last executing test programs: 32.870458342s ago: executing program 1 (id=7611): r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/slabinfo\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000080)={0x20000011}) 30.858238884s ago: executing program 1 (id=7613): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00'}, 0x10) userfaultfd(0x80001) syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) 29.381236374s ago: executing program 0 (id=7614): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000580)={0x50, r1, 0x201, 0x0, 0x0, {0x3, 0x0, 0x26}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'sit0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @dev}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x50}, 0x8, 0x3000000000002}, 0x40000) 28.174586553s ago: executing program 1 (id=7615): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, 0x0, 0x10) 25.619311677s ago: executing program 0 (id=7616): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 25.096106018s ago: executing program 1 (id=7617): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000480)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x1c, r1, 0x305, 0x0, 0x0, {0x7}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r5}]}, 0x1c}}, 0x20000000) 22.082365851s ago: executing program 0 (id=7618): syz_usb_connect(0x2, 0x36, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000080)={0x0, 0x3, 0x0, 0x3d70000000, &(0x7f0000ffe000/0x2000)=nil}) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000000f000/0x2000)=nil}) 12.308095419s ago: executing program 0 (id=7619): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00'}, 0x10) userfaultfd(0x80001) syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) 9.626483108s ago: executing program 1 (id=7620): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'macvtap0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000001c0)=@newlink={0x44, 0x10, 0x503, 0xfffffffc, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20305, 0x7e15}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MTU={0x8, 0x4, 0x44}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x48094) 4.525983206s ago: executing program 0 (id=7621): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, 0x0, 0x10) 3.826728734s ago: executing program 1 (id=7622): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000110b0008850000007200000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r0, 0x0, 0x28, 0x0, &(0x7f0000000440)="004a1821b95d02ff4284860186ddb09c161f00000000d6e83fa15da5eacd76615b411fdefe215a25", 0x0, 0x403, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) 0s ago: executing program 0 (id=7623): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000100)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x110b, 0x8000000000002}) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x802, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x10000000000) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x10a}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000340)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000440)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x68, 0x18, &(0x7f0000000580)={@fd={0x66642a85, 0x0, r3}, @ptr={0x66642a85, 0x1, 0x0, 0x0, 0x2, 0x2b}, @ptr={0x70742a85, 0x0, &(0x7f0000000500)=""/73, 0x49, 0x2, 0x23}}, &(0x7f00000002c0)={0x0, 0x18, 0x40}}, 0x400}], 0x0, 0x0, 0x0}) kernel console output (not intermixed with test programs): pid=26061 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5111.012433][ T30] audit: type=1400 audit(5110.570:3671): avc: denied { search } for pid=26061 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5111.047248][ T30] audit: type=1400 audit(5110.600:3672): avc: denied { search } for pid=26061 comm="cmp" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5111.048033][ T30] audit: type=1400 audit(5110.600:3673): avc: denied { search } for pid=26061 comm="cmp" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5111.256589][ T30] audit: type=1400 audit(5110.800:3674): avc: denied { read } for pid=26061 comm="cmp" name="resolv.conf.eth0.ra" dev="tmpfs" ino=8281 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5111.468608][ T30] audit: type=1400 audit(5111.020:3675): avc: denied { read open } for pid=26061 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=8281 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5111.733364][ T30] audit: type=1400 audit(5111.290:3676): avc: denied { getattr } for pid=26061 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5112.010200][ T30] audit: type=1400 audit(5111.560:3677): avc: denied { getattr } for pid=26061 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=8281 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5115.216033][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 5115.216964][ T30] audit: type=1400 audit(5114.770:3696): avc: denied { setopt } for pid=26069 comm="syz.1.7505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5115.452806][ T30] audit: type=1400 audit(5115.010:3697): avc: denied { accept } for pid=26069 comm="syz.1.7505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5115.647261][ T30] audit: type=1400 audit(5115.200:3698): avc: denied { create } for pid=26069 comm="syz.1.7505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5115.858552][ T30] audit: type=1400 audit(5115.420:3699): avc: denied { write } for pid=26069 comm="syz.1.7505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5115.966295][ T30] audit: type=1400 audit(5115.510:3700): avc: denied { module_request } for pid=26069 comm="syz.1.7505" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5116.347116][ T30] audit: type=1400 audit(5115.900:3701): avc: denied { ioctl } for pid=26069 comm="syz.1.7505" path="socket:[82147]" dev="sockfs" ino=82147 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5116.431105][ T30] audit: type=1400 audit(5115.990:3702): avc: denied { module_request } for pid=26069 comm="syz.1.7505" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5117.087629][ T30] audit: type=1400 audit(5116.650:3703): avc: denied { write } for pid=26069 comm="syz.1.7505" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5118.475859][ T30] audit: type=1400 audit(5118.030:3704): avc: denied { sys_module } for pid=26069 comm="syz.1.7505" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5118.526866][ T30] audit: type=1400 audit(5118.060:3705): avc: denied { module_request } for pid=26069 comm="syz.1.7505" kmod="crypto-cbc-camellia-asm-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5121.166324][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 5121.167112][ T30] audit: type=1400 audit(5120.670:3707): avc: denied { search } for pid=26073 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5121.167452][ T30] audit: type=1400 audit(5120.720:3708): avc: denied { search } for pid=26073 comm="rm" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5121.167701][ T30] audit: type=1400 audit(5120.720:3709): avc: denied { search } for pid=26073 comm="rm" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5121.437333][ T30] audit: type=1400 audit(5120.990:3710): avc: denied { getattr } for pid=26073 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=8281 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5122.055663][ T30] audit: type=1400 audit(5121.580:3711): avc: denied { search } for pid=26073 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5122.099878][ T30] audit: type=1400 audit(5121.660:3712): avc: denied { search } for pid=26073 comm="rm" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5122.101151][ T30] audit: type=1400 audit(5121.660:3713): avc: denied { search } for pid=26073 comm="rm" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5122.167647][ T30] audit: type=1400 audit(5121.660:3714): avc: denied { search } for pid=26073 comm="rm" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5122.426620][ T30] audit: type=1400 audit(5121.980:3715): avc: denied { remove_name search } for pid=26073 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=8281 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5122.660042][ T30] audit: type=1400 audit(5122.220:3716): avc: denied { unlink } for pid=26073 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=8281 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5126.551050][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 5126.552107][ T30] audit: type=1400 audit(5126.110:3725): avc: denied { create } for pid=26082 comm="syz.1.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5126.861729][ T30] audit: type=1400 audit(5126.420:3726): avc: denied { setopt } for pid=26082 comm="syz.1.7506" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5127.010406][T26084] syz_tun: entered allmulticast mode [ 5127.016504][ T30] audit: type=1400 audit(5126.570:3727): avc: denied { setopt } for pid=26082 comm="syz.1.7506" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5127.346333][ T30] audit: type=1400 audit(5126.890:3728): avc: denied { create } for pid=26082 comm="syz.1.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5127.781740][ T30] audit: type=1400 audit(5127.330:3729): avc: denied { create } for pid=26082 comm="syz.1.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5128.153885][ T30] audit: type=1400 audit(5127.710:3730): avc: denied { setopt } for pid=26082 comm="syz.1.7506" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5128.580082][ T30] audit: type=1400 audit(5128.130:3731): avc: denied { create } for pid=26082 comm="syz.1.7506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5128.907381][T26084] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7506'. [ 5129.194128][T26084] syz_tun (unregistering): left allmulticast mode [ 5129.753753][ T30] audit: type=1400 audit(5129.310:3732): avc: denied { setopt } for pid=26082 comm="syz.1.7506" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5132.663437][ T30] audit: type=1400 audit(5132.220:3733): avc: denied { search } for pid=26085 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5132.688259][ T30] audit: type=1400 audit(5132.240:3734): avc: denied { search } for pid=26085 comm="rm" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5132.689153][ T30] audit: type=1400 audit(5132.240:3735): avc: denied { search } for pid=26085 comm="rm" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5133.448478][ T30] audit: type=1400 audit(5132.990:3736): avc: denied { search } for pid=26051 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5137.595668][ T30] audit: type=1400 audit(5137.120:3737): avc: denied { create } for pid=26092 comm="syz.1.7509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5137.626479][ T30] audit: type=1400 audit(5137.180:3738): avc: denied { create } for pid=26092 comm="syz.1.7509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5137.676508][ T30] audit: type=1400 audit(5137.230:3739): avc: denied { write } for pid=26092 comm="syz.1.7509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5137.785284][ T30] audit: type=1400 audit(5137.330:3740): avc: denied { read } for pid=26092 comm="syz.1.7509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5137.963885][ T30] audit: type=1400 audit(5137.520:3741): avc: denied { read } for pid=26092 comm="syz.1.7509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5138.176294][ T30] audit: type=1400 audit(5137.710:3742): avc: denied { write } for pid=26092 comm="syz.1.7509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5141.776008][ T30] audit: type=1400 