syz.2.8650" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5565.434071][ T28] audit: type=1400 audit(2000004563.384:6434): avc: denied { write } for pid=27056 comm="syz.2.8650" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5565.448492][ T28] audit: type=1400 audit(2000004563.404:6435): avc: denied { write } for pid=27056 comm="syz.2.8650" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5565.514555][ T28] audit: type=1400 audit(2000004563.464:6436): avc: denied { write } for pid=27056 comm="syz.2.8650" laddr=::1 lport=255 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5571.816863][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 5571.817078][ T28] audit: type=1400 audit(2000004569.764:6439): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5571.818035][ T28] audit: type=1400 audit(2000004569.764:6440): avc: denied { read write open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5571.821819][ T28] audit: type=1400 audit(2000004569.774:6441): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5575.764935][ T28] audit: type=1400 audit(2000004573.714:6442): avc: denied { create } for pid=27065 comm="syz.2.8652" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5575.796346][ T28] audit: type=1400 audit(2000004573.744:6443): avc: denied { ioctl } for pid=27065 comm="syz.2.8652" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=79230 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5575.811889][ T28] audit: type=1400 audit(2000004573.764:6444): avc: denied { ioctl } for pid=27065 comm="syz.2.8652" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=79230 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5575.842933][ T28] audit: type=1400 audit(2000004573.794:6445): avc: denied { ioctl } for pid=27065 comm="syz.2.8652" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=79230 ioctlcmd=0xaa05 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5575.864361][ T28] audit: type=1400 audit(2000004573.814:6446): avc: denied { read write } for pid=27065 comm="syz.2.8652" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5575.866172][ T28] audit: type=1400 audit(2000004573.814:6447): avc: denied { open } for pid=27065 comm="syz.2.8652" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5575.878667][ T28] audit: type=1400 audit(2000004573.824:6448): avc: denied { mounton } for pid=27065 comm="syz.2.8652" path="/59/file0" dev="tmpfs" ino=321 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 5575.883474][T27066] fuse: Unknown parameter 'user_id00000000000000000000' [ 5577.641511][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 5577.642255][ T28] audit: type=1400 audit(2000004575.594:6455): avc: denied { read } for pid=27067 comm="syz.2.8653" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5577.650878][ T28] audit: type=1400 audit(2000004575.604:6456): avc: denied { read open } for pid=27067 comm="syz.2.8653" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5577.712844][ T28] audit: type=1400 audit(2000004575.664:6457): avc: denied { ioctl } for pid=27067 comm="syz.2.8653" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5581.907867][ T28] audit: type=1400 audit(2000004579.854:6458): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5581.914220][ T28] audit: type=1400 audit(2000004579.854:6459): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5581.917529][ T28] audit: type=1400 audit(2000004579.864:6460): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5582.064835][ T28] audit: type=1400 audit(2000004580.014:6461): avc: denied { name_bind } for pid=27076 comm="syz.0.8654" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5582.084078][ T28] audit: type=1400 audit(2000004580.034:6462): avc: denied { node_bind } for pid=27076 comm="syz.0.8654" saddr=::ffff:172.20.20.11 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5582.125112][T27077] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8654'. [ 5582.260967][ T28] audit: type=1400 audit(2000004580.204:6463): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5582.264028][ T28] audit: type=1400 audit(2000004580.204:6464): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5582.703160][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 5582.706457][ T28] audit: type=1400 audit(2000004580.654:6475): avc: denied { name_bind } for pid=27082 comm="syz.0.8657" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5582.716677][ T28] audit: type=1400 audit(2000004580.664:6476): avc: denied { node_bind } for pid=27082 comm="syz.0.8657" saddr=224.0.0.1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5582.772984][ T28] audit: type=1400 audit(2000004580.724:6477): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5582.774944][ T28] audit: type=1400 audit(2000004580.724:6478): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5582.783901][ T28] audit: type=1400 audit(2000004580.734:6479): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5582.867145][ T28] audit: type=1400 audit(2000004580.814:6480): avc: denied { read } for pid=27084 comm="syz.0.8658" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5582.887062][ T28] audit: type=1400 audit(2000004580.834:6481): avc: denied { read open } for pid=27084 comm="syz.0.8658" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5582.897950][ T28] audit: type=1400 audit(2000004580.844:6482): avc: denied { ioctl } for pid=27084 comm="syz.0.8658" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5582.914003][ T28] audit: type=1400 audit(2000004580.864:6483): avc: denied { set_context_mgr } for pid=27084 comm="syz.0.8658" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 5582.929529][ T28] audit: type=1400 audit(2000004580.874:6484): avc: denied { read } for pid=27084 comm="syz.0.8658" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 5585.840120][T19780] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 5586.000101][T19780] usb 1-1: Using ep0 maxpacket: 8 [ 5586.133087][T19780] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 5586.133524][T19780] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 5586.134039][T19780] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 5586.134176][T19780] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 5586.134227][T19780] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 5586.134344][T19780] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 5586.134385][T19780] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 5586.396874][T19780] usb 1-1: GET_CAPABILITIES returned 0 [ 5586.397296][T19780] usbtmc 1-1:16.0: can't read capabilities [ 5587.197749][T22642] usb 1-1: USB disconnect, device number 9 [ 5587.670546][T22642] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 5587.712959][ T28] kauditd_printk_skb: 53 callbacks suppressed [ 5587.715221][ T28] audit: type=1400 audit(2000004585.654:6538): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5587.741369][ T28] audit: type=1400 audit(2000004585.694:6539): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5587.813387][ T28] audit: type=1400 audit(2000004585.764:6540): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5587.890362][T22642] usb 1-1: Using ep0 maxpacket: 8 [ 5587.894472][ T28] audit: type=1400 audit(2000004585.844:6541): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5587.941044][ T28] audit: type=1400 audit(2000004585.894:6542): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5587.952296][T22642] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 5587.952742][T22642] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 5587.952809][T22642] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 5587.952851][T22642] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 5587.952889][T22642] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 5587.952973][T22642] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 5587.953011][T22642] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 5587.982343][ T28] audit: type=1400 audit(2000004585.934:6543): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5587.991594][ T28] audit: type=1400 audit(2000004585.944:6544): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5587.998751][ T28] audit: type=1400 audit(2000004585.944:6545): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5588.211120][T22642] usb 1-1: usb_control_msg returned -32 [ 5588.211526][T22642] usbtmc 1-1:16.0: can't read capabilities [ 5588.215139][ T28] audit: type=1400 audit(2000004586.154:6546): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5588.217841][ T28] audit: type=1400 audit(2000004586.164:6547): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x550c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5595.236524][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 5595.241522][ T28] audit: type=1400 audit(2000004593.184:6582): avc: denied { ioctl } for pid=27102 comm="syz.0.8665" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5597.727918][ T28] audit: type=1400 audit(2000004595.674:6583): avc: denied { name_bind } for pid=27143 comm="syz.2.8670" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5597.734277][ T28] audit: type=1400 audit(2000004595.684:6584): avc: denied { node_bind } for pid=27143 comm="syz.2.8670" saddr=127.0.0.1 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5597.879563][ T28] audit: type=1400 audit(2000004595.824:6585): avc: denied { prog_load } for pid=27145 comm="syz.2.8671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5597.883683][ T28] audit: type=1400 audit(2000004595.834:6586): avc: denied { bpf } for pid=27145 comm="syz.2.8671" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5597.893615][ T28] audit: type=1400 audit(2000004595.844:6587): avc: denied { create } for pid=27145 comm="syz.2.8671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5598.425317][ T28] audit: type=1400 audit(2000004596.374:6588): avc: denied { create } for pid=27145 comm="syz.2.8671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5598.435088][ T28] audit: type=1400 audit(2000004596.384:6589): avc: denied { write } for pid=27145 comm="syz.2.8671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5598.437934][ T28] audit: type=1400 audit(2000004596.384:6590): avc: denied { read } for pid=27145 comm="syz.2.8671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5598.441839][ T28] audit: type=1400 audit(2000004596.384:6591): avc: denied { read } for pid=27145 comm="syz.2.8671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5598.496325][T27147] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8671'. [ 5598.503055][T27147] netlink: 8 bytes leftover after parsing attributes in process `syz.2.8671'. [ 5599.958094][T27179] pim6reg: entered allmulticast mode [ 5600.308163][ T28] kauditd_printk_skb: 44 callbacks suppressed [ 5600.310073][ T28] audit: type=1400 audit(2000004598.254:6636): avc: denied { create } for pid=27187 comm="syz.2.8681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5600.318783][ T28] audit: type=1400 audit(2000004598.264:6637): avc: denied { setopt } for pid=27187 comm="syz.2.8681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5600.328448][ T28] audit: type=1400 audit(2000004598.274:6638): avc: denied { write } for pid=27187 comm="syz.2.8681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5600.450853][ T28] audit: type=1400 audit(2000004598.404:6639): avc: denied { read } for pid=27189 comm="syz.2.8682" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5600.452842][ T28] audit: type=1400 audit(2000004598.404:6640): avc: denied { read open } for pid=27189 comm="syz.2.8682" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5600.458635][ T28] audit: type=1400 audit(2000004598.404:6641): avc: denied { ioctl } for pid=27189 comm="syz.2.8682" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5600.482143][ T28] audit: type=1400 audit(2000004598.434:6642): avc: denied { read } for pid=27189 comm="syz.2.8682" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5600.485990][ T28] audit: type=1400 audit(2000004598.434:6643): avc: denied { open } for pid=27189 comm="syz.2.8682" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5600.493746][ T28] audit: type=1400 audit(2000004598.444:6644): avc: denied { ioctl } for pid=27189 comm="syz.2.8682" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5600.502507][ T28] audit: type=1400 audit(2000004598.444:6645): avc: denied { relabelfrom } for pid=27189 comm="syz.2.8682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 5600.573267][T19780] usb 1-1: USB disconnect, device number 10 [ 5601.801290][T27221] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5601.802577][T27221] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5602.941604][T27238] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5602.943909][T27238] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5605.316670][ T28] kauditd_printk_skb: 49 callbacks suppressed [ 5605.317097][ T28] audit: type=1400 audit(2000004603.264:6695): avc: denied { ioctl } for pid=27207 comm="syz.0.8683" path="/dev/snd/seq" dev="devtmpfs" ino=722 ioctlcmd=0x5320 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5605.497706][T27249] netlink: 40 bytes leftover after parsing attributes in process `syz.0.8683'. [ 5606.356041][ T28] audit: type=1400 audit(2000004604.274:6696): avc: denied { read } for pid=27247 comm="syz.2.8693" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5606.356616][ T28] audit: type=1400 audit(2000004604.274:6697): avc: denied { read open } for pid=27247 comm="syz.2.8693" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5606.738802][ T28] audit: type=1400 audit(2000004604.684:6698): avc: denied { map_create } for pid=27247 comm="syz.2.8693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5606.752270][ T28] audit: type=1400 audit(2000004604.684:6699): avc: denied { perfmon } for pid=27247 comm="syz.2.8693" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5606.752852][ T28] audit: type=1400 audit(2000004604.684:6700): avc: denied { map_create } for pid=27247 comm="syz.2.8693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5606.753105][ T28] audit: type=1400 audit(2000004604.684:6701): avc: denied { map_read map_write } for pid=27247 comm="syz.2.8693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5606.753335][ T28] audit: type=1400 audit(2000004604.694:6702): avc: denied { map_create } for pid=27247 comm="syz.2.8693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5607.063608][ T28] audit: type=1400 audit(2000004605.014:6703): avc: denied { prog_load } for pid=27247 comm="syz.2.8693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5607.070849][ T28] audit: type=1400 audit(2000004605.024:6704): avc: denied { bpf } for pid=27247 comm="syz.2.8693" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5620.807949][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 5620.808359][ T28] audit: type=1400 audit(2000004618.754:6714): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5620.808624][ T28] audit: type=1400 audit(2000004618.754:6715): avc: denied { read write open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5620.821233][ T28] audit: type=1400 audit(2000004618.774:6716): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5620.933792][ T28] audit: type=1400 audit(2000004618.884:6717): avc: denied { read } for pid=27253 comm="syz.0.8694" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5620.958435][ T28] audit: type=1400 audit(2000004618.894:6718): avc: denied { read open } for pid=27253 comm="syz.0.8694" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5620.990981][ T28] audit: type=1400 audit(2000004618.934:6719): avc: denied { ioctl } for pid=27253 comm="syz.0.8694" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5621.033546][ T28] audit: type=1400 audit(2000004618.984:6720): avc: denied { read } for pid=27253 comm="syz.0.8694" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5621.044263][ T28] audit: type=1400 audit(2000004618.994:6721): avc: denied { read open } for pid=27253 comm="syz.0.8694" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5621.058055][ T28] audit: type=1400 audit(2000004619.004:6722): avc: denied { ioctl } for pid=27253 comm="syz.0.8694" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5621.078974][ T28] audit: type=1400 audit(2000004619.024:6723): avc: denied { relabelfrom } for pid=27253 comm="syz.0.8694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 5626.252928][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 5626.253445][ T28] audit: type=1400 audit(2000004624.174:6755): avc: denied { execute } for pid=27288 comm="syz.2.8701" name="file0" dev="tmpfs" ino=482 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 5626.411686][ T28] audit: type=1400 audit(2000004624.364:6756): avc: denied { map_create } for pid=27288 comm="syz.2.8701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5626.412426][ T28] audit: type=1400 audit(2000004624.364:6757): avc: denied { map_read map_write } for pid=27288 comm="syz.2.8701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5626.712485][ T28] audit: type=1400 audit(2000004624.664:6758): avc: denied { allowed } for pid=27288 comm="syz.2.8701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5626.780437][ T28] audit: type=1400 audit(2000004624.724:6759): avc: denied { create } for pid=27288 comm="syz.2.8701" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5626.780991][ T28] audit: type=1400 audit(2000004624.724:6760): avc: denied { map } for pid=27288 comm="syz.2.8701" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=78728 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5626.781090][ T28] audit: type=1400 audit(2000004624.724:6761): avc: denied { read write } for pid=27288 comm="syz.2.8701" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=78728 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5626.822979][ T28] audit: type=1400 audit(2000004624.774:6762): avc: denied { create } for pid=27288 comm="syz.2.8701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5626.835887][ T28] audit: type=1400 audit(2000004624.784:6763): avc: denied { write } for pid=27288 comm="syz.2.8701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5628.223729][ T28] audit: type=1400 audit(2000004626.174:6764): avc: denied { write } for pid=27288 comm="syz.2.8701" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 5634.103333][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 5634.103542][ T28] audit: type=1400 audit(2000004632.054:6766): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5634.108388][ T28] audit: type=1400 audit(2000004632.054:6767): avc: denied { read write open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5634.116105][ T28] audit: type=1400 audit(2000004632.064:6768): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5634.428422][ T28] audit: type=1400 audit(2000004632.374:6769): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5634.436912][ T28] audit: type=1400 audit(2000004632.384:6770): avc: denied { read write open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5634.442492][ T28] audit: type=1400 audit(2000004632.394:6771): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5634.568274][ T28] audit: type=1400 audit(2000004632.514:6772): avc: denied { create } for pid=27295 comm="syz.0.8703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5634.594586][ T28] audit: type=1400 audit(2000004632.544:6773): avc: denied { create } for pid=27295 comm="syz.0.8703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5634.620256][ T28] audit: type=1400 audit(2000004632.564:6774): avc: denied { create } for pid=27295 comm="syz.0.8703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5634.639002][ T28] audit: type=1400 audit(2000004632.584:6775): avc: denied { write } for pid=27295 comm="syz.0.8703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5639.200147][ T28] kauditd_printk_skb: 52 callbacks suppressed [ 5639.216657][ T28] audit: type=1400 audit(2000004636.864:6824): avc: denied { create } for pid=27317 comm="syz.0.8710" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5639.572574][T27320] bridge_slave_1: entered promiscuous mode [ 5639.606785][ T28] audit: type=1400 audit(2000004637.544:6829): avc: denied { sys_module } for pid=27317 comm="syz.0.8710" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5639.612057][ T28] audit: type=1400 audit(2000004637.564:6830): avc: denied { module_request } for pid=27317 comm="syz.0.8710" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5640.757387][ T28] audit: type=1400 audit(2000004638.704:6831): avc: denied { create } for pid=27324 comm="syz.2.8711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5640.772334][ T28] audit: type=1400 audit(2000004638.724:6832): avc: denied { bind } for pid=27324 comm="syz.2.8711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5640.795066][ T28] audit: type=1400 audit(2000004638.744:6833): avc: denied { write } for pid=27324 comm="syz.2.8711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5640.817364][ T28] audit: type=1400 audit(2000004638.764:6834): avc: denied { setopt } for pid=27324 comm="syz.2.8711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 5640.927699][ T28] audit: type=1400 audit(2000004638.874:6835): avc: denied { create } for pid=27326 comm="syz.2.8712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5640.947863][ T28] audit: type=1400 audit(2000004638.894:6836): avc: denied { setopt } for pid=27326 comm="syz.2.8712" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5641.434790][ T28] audit: type=1400 audit(2000004639.384:6837): avc: denied { read write } for pid=27326 comm="syz.2.8712" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5641.465951][T27327] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5641.473800][T27327] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5643.844966][T27338] pim6reg0: tun_chr_ioctl cmd 1074812118 [ 5647.691085][ T28] kauditd_printk_skb: 22 callbacks suppressed [ 5647.692185][ T28] audit: type=1400 audit(2000004645.644:6860): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5647.696695][ T28] audit: type=1400 audit(2000004645.644:6861): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5647.701735][ T28] audit: type=1400 audit(2000004645.654:6862): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5647.835105][ T28] audit: type=1400 audit(2000004645.784:6863): avc: denied { create } for pid=27342 comm="syz.0.8714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5647.842860][ T28] audit: type=1400 audit(2000004645.794:6864): avc: denied { write } for pid=27342 comm="syz.0.8714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5647.898353][ T28] audit: type=1400 audit(2000004645.844:6865): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5647.901757][ T28] audit: type=1400 audit(2000004645.844:6866): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5647.910144][ T28] audit: type=1400 audit(2000004645.844:6867): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5648.043258][ T28] audit: type=1400 audit(2000004645.994:6868): avc: denied { create } for pid=27344 comm="syz.0.8715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5648.064148][ T28] audit: type=1400 audit(2000004646.014:6869): avc: denied { write } for pid=27344 comm="syz.0.8715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5653.228907][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 5653.234874][ T28] audit: type=1400 audit(2000004651.174:6889): avc: denied { write } for pid=27360 comm="syz.2.8721" name="dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5653.237130][ T28] audit: type=1400 audit(2000004651.174:6890): avc: denied { open } for pid=27360 comm="syz.2.8721" path="/dev/dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5653.252737][ T28] audit: type=1400 audit(2000004651.204:6891): avc: denied { read } for pid=27360 comm="syz.2.8721" name="controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5653.255062][ T28] audit: type=1400 audit(2000004651.204:6892): avc: denied { read open } for pid=27360 comm="syz.2.8721" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5653.265911][ T28] audit: type=1400 audit(2000004651.214:6893): avc: denied { ioctl } for pid=27360 comm="syz.2.8721" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 ioctlcmd=0x5532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5653.271522][ T28] audit: type=1400 audit(2000004651.224:6894): avc: denied { append } for pid=27360 comm="syz.2.8721" name="pcmC0D0p" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5653.290057][ T28] audit: type=1400 audit(2000004651.234:6895): avc: denied { append open } for pid=27360 comm="syz.2.8721" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5653.303446][ T28] audit: type=1400 audit(2000004651.254:6896): avc: denied { ioctl } for pid=27360 comm="syz.2.8721" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=725 