audit(5141.330:3743): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5141.833782][ T30] audit: type=1400 audit(5141.390:3744): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5141.857773][ T30] audit: type=1400 audit(5141.420:3745): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5142.874393][ T30] audit: type=1400 audit(5142.430:3746): avc: denied { read } for pid=26096 comm="syz.0.7512" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 5142.963223][ T30] audit: type=1400 audit(5142.520:3747): avc: denied { read open } for pid=26096 comm="syz.0.7512" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 5143.041802][ T30] audit: type=1400 audit(5142.600:3748): avc: denied { ioctl } for pid=26096 comm="syz.0.7512" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 5147.113023][ T30] audit: type=1400 audit(5146.670:3749): avc: denied { prog_load } for pid=26105 comm="syz.1.7515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5147.150886][ T30] audit: type=1400 audit(5146.710:3750): avc: denied { bpf } for pid=26105 comm="syz.1.7515" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5147.386694][ T30] audit: type=1400 audit(5146.930:3751): avc: denied { prog_load } for pid=26105 comm="syz.1.7515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5147.438970][ T30] audit: type=1400 audit(5146.990:3752): avc: denied { bpf } for pid=26105 comm="syz.1.7515" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5147.516776][ T30] audit: type=1400 audit(5147.070:3753): avc: denied { create } for pid=26105 comm="syz.1.7515" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5147.561282][ T30] audit: type=1400 audit(5147.120:3754): avc: denied { create } for pid=26105 comm="syz.1.7515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5147.609178][ T30] audit: type=1400 audit(5147.170:3755): avc: denied { write } for pid=26105 comm="syz.1.7515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5148.281755][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 5148.282570][ T30] audit: type=1400 audit(5147.840:3760): avc: denied { ioctl } for pid=26105 comm="syz.1.7515" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=83173 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5148.334422][ T30] audit: type=1400 audit(5147.890:3761): avc: denied { ioctl } for pid=26105 comm="syz.1.7515" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=83173 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5148.406940][ T30] audit: type=1400 audit(5147.930:3762): avc: denied { prog_load } for pid=26105 comm="syz.1.7515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5148.407986][ T30] audit: type=1400 audit(5147.950:3763): avc: denied { bpf } for pid=26105 comm="syz.1.7515" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5148.431295][ T30] audit: type=1400 audit(5147.970:3764): avc: denied { perfmon } for pid=26105 comm="syz.1.7515" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5150.179942][ T30] audit: type=1400 audit(5149.740:3765): avc: denied { prog_load } for pid=26107 comm="syz.1.7516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5150.267272][ T30] audit: type=1400 audit(5149.820:3766): avc: denied { bpf } for pid=26107 comm="syz.1.7516" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5150.333007][ T30] audit: type=1400 audit(5149.890:3767): avc: denied { perfmon } for pid=26107 comm="syz.1.7516" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5150.395648][ T30] audit: type=1400 audit(5149.950:3768): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5150.435736][ T30] audit: type=1400 audit(5149.990:3769): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5156.183958][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 5156.188326][ T30] audit: type=1400 audit(5154.710:3779): avc: denied { mounton } for pid=26107 comm="syz.1.7516" path="/295" dev="tmpfs" ino=1510 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5156.195619][ T30] audit: type=1400 audit(5154.920:3780): avc: denied { mount } for pid=26107 comm="syz.1.7516" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 5156.257839][ T30] audit: type=1400 audit(5155.080:3781): avc: denied { prog_load } for pid=26107 comm="syz.1.7516" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5156.280155][ T30] audit: type=1400 audit(5155.250:3782): avc: denied { bpf } for pid=26107 comm="syz.1.7516" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5156.302326][ T30] audit: type=1400 audit(5155.410:3783): avc: denied { perfmon } for pid=26107 comm="syz.1.7516" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5156.319274][ T30] audit: type=1400 audit(5155.500:3784): avc: denied { perfmon } for pid=26107 comm="syz.1.7516" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5156.487012][ T30] audit: type=1400 audit(5155.590:3785): avc: denied { perfmon } for pid=26107 comm="syz.1.7516" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5156.640911][ T30] audit: type=1400 audit(5155.690:3786): avc: denied { bpf } for pid=26107 comm="syz.1.7516" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5158.187576][ T30] audit: type=1400 audit(5157.730:3787): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5158.350511][ T30] audit: type=1400 audit(5157.910:3788): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5162.449187][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 5162.457985][ T30] audit: type=1400 audit(5162.010:3793): avc: denied { create } for pid=26118 comm="syz.0.7524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5162.524291][ T30] audit: type=1400 audit(5162.080:3794): avc: denied { write } for pid=26118 comm="syz.0.7524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5162.611606][ T30] audit: type=1400 audit(5162.170:3795): avc: denied { nlmsg_write } for pid=26118 comm="syz.0.7524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5163.155816][ T30] audit: type=1400 audit(5162.710:3796): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5163.232340][ T30] audit: type=1400 audit(5162.790:3797): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5163.355732][ T30] audit: type=1400 audit(5162.900:3798): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5164.131338][ T30] audit: type=1400 audit(5163.690:3799): avc: denied { prog_load } for pid=26122 comm="syz.0.7521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5164.172072][ T30] audit: type=1400 audit(5163.730:3800): avc: denied { mounton } for pid=26123 comm="syz.1.7522" path="/297/file0" dev="tmpfs" ino=1525 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5164.194530][ T30] audit: type=1400 audit(5163.750:3801): avc: denied { bpf } for pid=26122 comm="syz.0.7521" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5164.237409][ T30] audit: type=1400 audit(5163.790:3802): avc: denied { prog_load } for pid=26122 comm="syz.0.7521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5167.560714][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 5167.562954][ T30] audit: type=1400 audit(5167.120:3818): avc: denied { ioctl } for pid=26122 comm="syz.0.7521" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=82189 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5167.827796][ T30] audit: type=1400 audit(5167.390:3819): avc: denied { ioctl } for pid=26122 comm="syz.0.7521" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=82189 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5168.015424][ T30] audit: type=1400 audit(5167.570:3820): avc: denied { prog_load } for pid=26122 comm="syz.0.7521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5168.145809][ T30] audit: type=1400 audit(5167.690:3821): avc: denied { bpf } for pid=26122 comm="syz.0.7521" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5168.382810][ T30] audit: type=1400 audit(5167.920:3822): avc: denied { perfmon } for pid=26122 comm="syz.0.7521" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5170.203066][ T30] audit: type=1400 audit(5169.760:3823): avc: denied { allowed } for pid=26131 comm="syz.1.7525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5170.340570][ T30] audit: type=1400 audit(5169.900:3824): avc: denied { create } for pid=26131 comm="syz.1.7525" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5170.368242][ T30] audit: type=1400 audit(5169.930:3825): avc: denied { map } for pid=26131 comm="syz.1.7525" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5170.399453][ T30] audit: type=1400 audit(5169.950:3826): avc: denied { read write } for pid=26131 comm="syz.1.7525" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5170.428536][ T30] audit: type=1400 audit(5169.980:3827): avc: denied { map } for pid=26131 comm="syz.1.7525" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5172.590333][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 5172.613385][ T30] audit: type=1400 audit(5172.150:3836): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5172.776762][ T30] audit: type=1400 audit(5172.330:3837): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5172.913114][ T30] audit: type=1400 audit(5172.470:3838): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5174.537753][ T30] audit: type=1400 audit(5174.090:3839): avc: denied { read write } for pid=26137 comm="syz.0.7528" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 5174.573433][ T30] audit: type=1400 audit(5174.130:3840): avc: denied { read write open } for pid=26137 comm="syz.0.7528" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 5174.669751][ T30] audit: type=1400 audit(5174.220:3841): avc: denied { mounton } for pid=26137 comm="syz.0.7528" path="/20/file0" dev="tmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5175.658988][ T30] audit: type=1400 audit(5174.950:3842): avc: denied { prog_load } for pid=26134 comm="syz.1.7527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5175.950436][ T30] audit: type=1400 audit(5174.970:3843): avc: denied { bpf } for pid=26134 comm="syz.1.7527" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5176.141679][ T30] audit: type=1400 audit(5174.990:3844): avc: denied { perfmon } for pid=26134 comm="syz.1.7527" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5176.695992][ T30] audit: type=1400 audit(5176.250:3845): avc: denied { mount } for pid=26137 comm="syz.0.7528" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5179.227146][ T30] audit: type=1400 audit(5178.780:3846): avc: denied { unmount } for pid=25772 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5180.465856][ T30] audit: type=1400 audit(5180.020:3847): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5180.502925][ T30] audit: type=1400 audit(5180.060:3848): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5180.646750][ T30] audit: type=1400 audit(5180.190:3849): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5182.616378][ T30] audit: type=1400 audit(5181.600:3850): avc: denied { execmem } for pid=26144 comm="syz.0.7529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5184.818488][ T30] audit: type=1400 audit(5184.380:3851): avc: denied { create } for pid=26146 comm="syz.1.7530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5184.951289][ T30] audit: type=1400 audit(5184.510:3852): avc: denied { write } for pid=26146 comm="syz.1.7530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5184.982982][ T30] audit: type=1400 audit(5184.540:3853): avc: denied { module_request } for pid=26146 comm="syz.1.7530" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5186.044489][ T30] audit: type=1400 audit(5185.600:3854): avc: denied { prog_load } for pid=26144 comm="syz.0.7529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5186.083493][ T30] audit: type=1400 audit(5185.640:3855): avc: denied { bpf } for pid=26144 comm="syz.0.7529" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5187.059184][ T30] audit: type=1400 audit(5185.900:3856): avc: denied { map_create } for pid=26144 comm="syz.0.7529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5187.063218][ T30] audit: type=1400 audit(5186.480:3857): avc: denied { write } for pid=26144 comm="syz.0.7529" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 5187.268035][ T30] audit: type=1400 audit(5186.610:3858): avc: denied { write open } for pid=26144 comm="syz.0.7529" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 5192.836527][ T30] audit: type=1400 audit(5192.390:3859): avc: denied { prog_load } for pid=26153 comm="syz.1.7531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5192.986528][ T30] audit: type=1400 audit(5192.540:3860): avc: denied { bpf } for pid=26153 comm="syz.1.7531" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5193.117463][ T30] audit: type=1400 audit(5192.660:3861): avc: denied { prog_load } for pid=26153 comm="syz.1.7531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5193.207584][ T30] audit: type=1400 audit(5192.770:3862): avc: denied { bpf } for pid=26153 comm="syz.1.7531" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5193.313154][ T30] audit: type=1400 audit(5192.870:3863): avc: denied { create } for pid=26153 comm="syz.1.7531" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5193.526419][ T30] audit: type=1400 audit(5193.080:3864): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5193.616408][ T30] audit: type=1400 audit(5193.160:3865): avc: denied { create } for pid=26153 comm="syz.1.7531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5193.730664][ T30] audit: type=1400 audit(5193.290:3866): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5193.900889][ T30] audit: type=1400 audit(5193.460:3867): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5193.997088][ T30] audit: type=1400 audit(5193.510:3868): avc: denied { write } for pid=26153 comm="syz.1.7531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5199.251298][ T30] kauditd_printk_skb: 18 callbacks suppressed [ 5199.251834][ T30] audit: type=1400 audit(5198.710:3887): avc: denied { sys_module } for pid=26158 comm="syz.1.7533" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5199.252143][ T30] audit: type=1400 audit(5198.800:3888): avc: denied { sys_module } for pid=26158 comm="syz.1.7533" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5199.488448][ T30] audit: type=1400 audit(5198.980:3889): avc: denied { module_request } for pid=26158 comm="syz.1.7533" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5199.536249][ T30] audit: type=1400 audit(5199.090:3890): avc: denied { module_request } for pid=26158 comm="syz.1.7533" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5201.338485][ T30] audit: type=1400 audit(5200.580:3891): avc: denied { create } for pid=26160 comm="syz.0.7534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5201.338975][ T30] audit: type=1400 audit(5200.770:3892): avc: denied { ioctl } for pid=26160 comm="syz.0.7534" path="socket:[83254]" dev="sockfs" ino=83254 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5203.756176][ T30] audit: type=1400 audit(5202.690:3893): avc: denied { write } for pid=26160 comm="syz.0.7534" name="mcfilter" dev="proc" ino=4026532672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 5203.757041][ T30] audit: type=1400 audit(5202.930:3894): avc: denied { write } for pid=26160 comm="syz.0.7534" path="/proc/79/net/mcfilter" dev="proc" ino=4026532672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 5205.646859][T26169] macvtap1: entered allmulticast mode [ 5205.647653][T26169] veth0_macvtap: entered allmulticast mode [ 5211.465940][ T30] audit: type=1400 audit(5211.010:3895): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5211.576043][ T30] audit: type=1400 audit(5211.130:3896): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5211.716794][ T30] audit: type=1400 audit(5211.250:3897): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5212.618873][ T30] audit: type=1400 audit(5212.180:3898): avc: denied { create } for pid=26174 comm="syz.1.7535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5212.795433][ T30] audit: type=1400 audit(5212.350:3899): avc: denied { write } for pid=26174 comm="syz.1.7535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5212.864179][T26175] netlink: 48 bytes leftover after parsing attributes in process `syz.1.7535'. [ 5214.346303][ T30] audit: type=1400 audit(5213.900:3900): avc: denied { prog_load } for pid=26176 comm="syz.0.7536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5214.533292][ T30] audit: type=1400 audit(5214.070:3901): avc: denied { bpf } for pid=26176 comm="syz.0.7536" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5215.121666][ T30] audit: type=1400 audit(5214.680:3902): avc: denied { prog_load } for pid=26176 comm="syz.0.7536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5215.343895][ T30] audit: type=1400 audit(5214.900:3903): avc: denied { bpf } for pid=26176 comm="syz.0.7536" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5215.806939][ T30] audit: type=1400 audit(5215.320:3904): avc: denied { execmem } for pid=26176 comm="syz.0.7536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5217.830490][ T30] audit: type=1400 audit(5217.390:3905): avc: denied { prog_load } for pid=26178 comm="syz.1.7537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5217.950829][ T30] audit: type=1400 audit(5217.500:3906): avc: denied { bpf } for pid=26178 comm="syz.1.7537" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5218.123038][ T30] audit: type=1400 audit(5217.680:3907): avc: denied { checkpoint_restore } for pid=26178 comm="syz.1.7537" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5219.520382][ T30] audit: type=1400 audit(5219.080:3908): avc: denied { bpf } for pid=26176 comm="syz.0.7536" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5222.144478][ T30] audit: type=1400 audit(5221.700:3909): avc: denied { prog_load } for pid=26182 comm="syz.1.7538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5222.306427][ T30] audit: type=1400 audit(5221.840:3910): avc: denied { bpf } for pid=26182 comm="syz.1.7538" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5222.481055][ T30] audit: type=1400 audit(5222.030:3911): avc: denied { prog_load } for pid=26182 comm="syz.1.7538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5222.582987][ T30] audit: type=1400 audit(5222.140:3912): avc: denied { bpf } for pid=26182 comm="syz.1.7538" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5222.708405][ T30] audit: type=1400 audit(5222.260:3913): avc: denied { create } for pid=26182 comm="syz.1.7538" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5222.813714][ T30] audit: type=1400 audit(5222.370:3914): avc: denied { create } for pid=26182 comm="syz.1.7538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5222.926717][ T30] audit: type=1400 audit(5222.470:3915): avc: denied { write } for pid=26182 comm="syz.1.7538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5223.088504][ T30] audit: type=1400 audit(5222.610:3916): avc: denied { read } for pid=26182 comm="syz.1.7538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5223.299863][ T30] audit: type=1400 audit(5222.860:3917): avc: denied { read } for pid=26182 comm="syz.1.7538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5226.428388][ T30] audit: type=1400 audit(5225.990:3918): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5226.493347][ T30] audit: type=1400 audit(5226.050:3919): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5226.606989][ T30] audit: type=1400 audit(5226.160:3920): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5227.272996][ T30] audit: type=1400 audit(5226.830:3921): avc: denied { read } for pid=26186 comm="syz.0.7540" dev="nsfs" ino=4026532606 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5227.319710][ T30] audit: type=1400 audit(5226.860:3922): avc: denied { read open } for pid=26186 comm="syz.0.7540" path="net:[4026532606]" dev="nsfs" ino=4026532606 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5227.398454][ T30] audit: type=1400 audit(5226.960:3923): avc: denied { create } for pid=26186 comm="syz.0.7540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5227.554189][ T30] audit: type=1400 audit(5227.110:3924): avc: denied { prog_load } for pid=26187 comm="syz.1.7541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5228.298786][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 5228.299674][ T30] audit: type=1400 audit(5227.860:3930): avc: denied { create } for pid=26186 comm="syz.0.7540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5228.809492][ T30] audit: type=1400 audit(5228.370:3931): avc: denied { create } for pid=26186 comm="syz.0.7540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5229.107267][ T30] audit: type=1400 audit(5228.660:3932): avc: denied { write } for pid=26186 comm="syz.0.7540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5229.426993][ T30] audit: type=1400 audit(5228.980:3933): avc: denied { write } for pid=26186 comm="syz.0.7540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5229.539877][ T30] audit: type=1400 audit(5229.090:3934): avc: denied { module_request } for pid=26186 comm="syz.0.7540" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5231.695615][ T30] audit: type=1400 audit(5231.030:3935): avc: denied { create } for pid=26187 comm="syz.1.7541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 5232.319395][ T30] audit: type=1400 audit(5231.770:3936): avc: denied { allowed } for pid=26187 comm="syz.1.7541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5234.966694][ T30] audit: type=1400 audit(5234.520:3937): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5235.177313][ T30] audit: type=1400 audit(5234.710:3938): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5235.307538][ T30] audit: type=1400 audit(5234.870:3939): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5238.720292][ T30] audit: type=1400 audit(5238.280:3940): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5238.831316][ T30] audit: type=1400 audit(5238.380:3941): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5238.861788][ T30] audit: type=1400 audit(5238.420:3942): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5239.303413][ T30] audit: type=1400 audit(5238.860:3943): avc: denied { create } for pid=26197 comm="syz.1.7544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5239.392496][ T30] audit: type=1400 audit(5238.950:3944): avc: denied { create } for pid=26198 comm="syz.0.7543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5239.455898][ T30] audit: type=1400 audit(5239.010:3945): avc: denied { setopt } for pid=26197 comm="syz.1.7544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5239.526426][ T30] audit: type=1400 audit(5239.080:3946): avc: denied { write } for pid=26198 comm="syz.0.7543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5240.633424][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 5240.634603][ T30] audit: type=1400 audit(5240.190:3949): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5240.725497][ T30] audit: type=1400 audit(5240.260:3950): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5240.759424][ T30] audit: type=1400 