ioctlcmd=0x4113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5653.326848][ T28] audit: type=1400 audit(2000004651.274:6897): avc: denied { ioctl } for pid=27360 comm="syz.2.8721" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=725 ioctlcmd=0x4124 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5653.497818][ T28] audit: type=1400 audit(2000004651.444:6898): avc: denied { create } for pid=27363 comm="syz.2.8722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5657.445088][T27402] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5657.461408][T27402] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5658.451402][ T28] kauditd_printk_skb: 50 callbacks suppressed [ 5658.453116][ T28] audit: type=1400 audit(2000004656.404:6949): avc: denied { write } for pid=27405 comm="syz.2.8735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5658.691376][ T28] audit: type=1400 audit(2000004656.644:6950): avc: denied { read } for pid=27411 comm="syz.2.8736" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5658.693610][ T28] audit: type=1400 audit(2000004656.644:6951): avc: denied { open } for pid=27411 comm="syz.2.8736" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5658.704862][ T28] audit: type=1400 audit(2000004656.654:6952): avc: denied { ioctl } for pid=27411 comm="syz.2.8736" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5658.730705][ T28] audit: type=1400 audit(2000004656.684:6953): avc: denied { read } for pid=27411 comm="syz.2.8736" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5658.736592][ T28] audit: type=1400 audit(2000004656.684:6954): avc: denied { open } for pid=27411 comm="syz.2.8736" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5658.967272][ T28] audit: type=1400 audit(2000004656.914:6955): avc: denied { append } for pid=27417 comm="syz.2.8737" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5658.968869][ T28] audit: type=1400 audit(2000004656.914:6956): avc: denied { open } for pid=27417 comm="syz.2.8737" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5659.016724][ T28] audit: type=1400 audit(2000004656.964:6957): avc: denied { ioctl } for pid=27417 comm="syz.2.8737" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5659.034686][ T28] audit: type=1400 audit(2000004656.984:6958): avc: denied { ioctl } for pid=27417 comm="syz.2.8737" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5665.236510][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 5665.236779][ T28] audit: type=1400 audit(2000004663.184:6975): avc: denied { read write } for pid=26429 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5665.236983][ T28] audit: type=1400 audit(2000004663.184:6976): avc: denied { open } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5665.243840][ T28] audit: type=1400 audit(2000004663.194:6977): avc: denied { ioctl } for pid=26429 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5665.377422][ T28] audit: type=1400 audit(2000004663.324:6978): avc: denied { read } for pid=27434 comm="syz.0.8743" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5665.378759][ T28] audit: type=1400 audit(2000004663.324:6979): avc: denied { open } for pid=27434 comm="syz.0.8743" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5665.395680][ T28] audit: type=1400 audit(2000004663.344:6980): avc: denied { ioctl } for pid=27434 comm="syz.0.8743" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5665.414596][ T28] audit: type=1400 audit(2000004663.364:6981): avc: denied { execmem } for pid=27434 comm="syz.0.8743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5667.862022][ T28] audit: type=1400 audit(2000004665.794:6982): avc: denied { prog_load } for pid=27434 comm="syz.0.8743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5667.896670][ T28] audit: type=1400 audit(2000004665.844:6983): avc: denied { bpf } for pid=27434 comm="syz.0.8743" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5670.087001][ T28] audit: type=1400 audit(2000004668.034:6984): avc: denied { prog_load } for pid=27438 comm="syz.2.8744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5670.802505][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 5670.808811][ T28] audit: type=1400 audit(2000004668.714:6990): avc: denied { read } for pid=27440 comm="syz.2.8745" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5670.821734][ T28] audit: type=1400 audit(2000004668.754:6991): avc: denied { open } for pid=27440 comm="syz.2.8745" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5670.822210][ T28] audit: type=1400 audit(2000004668.754:6992): avc: denied { ioctl } for pid=27440 comm="syz.2.8745" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5670.822764][ T28] audit: type=1400 audit(2000004668.764:6993): avc: denied { execmem } for pid=27440 comm="syz.2.8745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5675.470384][ T28] audit: type=1400 audit(2000004673.414:6994): avc: denied { prog_load } for pid=27440 comm="syz.2.8745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5675.516997][ T28] audit: type=1400 audit(2000004673.464:6995): avc: denied { bpf } for pid=27440 comm="syz.2.8745" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5676.028603][ T28] audit: type=1400 audit(2000004673.974:6996): avc: denied { prog_load } for pid=27440 comm="syz.2.8745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5676.038771][ T28] audit: type=1400 audit(2000004673.984:6997): avc: denied { bpf } for pid=27440 comm="syz.2.8745" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5676.066973][ T28] audit: type=1400 audit(2000004674.014:6998): avc: denied { prog_load } for pid=27440 comm="syz.2.8745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5676.068583][ T28] audit: type=1400 audit(2000004674.014:6999): avc: denied { perfmon } for pid=27440 comm="syz.2.8745" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5676.070960][ T28] audit: type=1400 audit(2000004674.014:7000): avc: denied { bpf } for pid=27440 comm="syz.2.8745" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5676.167999][T27444] ------------[ cut here ]------------ [ 5676.168826][T27444] WARNING: kernel/bpf/verifier.c:2763 at reg_bounds_sanity_check+0x3c0/0x428, CPU#0: syz.2.8745/27444 [ 5676.171816][T27444] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 5676.174515][T27444] Modules linked in: [ 5676.175711][T27444] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 5676.176204][T27444] CPU: 0 UID: 0 PID: 27444 Comm: syz.2.8745 Tainted: G L syzkaller #0 PREEMPT [ 5676.176668][T27444] Tainted: [L]=SOFTLOCKUP [ 5676.176856][T27444] Hardware name: ARM-Versatile Express [ 5676.177110][T27444] Call trace: [ 5676.177298][T27444] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 5676.177932][T27444] r7:8281f900 r6:00000000 r5:822a579c r4:00000001 [ 5676.178186][T27444] [<80201af0>] (show_stack) from [<8021e454>] (dump_stack_lvl+0x5c/0x70) [ 5676.178728][T27444] [<8021e3f8>] (dump_stack_lvl) from [<8021e480>] (dump_stack+0x18/0x1c) [ 5676.179543][T27444] r7:8281f900 r6:00000000 r5:840bb000 r4:82a80d14 [ 5676.179981][T27444] [<8021e468>] (dump_stack) from [<802025f4>] (vpanic+0x114/0x320) [ 5676.180317][T27444] [<802024e0>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0x104) [ 5676.180703][T27444] r7:803e02a4 [ 5676.180858][T27444] [<80202800>] (panic) from [<80250a68>] (get_taint+0x0/0x1c) [ 5676.181196][T27444] r3:8280c544 r2:00000001 r1:8228c540 r0:82293df8 [ 5676.181437][T27444] [<802509f0>] (check_panic_on_warn) from [<80250be4>] (__warn+0x98/0x1ac) [ 5676.181973][T27444] [<80250b4c>] (__warn) from [<80250ee0>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 5676.182354][T27444] r8:00000009 r7:822ac0d4 r6:ea5c18c4 r5:840bb000 r4:00000000 [ 5676.182638][T27444] [<80250cfc>] (warn_slowpath_fmt) from [<803e02a4>] (reg_bounds_sanity_check+0x3c0/0x428) [ 5676.183064][T27444] r10:86178000 r9:ffffdfcd r8:80000000 r7:ffffdfcd r6:ffffdfcc r5:822ac838 [ 5676.183482][T27444] r4:85f12a30 [ 5676.183644][T27444] [<803dfee4>] (reg_bounds_sanity_check) from [<803ecfcc>] (reg_set_min_max+0x1c4/0x288) [ 5676.184091][T27444] r10:00000001 r9:00000010 r8:86178000 r7:853f5310 r6:85f12b10 r5:85f12a30 [ 5676.184452][T27444] r4:853f5230 [ 5676.184687][T27444] [<803ece08>] (reg_set_min_max) from [<803fdc10>] (check_cond_jmp_op+0xc7c/0x1980) [ 5676.185141][T27444] r10:85f12800 r9:00000010 r8:8f28c200 r7:ffffffff r6:80000000 r5:860ae180 [ 5676.185719][T27444] r4:ea5c30c0 r3:853f5230 [ 5676.186027][T27444] [<803fcf94>] (check_cond_jmp_op) from [<80404280>] (do_check_common+0x259c/0x3228) [ 5676.186697][T27444] r10:8617c000 r9:86178000 r8:ea5c30c0 r7:8617e000 r6:00000018 r5:ea5c3078 [ 5676.187204][T27444] r4:ea5c3000 [ 5676.187376][T27444] [<80401ce4>] (do_check_common) from [<80407ed4>] (bpf_check+0x22e4/0x2d30) [ 5676.187740][T27444] r10:8617e000 r9:00000001 r8:86178000 r7:00000a7b r6:861788bc r5:00000000 [ 5676.188037][T27444] r4:00000016 [ 5676.188189][T27444] [<80405bf0>] (bpf_check) from [<803d95f4>] (bpf_prog_load+0x5b8/0xdec) [ 5676.189503][T27444] r10:ea5c3000 r9:840bb000 r8:85837330 r7:ea5c1d18 r6:00000000 r5:00000000 [ 5676.189906][T27444] r4:ea5c1eb0 [ 5676.190101][T27444] [<803d903c>] (bpf_prog_load) from [<803dae1c>] (__sys_bpf+0x2d8/0x2008) [ 5676.190561][T27444] r10:00000005 r9:00000000 r8:ea5c1e50 r7:00000048 r6:840bb000 r5:200054c0 [ 5676.190928][T27444] r4:00000000 [ 5676.191088][T27444] [<803dab44>] (__sys_bpf) from [<803dd0e4>] (sys_bpf+0x2c/0x48) [ 5676.191513][T27444] r10:00000182 r9:840bb000 r8:8020029c r7:00000182 r6:00346450 r5:00000000 [ 5676.191968][T27444] r4:00000000 [ 5676.192126][T27444] [<803dd0b8>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5676.192556][T27444] Exception stack(0xea5c1fa8 to 0xea5c1ff0) [ 5676.192881][T27444] 1fa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 5676.193338][T27444] 1fc0: 00000000 00000000 00346450 00000182 00346418 00000000 00000001 76efe0dc [ 5676.193719][T27444] 1fe0: 76efde88 76efde78 00018734 0012fc20 [ 5676.196660][T27444] Rebooting in 86400 seconds..