audit(5240.320:3951): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5242.341264][ T30] audit: type=1400 audit(5241.900:3952): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5242.458984][ T30] audit: type=1400 audit(5242.020:3953): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5242.573251][ T30] audit: type=1400 audit(5242.130:3954): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5242.807144][ T30] audit: type=1400 audit(5242.370:3955): avc: denied { mounton } for pid=26205 comm="syz.1.7547" path="/311/file0" dev="tmpfs" ino=1597 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5243.582820][ T30] audit: type=1400 audit(5243.140:3956): avc: denied { create } for pid=26207 comm="syz.0.7548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5243.671239][ T30] audit: type=1400 audit(5243.230:3957): avc: denied { write } for pid=26207 comm="syz.0.7548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5243.771384][ T30] audit: type=1400 audit(5243.330:3958): avc: denied { write } for pid=26207 comm="syz.0.7548" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5245.960794][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 5245.961311][ T30] audit: type=1400 audit(5245.520:3966): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5246.035796][ T30] audit: type=1400 audit(5245.590:3967): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5246.063517][ T30] audit: type=1400 audit(5245.620:3968): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5246.352168][ T30] audit: type=1400 audit(5245.910:3969): avc: denied { create } for pid=26215 comm="syz.1.7552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5246.473490][ T30] audit: type=1400 audit(5246.030:3970): avc: denied { bind } for pid=26215 comm="syz.1.7552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5247.122117][ T30] audit: type=1400 audit(5246.680:3971): avc: denied { read write } for pid=26217 comm="syz.0.7553" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 5247.157586][ T30] audit: type=1400 audit(5246.710:3972): avc: denied { read write open } for pid=26217 comm="syz.0.7553" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 5247.261248][ T30] audit: type=1400 audit(5246.820:3973): avc: denied { mounton } for pid=26217 comm="syz.0.7553" path="/31/file0" dev="tmpfs" ino=174 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5247.485306][ T30] audit: type=1400 audit(5247.040:3974): avc: denied { mount } for pid=26217 comm="syz.0.7553" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5248.109392][ T30] audit: type=1400 audit(5247.670:3975): avc: denied { create } for pid=26219 comm="syz.1.7554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5251.120910][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 5251.123024][ T30] audit: type=1400 audit(5250.660:3987): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5251.206095][ T30] audit: type=1400 audit(5250.760:3988): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5251.288612][ T30] audit: type=1400 audit(5250.850:3989): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5251.381525][ T30] audit: type=1400 audit(5250.940:3990): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5251.456964][ T30] audit: type=1400 audit(5251.010:3991): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5251.511191][ T30] audit: type=1400 audit(5251.070:3992): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5251.571812][ T30] audit: type=1400 audit(5251.130:3993): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5251.618362][ T30] audit: type=1400 audit(5251.180:3994): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5251.653301][ T30] audit: type=1400 audit(5251.210:3995): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5251.680295][ T30] audit: type=1400 audit(5251.240:3996): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5256.161229][ T30] kauditd_printk_skb: 80 callbacks suppressed [ 5256.187987][ T30] audit: type=1400 audit(5255.720:4077): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5256.313017][ T30] audit: type=1400 audit(5255.870:4078): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5256.392332][ T30] audit: type=1400 audit(5255.950:4079): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5256.416095][ T30] audit: type=1400 audit(5255.970:4080): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5256.450770][ T30] audit: type=1400 audit(5256.010:4081): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5256.662923][ T30] audit: type=1400 audit(5256.220:4082): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5256.829242][ T30] audit: type=1400 audit(5256.360:4083): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5256.937712][ T30] audit: type=1400 audit(5256.490:4084): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5257.120201][ T30] audit: type=1400 audit(5256.680:4085): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5257.278128][ T30] audit: type=1400 audit(5256.830:4086): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5261.180049][ T30] kauditd_printk_skb: 75 callbacks suppressed [ 5261.198876][ T30] audit: type=1400 audit(5260.740:4162): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5261.231093][ T30] audit: type=1400 audit(5260.790:4163): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5261.269022][ T30] audit: type=1400 audit(5260.830:4164): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5261.307666][ T30] audit: type=1400 audit(5260.870:4165): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5261.362648][ T30] audit: type=1400 audit(5260.920:4166): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5261.430349][ T30] audit: type=1400 audit(5260.990:4167): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5261.547980][ T30] audit: type=1400 audit(5261.110:4168): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5261.586125][ T30] audit: type=1400 audit(5261.140:4169): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5261.613615][ T30] audit: type=1400 audit(5261.170:4170): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5261.641435][ T30] audit: type=1400 audit(5261.200:4171): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5266.230606][ T30] kauditd_printk_skb: 72 callbacks suppressed [ 5266.231581][ T30] audit: type=1400 audit(5265.790:4244): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5266.306504][ T30] audit: type=1400 audit(5265.860:4245): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5266.489196][ T30] audit: type=1400 audit(5266.020:4246): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5266.596016][ T30] audit: type=1400 audit(5266.150:4247): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5266.642606][ T30] audit: type=1400 audit(5266.200:4248): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5266.756256][ T30] audit: type=1400 audit(5266.310:4249): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5266.810030][ T30] audit: type=1400 audit(5266.360:4250): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5266.912004][ T30] audit: type=1400 audit(5266.470:4251): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5267.000050][ T30] audit: type=1400 audit(5266.560:4252): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5267.065900][ T30] audit: type=1400 audit(5266.620:4253): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5271.251209][ T30] kauditd_printk_skb: 110 callbacks suppressed [ 5271.255458][ T30] audit: type=1400 audit(5270.810:4364): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5271.332712][ T30] audit: type=1400 audit(5270.890:4365): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5271.370916][ T30] audit: type=1400 audit(5270.930:4366): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5271.409464][ T30] audit: type=1400 audit(5270.970:4367): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5271.444387][ T30] audit: type=1400 audit(5271.000:4368): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5271.475682][ T30] audit: type=1400 audit(5271.030:4369): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5271.500793][ T30] audit: type=1400 audit(5271.060:4370): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5271.528704][ T30] audit: type=1400 audit(5271.090:4371): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5271.565596][ T30] audit: type=1400 audit(5271.120:4372): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5271.608102][ T30] audit: type=1400 audit(5271.150:4373): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5276.277963][ T30] kauditd_printk_skb: 163 callbacks suppressed [ 5276.280383][ T30] audit: type=1400 audit(5275.830:4537): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5276.345874][ T30] audit: type=1400 audit(5275.900:4538): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5276.459939][ T30] audit: type=1400 audit(5276.000:4539): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5276.531604][ T30] audit: type=1400 audit(5276.090:4540): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5276.595983][ T30] audit: type=1400 audit(5276.150:4541): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5276.654536][ T30] audit: type=1400 audit(5276.210:4542): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5276.718921][ T30] audit: type=1400 audit(5276.280:4543): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5276.781409][ T30] audit: type=1400 audit(5276.340:4544): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5276.846243][ T30] audit: type=1400 audit(5276.400:4545): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5276.898391][ T30] audit: type=1400 audit(5276.450:4546): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5281.298278][ T30] kauditd_printk_skb: 181 callbacks suppressed [ 5281.299189][ T30] audit: type=1400 audit(5280.860:4728): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5281.346802][ T30] audit: type=1400 audit(5280.900:4729): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5281.398880][ T30] audit: type=1400 audit(5280.960:4730): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5281.451576][ T30] audit: type=1400 audit(5281.010:4731): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5281.483110][ T30] audit: type=1400 audit(5281.040:4732): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5281.507232][ T30] audit: type=1400 audit(5281.070:4733): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5281.530366][ T30] audit: type=1400 audit(5281.090:4734): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5281.553134][ T30] audit: type=1400 audit(5281.110:4735): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5281.579524][ T30] audit: type=1400 audit(5281.140:4736): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5281.605266][ T30] audit: type=1400 audit(5281.160:4737): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5286.317108][ T30] kauditd_printk_skb: 237 callbacks suppressed [ 5286.326161][ T30] audit: type=1400 audit(5285.860:4975): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5286.327231][ T30] audit: type=1400 audit(5285.880:4976): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5286.336209][ T30] audit: type=1400 audit(5285.890:4977): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5286.360938][ T30] audit: type=1400 audit(5285.920:4978): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5286.396706][ T30] audit: type=1400 audit(5285.940:4979): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5286.410149][ T30] audit: type=1400 audit(5285.970:4980): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5286.450946][ T30] audit: type=1400 audit(5285.990:4981): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5286.451855][ T30] audit: type=1400 audit(5286.000:4982): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5286.476548][ T30] audit: type=1400 audit(5286.020:4983): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5286.485972][ T30] audit: type=1400 audit(5286.040:4984): avc: denied { read } for pid=26223 comm="syz.1.7555" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=83320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5292.347736][ T30] kauditd_printk_skb: 110 callbacks suppressed [ 5292.359229][ T30] audit: type=1400 audit(5291.890:5095): avc: denied { execmem } for pid=26243 comm="syz.1.7563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5293.301257][ T30] audit: type=1400 audit(5292.860:5096): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5293.352482][ T30] audit: type=1400 audit(5292.910:5097): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5293.412438][ T30] audit: type=1400 audit(5292.970:5098): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5295.210435][ T30] audit: type=1400 audit(5294.770:5099): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5295.243384][ T30] audit: type=1400 audit(5294.800:5100): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5295.320768][ T30] audit: type=1400 audit(5294.880:5101): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5296.527068][ T30] audit: type=1400 audit(5296.060:5102): avc: denied { prog_load } for pid=26243 comm="syz.1.7563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5296.541638][ T30] audit: type=1400 audit(5296.100:5103): avc: denied { bpf } for pid=26243 comm="syz.1.7563" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5296.895488][ T30] audit: type=1400 audit(5296.330:5104): avc: denied { map_create } for pid=26243 comm="syz.1.7563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5299.033184][ T30] audit: type=1400 audit(5298.590:5105): avc: denied { read } for pid=26250 comm="syz.0.7565" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 5299.133435][ T30] audit: type=1400 audit(5298.690:5106): avc: denied { read open } for pid=26250 comm="syz.0.7565" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 5299.295762][ T30] audit: type=1400 audit(5298.850:5107): avc: denied { ioctl } for pid=26250 comm="syz.0.7565" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 5303.140467][ T30] audit: type=1400 audit(5302.690:5108): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5303.466219][ T30] audit: type=1400 audit(5303.000:5109): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5303.666539][ T30] audit: type=1400 audit(5303.210:5110): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5305.071663][ T30] audit: type=1400 audit(5304.630:5111): avc: denied { prog_load } for pid=26253 comm="syz.0.7566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5305.155470][ T30] audit: type=1400 audit(5304.710:5112): avc: denied { bpf } for pid=26253 comm="syz.0.7566" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5305.172452][ T30] audit: type=1400 audit(5304.730:5113): avc: denied { perfmon } for pid=26253 comm="syz.0.7566" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5305.215474][ T30] audit: type=1400 audit(5304.770:5114): avc: denied { create } for pid=26253 comm="syz.0.7566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5305.249266][ T30] audit: type=1400 audit(5304.810:5115): avc: denied { write } for pid=26253 comm="syz.0.7566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5305.278476][ T30] audit: type=1400 audit(5304.840:5116): avc: denied { nlmsg_write } for pid=26253 comm="syz.0.7566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5305.334289][ T30] audit: type=1400 audit(5304.890:5117): avc: denied { module_request } for pid=26253 comm="syz.0.7566" kmod="crypto-seqiv(rfc4106(gcm(aes)))" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5306.138300][ T30] audit: type=1400 audit(5305.690:5118): avc: denied { allowed } for pid=26255 comm="syz.1.7568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5306.442579][ T30] audit: type=1400 audit(5306.000:5119): avc: denied { create } for pid=26255 comm="syz.1.7568" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5306.479376][ T30] audit: type=1400 audit(5306.040:5120): avc: denied { map } for pid=26255 comm="syz.1.7568" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=82368 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5310.720613][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 5310.723233][ T30] audit: type=1400 audit(5310.280:5128): avc: denied { create } for pid=26261 comm="syz.1.7569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5310.943296][ T30] audit: type=1400 audit(5310.500:5129): avc: denied { create } for pid=26261 comm="syz.1.7569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5311.161171][ T30] audit: type=1400 audit(5310.720:5130): avc: denied { setopt } for pid=26261 comm="syz.1.7569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5311.465613][ T30] audit: type=1400 audit(5311.010:5131): avc: denied { module_request } for pid=26261 comm="syz.1.7569" kmod="tcp_." scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5311.816276][ T30] audit: type=1400 audit(5311.350:5132): avc: denied { listen } for pid=26261 comm="syz.1.7569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5312.112903][ T30] audit: type=1400 audit(5311.670:5133): avc: denied { create } for pid=26262 comm="syz.0.7570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5312.422170][ T30] audit: type=1400 audit(5311.980:5134): avc: denied { ioctl } for pid=26262 comm="syz.0.7570" path="socket:[83412]" dev="sockfs" ino=83412 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5312.784213][ T30] audit: type=1400 audit(5312.340:5135): avc: denied { execmem } for pid=26262 comm="syz.0.7570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5313.003699][ T30] audit: type=1400 audit(5312.550:5136): avc: denied { write } for pid=26261 comm="syz.1.7569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5317.049019][ T30] audit: type=1400 audit(5316.580:5137): avc: denied { create } for pid=26262 comm="syz.0.7570" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5323.132835][ T30] audit: type=1400 audit(5322.680:5138): avc: denied { create } for pid=26272 comm="syz.1.7572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5323.310671][ T30] audit: type=1400 audit(5322.870:5139): avc: denied { ioctl } for pid=26272 comm="syz.1.7572" path="socket:[83420]" dev="sockfs" ino=83420 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5324.929208][ T30] audit: type=1400 audit(5324.490:5140): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5324.998491][ T30] audit: type=1400 audit(5324.550:5141): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5325.138701][ T30] audit: type=1400 audit(5324.700:5142): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5325.808183][ T30] audit: type=1400 audit(5325.370:5143): avc: denied { prog_load } for pid=26274 comm="syz.1.7573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5325.891234][ T30] audit: type=1400 audit(5325.450:5144): avc: denied { bpf } for pid=26274 comm="syz.1.7573" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5325.968172][ T30] audit: type=1326 audit(5325.520:5145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26274 comm="syz.1.7573" exe="/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffffb0d5c0a8 code=0x0 [ 5327.261782][ T30] audit: type=1400 audit(5326.820:5146): avc: denied { prog_load } for pid=26275 comm="syz.0.7574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5327.310322][ T30] audit: type=1400 audit(5326.870:5147): avc: denied { bpf } for pid=26275 comm="syz.0.7574" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5329.945809][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 5329.946647][ T30] audit: type=1400 audit(5329.500:5150): avc: denied { create } for pid=26280 comm="syz.1.7575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5330.049239][ T30] audit: type=1400 audit(5329.610:5151): avc: denied { setopt } for pid=26280 comm="syz.1.7575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5330.227018][ T30] audit: type=1400 audit(5329.780:5152): avc: denied { module_request } for pid=26280 comm="syz.1.7575" kmod="tcp_." scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5332.288485][ T30] audit: type=1400 audit(5331.810:5153): avc: denied { listen } for pid=26280 comm="syz.1.7575" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5338.261933][ T30] audit: type=1400 audit(5337.820:5154): avc: denied { execmem } for pid=26286 comm="syz.1.7576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5338.523308][ T30] audit: type=1400 audit(5338.080:5155): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5338.547418][ T30] audit: type=1400 audit(5338.110:5156): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5338.635575][ T30] audit: type=1400 audit(5338.190:5157): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5339.864378][ T30] audit: type=1400 audit(5339.420:5158): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5339.931255][ T30] audit: type=1400 audit(5339.480:5159): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5340.149208][ T30] audit: type=1400 audit(5339.660:5160): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5341.932035][ T30] audit: type=1400 audit(5341.390:5161): avc: denied { map_create } for pid=26286 comm="syz.1.7576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5342.952997][T26292] geneve2: entered promiscuous mode [ 5344.099024][ T30] audit: type=1400 audit(5343.660:5162): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5344.138926][ T30] audit: type=1400 audit(5343.680:5163): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5344.231358][ T30] audit: type=1400 audit(5343.790:5164): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5345.227737][ T30] audit: type=1400 audit(5344.790:5165): avc: denied { prog_load } for pid=26294 comm="syz.0.7579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5345.263683][ T30] audit: type=1400 audit(5344.820:5166): avc: denied { bpf } for pid=26294 comm="syz.0.7579" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5345.392250][ T30] audit: type=1400 audit(5344.950:5167): avc: denied { prog_load } for pid=26294 comm="syz.0.7579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5345.563481][ T30] audit: type=1400 audit(5345.110:5168): avc: denied { bpf } for pid=26294 comm="syz.0.7579" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5345.745796][ T30] audit: type=1400 audit(5345.270:5169): avc: denied { create } for pid=26294 comm="syz.0.7579" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5345.873492][ T30] audit: type=1400 audit(5345.430:5170): avc: denied { create } for pid=26294 comm="syz.0.7579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5346.031752][ T30] audit: type=1400 audit(5345.580:5171): avc: denied { write } for pid=26294 comm="syz.0.7579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5349.632647][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 5349.666266][ T30] audit: type=1400 audit(5349.190:5184): avc: denied { create } for pid=26299 comm="syz.0.7582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5349.858087][ T30] audit: type=1400 audit(5349.360:5185): avc: denied { write } for pid=26299 comm="syz.0.7582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5350.034300][ T30] audit: type=1400 audit(5349.590:5186): avc: denied { module_request } for pid=26299 comm="syz.0.7582" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5350.272726][ T30] audit: type=1400 audit(5349.830:5187): avc: denied { create } for pid=26299 comm="syz.0.7582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5350.371323][ T30] audit: type=1400 audit(5349.930:5188): avc: denied { write } for pid=26299 comm="syz.0.7582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5351.479577][ T30] audit: type=1400 audit(5350.850:5189): avc: denied { prog_load } for pid=26298 comm="syz.1.7581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5351.480580][ T30] audit: type=1400 audit(5351.040:5190): avc: denied { bpf } for pid=26298 comm="syz.1.7581" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5351.535970][ T30] audit: type=1400 audit(5351.080:5191): avc: denied { perfmon } for pid=26298 comm="syz.1.7581" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5352.987124][ T30] audit: type=1400 audit(5352.470:5192): avc: denied { module_request } for pid=26299 comm="syz.0.7582" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5353.276411][ T30] audit: type=1400 audit(5352.830:5193): avc: denied { create } for pid=26299 comm="syz.0.7582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5358.967138][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 5358.967997][ T30] audit: type=1400 audit(5358.510:5196): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5359.057937][ T30] audit: type=1400 audit(5358.600:5197): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5359.106150][ T30] audit: type=1400 audit(5358.660:5198): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5362.055427][ T30] audit: type=1400 audit(5361.600:5199): avc: denied { prog_load } for pid=26310 comm="syz.1.7584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5362.274616][ T30] audit: type=1400 audit(5361.830:5200): avc: denied { bpf } for pid=26310 comm="syz.1.7584" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5362.540670][ T30] audit: type=1400 audit(5362.100:5201): avc: denied { prog_load } for pid=26310 comm="syz.1.7584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5362.742695][ T30] audit: type=1400 audit(5362.300:5202): avc: denied { bpf } for pid=26310 comm="syz.1.7584" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5362.990892][ T30] audit: type=1400 audit(5362.550:5203): avc: denied { create } for pid=26310 comm="syz.1.7584" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5363.098741][ T30] audit: type=1400 audit(5362.650:5204): avc: denied { create } for pid=26310 comm="syz.1.7584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5363.181797][ T30] audit: type=1400 audit(5362.730:5205): avc: denied { write } for pid=26310 comm="syz.1.7584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5364.973644][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 5364.985749][ T30] audit: type=1400 audit(5364.530:5211): avc: denied { create } for pid=26313 comm="syz.0.7585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5365.032869][ T30] audit: type=1400 audit(5364.590:5212): avc: denied { ioctl } for pid=26313 comm="syz.0.7585" path="socket:[83466]" dev="sockfs" ino=83466 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5365.186438][ T30] audit: type=1400 audit(5364.700:5213): avc: denied { execmem } for pid=26313 comm="syz.0.7585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5366.872986][ T30] audit: type=1400 audit(5366.420:5214): avc: denied { map_create } for pid=26314 comm="syz.1.7586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5368.540565][ T30] audit: type=1400 audit(5368.100:5215): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5368.572813][ T30] audit: type=1400 audit(5368.130:5216): avc: denied { prog_load } for pid=26317 comm="syz.1.7587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5368.608147][ T30] audit: type=1400 audit(5368.170:5217): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5368.636012][ T30] audit: type=1400 audit(5368.190:5218): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5368.700644][ T30] audit: type=1400 audit(5368.260:5219): avc: denied { bpf } for pid=26317 comm="syz.1.7587" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5369.553748][ T30] audit: type=1400 audit(5369.100:5220): avc: denied { allowed } for pid=26319 comm="syz.0.7588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5370.807276][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 5370.808189][ T30] audit: type=1400 audit(5370.360:5228): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5370.886666][ T30] audit: type=1400 audit(5370.430:5229): avc: denied { create } for pid=26321 comm="syz.1.7589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5370.955841][ T30] audit: type=1400 audit(5370.510:5230): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5370.961140][ T30] audit: type=1400 audit(5370.520:5231): avc: denied { write } for pid=26321 comm="syz.1.7589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5371.007166][ T30] audit: type=1400 audit(5370.560:5232): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5371.130510][ T30] audit: type=1400 audit(5370.690:5233): avc: denied { nlmsg_write } for pid=26321 comm="syz.1.7589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5371.310148][ T30] audit: type=1400 audit(5370.870:5234): avc: denied { create } for pid=26321 comm="syz.1.7589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5371.347531][ T30] audit: type=1400 audit(5370.900:5235): avc: denied { write } for pid=26321 comm="syz.1.7589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5371.379941][ T30] audit: type=1400 audit(5370.940:5236): avc: denied { nlmsg_write } for pid=26321 comm="syz.1.7589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5371.436059][ T30] audit: type=1400 audit(5370.990:5237): avc: denied { create } for pid=26321 comm="syz.1.7589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5377.104499][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 5377.107157][ T30] audit: type=1400 audit(5376.660:5255): avc: denied { module_request } for pid=26331 comm="syz.1.7594" kmod="net-pf-10-proto-0-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5377.403002][ T30] audit: type=1400 audit(5376.960:5256): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5377.432071][ T30] audit: type=1400 audit(5376.990:5257): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5377.461804][ T30] audit: type=1400 audit(5377.020:5258): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5379.028502][ T30] audit: type=1400 audit(5378.580:5259): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5379.074206][ T30] audit: type=1400 audit(5378.630:5260): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5379.170274][ T30] audit: type=1400 audit(5378.730:5261): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5379.611892][ T30] audit: type=1400 audit(5379.160:5262): avc: denied { module_request } for pid=26331 comm="syz.1.7594" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5380.584246][ T30] audit: type=1400 audit(5380.140:5263): avc: denied { create } for pid=26337 comm="syz.0.7596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5380.733524][ T30] audit: type=1400 audit(5380.290:5264): avc: denied { create } for pid=26337 comm="syz.0.7596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5384.176637][ T30] kauditd_printk_skb: 11 callbacks suppressed [ 5384.177601][ T30] audit: type=1400 audit(5383.730:5276): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5384.355831][ T30] audit: type=1400 audit(5383.910:5277): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5384.606373][ T30] audit: type=1400 audit(5384.150:5278): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5387.143165][ T30] audit: type=1400 audit(5386.700:5279): avc: denied { read write } for pid=26346 comm="syz.0.7599" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5387.280857][ T30] audit: type=1400 audit(5386.840:5280): avc: denied { read write open } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5387.448859][ T30] audit: type=1400 audit(5387.010:5281): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5387.622784][ T30] audit: type=1400 audit(5387.130:5282): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5387.919678][ T30] audit: type=1400 audit(5387.480:5283): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5387.952145][T25979] usb 1-1: new high-speed USB device number 27 using dummy_hcd [ 5388.362492][ T30] audit: type=1400 audit(5387.920:5284): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5388.850039][ T30] audit: type=1400 audit(5388.410:5285): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5389.217636][ T30] audit: type=1400 audit(5388.770:5286): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5389.378452][ T30] audit: type=1400 audit(5388.940:5287): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5389.495925][ T30] audit: type=1400 audit(5389.050:5288): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5389.546815][T25979] usb 1-1: Using ep0 maxpacket: 32 [ 5389.620179][ T30] audit: type=1400 audit(5389.170:5289): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5389.985803][ T30] audit: type=1400 audit(5389.510:5290): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5390.507510][ T30] audit: type=1400 audit(5390.070:5291): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5390.847221][ T30] audit: type=1400 audit(5390.390:5292): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5391.338298][ T30] audit: type=1400 audit(5390.890:5293): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5391.858581][ T30] audit: type=1400 audit(5391.390:5294): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5392.268303][ T30] audit: type=1400 audit(5391.830:5295): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5392.510477][T25979] usb 1-1: unable to get BOS descriptor or descriptor too short [ 5392.921410][T25979] usb 1-1: config 128 has an invalid interface number: 127 but max is 3 [ 5392.921928][T25979] usb 1-1: config 128 has an invalid descriptor of length 0, skipping remainder of the config [ 5392.922239][T25979] usb 1-1: config 128 has 1 interface, different from the descriptor's value: 4 [ 5392.922348][T25979] usb 1-1: config 128 has no interface number 0 [ 5392.922521][T25979] usb 1-1: config 128 interface 127 altsetting 14 endpoint 0x5 has an invalid bInterval 0, changing to 7 [ 5392.922596][T25979] usb 1-1: config 128 interface 127 altsetting 14 endpoint 0x5 has invalid wMaxPacketSize 0 [ 5392.922656][T25979] usb 1-1: config 128 interface 127 has no altsetting 0 [ 5394.403231][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 5394.403855][ T30] audit: type=1400 audit(5393.960:5306): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5394.740825][ T30] audit: type=1400 audit(5394.290:5307): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5395.160078][ T30] audit: type=1400 audit(5394.680:5308): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5395.626048][T25979] usb 1-1: New USB device found, idVendor=0582, idProduct=295c, bcdDevice=d4.55 [ 5395.626390][T25979] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 5395.626512][T25979] usb 1-1: Product: syz [ 5395.626623][T25979] usb 1-1: Manufacturer: syz [ 5395.626721][T25979] usb 1-1: SerialNumber: syz [ 5395.636093][ T30] audit: type=1400 audit(5395.180:5309): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5395.703265][ T30] audit: type=1400 audit(5395.260:5310): avc: denied { ioctl } for pid=26346 comm="syz.0.7599" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5396.146454][T25979] usb 1-1: can't set config #128, error -71 [ 5396.197430][T25979] usb 1-1: USB disconnect, device number 27 [ 5397.245812][ T30] audit: type=1400 audit(5396.800:5311): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5397.325857][ T30] audit: type=1400 audit(5396.880:5312): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5397.427818][ T30] audit: type=1400 audit(5396.940:5313): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5397.588839][ T30] audit: type=1400 audit(5397.150:5314): avc: denied { prog_load } for pid=26355 comm="syz.1.7602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5397.851331][ T30] audit: type=1400 audit(5397.410:5315): avc: denied { bpf } for pid=26355 comm="syz.1.7602" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5400.471880][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 5400.472776][ T30] audit: type=1400 audit(5400.030:5321): avc: denied { create } for pid=26357 comm="syz.0.7603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5400.647322][ T30] audit: type=1400 audit(5400.200:5322): avc: denied { ioctl } for pid=26357 comm="syz.0.7603" path="socket:[82481]" dev="sockfs" ino=82481 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5402.087971][ T30] audit: type=1400 audit(5401.650:5323): avc: denied { prog_load } for pid=26360 comm="syz.1.7604" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5402.177481][ T30] audit: type=1400 audit(5401.730:5324): avc: denied { bpf } for pid=26360 comm="syz.1.7604" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5402.355751][ T30] audit: type=1400 audit(5401.900:5325): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5402.407806][ T30] audit: type=1400 audit(5401.950:5326): avc: denied { perfmon } for pid=26360 comm="syz.1.7604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5402.452230][ T30] audit: type=1400 audit(5402.010:5327): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5402.587337][ T30] audit: type=1400 audit(5402.130:5328): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5402.679964][ T30] audit: type=1400 audit(5402.230:5329): avc: denied { perfmon } for pid=26360 comm="syz.1.7604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5402.854370][ T30] audit: type=1400 audit(5402.410:5330): avc: denied { perfmon } for pid=26360 comm="syz.1.7604" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5406.606196][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 5406.606779][ T30] audit: type=1400 audit(5406.160:5338): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5406.689181][ T30] audit: type=1400 audit(5406.250:5339): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5406.826213][ T30] audit: type=1400 audit(5406.380:5340): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5407.276298][ T30] audit: type=1400 audit(5406.830:5341): avc: denied { search } for pid=26367 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5407.297247][ T30] audit: type=1400 audit(5406.850:5342): avc: denied { search } for pid=26367 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5407.298252][ T30] audit: type=1400 audit(5406.850:5343): avc: denied { search } for pid=26367 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5407.419296][ T30] audit: type=1400 audit(5406.980:5344): avc: denied { read open } for pid=26367 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=825 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5407.563461][ T30] audit: type=1400 audit(5407.120:5345): avc: denied { getattr } for pid=26367 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=825 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5407.726475][ T30] audit: type=1400 audit(5407.280:5346): avc: denied { search } for pid=26367 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5407.776386][ T30] audit: type=1400 audit(5407.310:5347): avc: denied { search } for pid=26367 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5411.652180][ T30] kauditd_printk_skb: 92 callbacks suppressed [ 5411.666319][ T30] audit: type=1400 audit(5411.210:5440): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5411.668331][ T30] audit: type=1400 audit(5411.210:5441): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5411.676407][ T30] audit: type=1400 audit(5411.210:5442): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5411.902457][ T30] audit: type=1400 audit(5411.460:5443): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5411.907198][ T30] audit: type=1400 audit(5411.460:5444): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5411.910729][ T30] audit: type=1400 audit(5411.460:5445): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5412.095421][ T30] audit: type=1400 audit(5411.650:5446): avc: denied { getattr } for pid=26358 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=825 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5412.265758][ T30] audit: type=1400 audit(5411.810:5447): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5412.266764][ T30] audit: type=1400 audit(5411.810:5448): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5412.289444][ T30] audit: type=1400 audit(5411.850:5449): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5417.246577][ T30] kauditd_printk_skb: 38 callbacks suppressed [ 5417.255949][ T30] audit: type=1400 audit(5416.800:5488): avc: denied { read } for pid=26384 comm="syz.0.7614" dev="nsfs" ino=4026532606 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5417.478154][ T30] audit: type=1400 audit(5417.010:5489): avc: denied { read open } for pid=26384 comm="syz.0.7614" path="net:[4026532606]" dev="nsfs" ino=4026532606 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5417.692953][ T30] audit: type=1400 audit(5417.220:5490): avc: denied { create } for pid=26384 comm="syz.0.7614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5417.976776][ T30] audit: type=1400 audit(5417.530:5491): avc: denied { create } for pid=26384 comm="syz.0.7614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5418.094531][ T30] audit: type=1400 audit(5417.650:5492): avc: denied { write } for pid=26384 comm="syz.0.7614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5418.175703][ T30] audit: type=1400 audit(5417.730:5493): avc: denied { read } for pid=26384 comm="syz.0.7614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5418.300815][ T30] audit: type=1400 audit(5417.860:5494): avc: denied { write } for pid=26384 comm="syz.0.7614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5419.379972][ T30] audit: type=1400 audit(5418.940:5495): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5419.516630][ T30] audit: type=1400 audit(5419.070:5496): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5419.650701][ T30] audit: type=1400 audit(5419.210:5497): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5422.571916][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 5422.572531][ T30] audit: type=1400 audit(5422.130:5514): avc: denied { execmem } for pid=26390 comm="syz.1.7617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5423.626578][ T30] audit: type=1400 audit(5423.180:5515): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5423.818820][ T30] audit: type=1400 audit(5423.360:5516): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5424.155877][ T30] audit: type=1400 audit(5423.700:5517): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5426.382060][ T30] audit: type=1400 audit(5425.840:5518): avc: denied { ioctl } for pid=26390 comm="syz.1.7617" path="socket:[82524]" dev="sockfs" ino=82524 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5426.383989][ T30] audit: type=1400 audit(5425.890:5519): avc: denied { module_request } for pid=26390 comm="syz.1.7617" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5426.862235][ T30] audit: type=1400 audit(5426.390:5520): avc: denied { write } for pid=26390 comm="syz.1.7617" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5427.975829][ T30] audit: type=1400 audit(5427.460:5521): avc: denied { sys_module } for pid=26390 comm="syz.1.7617" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5427.976999][ T30] audit: type=1400 audit(5427.500:5522): avc: denied { module_request } for pid=26390 comm="syz.1.7617" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5435.250397][ T30] audit: type=1400 audit(5434.790:5523): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5435.401330][ T30] audit: type=1400 audit(5434.910:5524): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5435.566388][ T30] audit: type=1400 audit(5435.120:5525): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5438.156220][ T30] audit: type=1400 audit(5437.710:5526): avc: denied { search } for pid=26397 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5438.161000][ T30] audit: type=1400 audit(5437.720:5527): avc: denied { search } for pid=26397 comm="rm" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5438.166558][ T30] audit: type=1400 audit(5437.720:5528): avc: denied { search } for pid=26397 comm="rm" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5438.244367][ T30] audit: type=1400 audit(5437.800:5529): avc: denied { create } for pid=26403 comm="syz.0.7619" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5438.283305][ T30] audit: type=1400 audit(5437.840:5530): avc: denied { create } for pid=26404 comm="syz.1.7620" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5438.291321][ T30] audit: type=1400 audit(5437.840:5531): avc: denied { create } for pid=26403 comm="syz.0.7619" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5438.444221][ T30] audit: type=1400 audit(5437.970:5532): avc: denied { getattr } for pid=26397 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=8301 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5439.979251][T26405] macvtap1: entered allmulticast mode [ 5439.981690][T26405] veth0_macvtap: entered allmulticast mode [ 5440.970545][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 5440.987016][ T30] audit: type=1400 audit(5440.530:5543): avc: denied { read write } for pid=25772 comm="syz-executor" name="loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5441.142673][ T30] audit: type=1400 audit(5440.700:5544): avc: denied { read write open } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5441.346928][ T30] audit: type=1400 audit(5440.900:5545): avc: denied { ioctl } for pid=25772 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=637 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 5442.657337][ T30] audit: type=1400 audit(5442.210:5546): avc: denied { prog_load } for pid=26408 comm="syz.1.7622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5442.760353][ T30] audit: type=1400 audit(5442.320:5547): avc: denied { bpf } for pid=26408 comm="syz.1.7622" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5443.028154][ T30] audit: type=1400 audit(5442.570:5548): avc: denied { perfmon } for pid=26408 comm="syz.1.7622" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5443.273932][ T30] audit: type=1400 audit(5442.830:5549): avc: denied { perfmon } for pid=26408 comm="syz.1.7622" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5443.395968][ T30] audit: type=1400 audit(5442.940:5550): avc: denied { perfmon } for pid=26408 comm="syz.1.7622" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5443.440960][ T30] audit: type=1400 audit(5443.000:5551): avc: denied { bpf } for pid=26408 comm="syz.1.7622" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5443.493030][ T30] audit: type=1400 audit(5443.050:5552): avc: denied { bpf } for pid=26408 comm="syz.1.7622" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5444.492164][T26410] ------------[ cut here ]------------ [ 5444.492791][T26410] verifier bug: not inlined functions bpf_probe_read_user_str#114 is missing func(1) [ 5444.500391][T26410] WARNING: CPU: 0 PID: 26410 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 [ 5444.503157][T26410] Modules linked in: [ 5444.504014][T26410] CPU: 0 UID: 0 PID: 26410 Comm: syz.1.7622 Not tainted syzkaller #0 PREEMPT [ 5444.504562][T26410] Hardware name: linux,dummy-virt (DT) [ 5444.505066][T26410] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 5444.506045][T26410] pc : do_misc_fixups+0xa938/0xcf04 [ 5444.507292][T26410] lr : do_misc_fixups+0xa938/0xcf04 [ 5444.507678][T26410] sp : ffff8000a8bd7450 [ 5444.508317][T26410] x29: ffff8000a8bd7450 x28: ffff000013b60000 x27: ffff000013b66130 [ 5444.509137][T26410] x26: ffff000013b66148 x25: ffff000013b60000 x24: 0000000000000000 [ 5444.509772][T26410] x23: ffff000013b66128 x22: 1ffff00011aaba13 x21: ffff80008d55d098 [ 5444.510367][T26410] x20: ffff800085585700 x19: ffff80008556d6a0 x18: 0000000000000000 [ 5444.510980][T26410] x17: 2034313123727473 x16: ffff00006a08a4c4 x15: 65725f65626f7270 [ 5444.511585][T26410] x14: 5f66706220736e6f x13: 0000000000000000 x12: ffff600001deede1 [ 5444.512183][T26410] x11: 1fffe00001deede0 x10: ffff600001deede0 x9 : dfff800000000000 [ 5444.512895][T26410] x8 : ffff00000ef76f03 x7 : 0000000000000001 x6 : ffff600001deede0 [ 5444.513609][T26410] x5 : ffff00000ef76f00 x4 : ffff600001deede1 x3 : 1fffe0000d41313e [ 5444.514227][T26410] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000012d30000 [ 5444.515285][T26410] Call trace: [ 5444.515866][T26410] do_misc_fixups+0xa938/0xcf04 (P) [ 5444.516312][T26410] bpf_check+0x3c84/0x9508 [ 5444.516660][T26410] bpf_prog_load+0xe2c/0x1b74 [ 5444.517013][T26410] __sys_bpf+0x9c4/0x29c8 [ 5444.517348][T26410] __arm64_sys_bpf+0x70/0xa4 [ 5444.517734][T26410] invoke_syscall+0x6c/0x258 [ 5444.518088][T26410] el0_svc_common.constprop.0+0xac/0x230 [ 5444.518458][T26410] do_el0_svc+0x40/0x58 [ 5444.518770][T26410] el0_svc+0x50/0x1a0 [ 5444.519096][T26410] el0t_64_sync_handler+0xa0/0xe4 [ 5444.519456][T26410] el0t_64_sync+0x198/0x19c [ 5444.519979][T26410] irq event stamp: 41138 [ 5444.520301][T26410] hardirqs last enabled at (41137): [] finish_task_switch.isra.0+0x1a8/0x854 [ 5444.520852][T26410] hardirqs last disabled at (41138): [] el1_brk64+0x1c/0x48 [ 5444.521326][T26410] softirqs last enabled at (41108): [] handle_softirqs+0x88c/0xdb4 [ 5444.521960][T26410] softirqs last disabled at (41081): [] __do_softirq+0x14/0x20 [ 5444.522630][T26410] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 5447.323293][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 5447.323998][ T30] audit: type=1400 audit(5446.820:5573): avc: denied { search } for pid=26409 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5447.324514][ T30] audit: type=1400 audit(5446.870:5574): avc: denied { search } for pid=26409 comm="rm" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5447.325730][ T30] audit: type=1400 audit(5446.870:5575): avc: denied { search } for pid=26409 comm="rm" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5447.534398][T14055] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5447.830850][ T30] audit: type=1400 audit(5447.390:5576): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5447.835259][ T30] audit: type=1400 audit(5447.390:5577): avc: denied { search } for pid=26358 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5448.192039][T14055] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5448.680286][T14055] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5449.306753][T14055] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5452.040246][ T30] audit: type=1400 audit(5451.600:5578): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5453.207275][T14055] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5453.441179][T14055] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5453.491871][T14055] bond0 (unregistering): Released all slaves [ 5454.477528][T14055] hsr_slave_0: left promiscuous mode [ 5454.500008][T14055] hsr_slave_1: left promiscuous mode [ 5454.683470][T14055] veth0_macvtap: left allmulticast mode [ 5454.716412][T14055] veth1_macvtap: left promiscuous mode [ 5454.717235][T14055] veth0_macvtap: left promiscuous mode [ 5454.718402][T14055] veth1_vlan: left promiscuous mode [ 5454.718757][T14055] veth0_vlan: left promiscuous mode [ 5459.893993][ T30] audit: type=1400 audit(5459.450:5579): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5460.250666][ T30] audit: type=1400 audit(5459.810:5580): avc: denied { search } for pid=3164 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5460.251660][ T30] audit: type=1400 audit(5459.810:5581): avc: denied { search } for pid=3164 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5460.252064][ T30] audit: type=1400 audit(5459.810:5582): avc: denied { search } for pid=3164 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5460.321568][ T30] audit: type=1400 audit(5459.880:5583): avc: denied { read } for pid=3164 comm="dhcpcd" name="n66" dev="tmpfs" ino=8303 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5460.390936][ T30] audit: type=1400 audit(5459.940:5584): avc: denied { read open } for pid=3164 comm="dhcpcd" path="/run/udev/data/n66" dev="tmpfs" ino=8303 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5460.423817][ T30] audit: type=1400 audit(5459.970:5585): avc: denied { getattr } for pid=3164 comm="dhcpcd" path="/run/udev/data/n66" dev="tmpfs" ino=8303 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5460.448502][ T30] audit: type=1400 audit(5460.010:5586): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5460.572215][ T30] audit: type=1400 audit(5460.130:5587): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5461.499314][T14055] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5461.903409][T14055] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5462.204320][T14055] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5462.532616][T14055] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5465.741074][T14055] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5465.860171][T14055] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5465.966587][T14055] bond0 (unregistering): Released all slaves [ 5466.211331][ T30] audit: type=1400 audit(5465.770:5588): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5466.528932][T14055] hsr_slave_0: left promiscuous mode [ 5466.535357][T14055] hsr_slave_1: left promiscuous mode [ 5466.588940][ T30] audit: type=1400 audit(5466.150:5589): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5466.923369][T14055] veth0_macvtap: left allmulticast mode [ 5466.937529][T14055] veth1_macvtap: left promiscuous mode [ 5466.940326][T14055] veth0_macvtap: left promiscuous mode [ 5466.943514][T14055] veth1_vlan: left promiscuous mode [ 5466.957849][T14055] veth0_vlan: left promiscuous mode [ 5470.932870][ T30] audit: type=1400 audit(5470.490:5590): avc: denied { search } for pid=26425 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5471.148079][ T30] audit: type=1400 audit(5470.710:5591): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5471.175461][ T30] audit: type=1400 audit(5470.730:5592): avc: denied { read } for pid=3164 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 5472.897973][ T30] audit: type=1400 audit(5472.460:5593): avc: denied { search } for pid=26426 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5472.906226][ T30] audit: type=1400 audit(5472.460:5594): avc: denied { search } for pid=26426 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5472.908951][ T30] audit: type=1400 audit(5472.460:5595): avc: denied { search } for pid=26426 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5472.909633][ T30] audit: type=1400 audit(5472.460:5596): avc: denied { search } for pid=26426 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=825 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5473.632479][ T30] audit: type=1400 audit(5473.190:5597): avc: denied { search } for pid=26427 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5473.639706][ T30] audit: type=1400 audit(5473.190:5598): avc: denied { search } for pid=26427 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=668 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5473.646394][ T30] audit: type=1400 audit(5473.190:5599): avc: denied { search } for pid=26427 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=824 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5473.650732][ T30] audit: type=1400 audit(5473.200:5600): avc: denied { read open } for pid=26427 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=825 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5473.655850][ T30] audit: type=1400 audit(5473.210:5601): avc: denied { getattr } for pid=26427 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=825 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5473.814184][ T30] audit: type=1400 audit(5473.350:5602): avc: denied { search } for pid=26427 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 VM DIAGNOSIS: 11:45:02 Registers: info registers vcpu 0 CPU#0 PC=ffff80008001f2d4 X00=0000000000000021 X01=ffff000012d30000 X02=0000000000000000 X03=0000000000000000 X04=1fffe000025a6001 X05=ffff8000871b1d60 X06=ffff700010e363ac X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700010e363ac X11=1ffff00010e363ac X12=ffff700010e363ad X13=fffffffffffee258 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=0000000000000005 X20=ffff8000a8bd7408 X21=ffff8000a8bd7300 X22=ffff8000a8bd7450 X23=ffff800080605b28 X24=0000000000000000 X25=0000000000005936 X26=ffff000012d30000 X27=ffff800085485880 X28=000000000000001d X29=ffff8000a8bd7110 X30=ffff80008001f2d4 SP=ffff8000a8bd70d0 PSTATE=600003c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000fffff796f420:2cf83ddc361f6d00 Q02=0000fffff796f400:ffffff80ffffffd8 Q03=0000fffff796f4b0:0000fffff796f4b0 Q04=0000fffff796f4b0:0000ffffb0d38188 Q05=0000fffff796f480:0000fffff796f4b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff796f6d0:0000fffff796f6d0 Q17=ffffff80ffffffd0:0000fffff796f6a0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085440e30 X00=ffff00001225bc88 X01=0000000000000050 X02=ffff8000a8e07240 X03=ffff800080322114 X04=0000000000000001 X05=0000000000000001 X06=ffff00001225c710 X07=412a91162ab8dfb8 X08=ffff00001225bc80 X09=ffff8000897e6000 X10=ffff00001225c710 X11=0000000000000002 X12=0000000000000006 X13=0000000000000000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff00001225bc80 X20=ffff8000a8e070b8 X21=ffff00001225bc80 X22=ffff00001225bc80 X23=ffff8000800360b8 X24=0000000000000000 X25=00000000000000ee X26=dfff800000000000 X27=ffff80008d2bf1e0 X28=ffff80008d2c8000 X29=ffff8000a8e071d0 X30=ffff8000809ccd54 SP=ffff8000a8e07050 PSTATE=800000c5 N--- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=6572207265767265:730073250a0d0a0d Q02=656820747563205b:2d2d2d2d2d2d2d2d Q03=0000000000000000:00ff00ff00000000 Q04=0000000000000000:000000000f0f0000 Q05=745f6d6461737973:3a725f6d64617379 Q06=646e756f66206563:6976656420425355 Q07=2c323835303d726f:646e65566469202c Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffc9544a90:0000ffffc9544a90 Q17=ffffff80ffffffd8:0000ffffc9544a60 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000