last executing test programs: 14m16.994875286s ago: executing program 0 (id=2384): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000d00)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000880)="6442740e247b17bd4d19bd1c3479aa6b61e51e45a4ad19e06610cf34114ffff5fb2f594acecc29734a7acec71e4d5b3ce05bae0b340b4d2876079233eff3cc471c9d307222d237ec184324d0a6abfdbb9d3e8e408ec4bcd5deb573f5999c49f7281bdc243b62ef5f33c487dba59f52304381e9dd7f3084094bfdf1bbc2b592d7", 0x80}], 0x1}}], 0x1, 0x4048810) recvmsg$unix(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001f00)=""/4096, 0x1000}], 0x1}, 0x12060) 14m14.087734487s ago: executing program 0 (id=2385): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001600)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x3, 0x0, 0x0, {0x3}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x101, 0x0, 0x0, {0x3}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x23}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}}, 0x84}}, 0x4) 14m13.187389136s ago: executing program 0 (id=2386): r0 = socket$kcm(0x29, 0x5, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)='M', 0x1}], 0x1) sendmsg$inet(r0, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x80) 14m12.535964489s ago: executing program 0 (id=2387): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa2c"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b80)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xc}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 14m10.774586865s ago: executing program 0 (id=2388): r0 = syz_open_dev$dri(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_DESTROY(r0, 0xc00864c0, 0x0) 14m10.533483661s ago: executing program 0 (id=2389): prctl$PR_SET_NO_NEW_PRIVS(0x34, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000140)=@hci, 0x80, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000580)=""/132, 0x84}], 0x3, &(0x7f0000000640)=""/217, 0xd9}, 0x22) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000ffffffff0000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='bridge_slave_0\x00', 0x10) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e60, @multicast1}, 0x10) sendmmsg$inet(r6, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="1800000000000000000000000000000018", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 13m24.768260522s ago: executing program 32 (id=2389): prctl$PR_SET_NO_NEW_PRIVS(0x34, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r4 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r4, &(0x7f0000000400)={&(0x7f0000000140)=@hci, 0x80, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000580)=""/132, 0x84}], 0x3, &(0x7f0000000640)=""/217, 0xd9}, 0x22) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000ffffffff0000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='bridge_slave_0\x00', 0x10) connect$inet(r6, &(0x7f0000000540)={0x2, 0x4e60, @multicast1}, 0x10) sendmmsg$inet(r6, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x14, &(0x7f0000000500)=ANY=[@ANYRESDEC=0x0, @ANYBLOB="1800000000000000000000000000000018", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 7m48.007464097s ago: executing program 1 (id=2564): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe3}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001e40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000ac0)="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", 0x222}], 0x1}}], 0x1, 0x40) setsockopt$inet_tcp_buf(r0, 0x6, 0xd, &(0x7f0000000180)="a9", 0x1) 7m47.597027644s ago: executing program 1 (id=2565): openat$sequencer2(0xffffffffffffff9c, 0x0, 0xc2882, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={[0x1]}, 0x8, 0x0) clock_gettime(0x0, 0x0) 7m47.364183784s ago: executing program 1 (id=2567): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8001}, 0x4) syz_emit_ethernet(0x2e, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="e43f6642531e", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0xe000, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0xc, 0x0, @gue={{0x1, 0x1, 0x1, 0x10, 0x0, @void}}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x20000000000000ba, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfd71}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x2000, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 7m45.634749526s ago: executing program 1 (id=2570): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newsa={0x13c, 0x10, 0x713, 0xfffffffe, 0x25dfdbfc, {{@in=@rand_addr=0x64010101, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x4e21, 0x2, 0xa, 0x0, 0x0, 0x1d, 0x0, 0xee00}, {@in6=@private1, 0xfe, 0x32}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {0x0, 0x0, 0x0, 0x8, 0x0, 0x9, 0x0, 0x543}, {0x8000004, 0x7fffffffffffffff}, {0x2}, 0x70bd2c, 0x3500, 0xa, 0x1, 0x0, 0x50}, [@algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x880}, 0x0) 7m43.747363065s ago: executing program 1 (id=2573): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x7, 0xa1, &(0x7f0000000200)) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 7m42.66456366s ago: executing program 1 (id=2575): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r3, 0x28, 0x6, &(0x7f0000000040)={0x77359400}, 0x10) 6m56.898084132s ago: executing program 33 (id=2575): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r3, 0x28, 0x6, &(0x7f0000000040)={0x77359400}, 0x10) 5m19.046934949s ago: executing program 2 (id=2645): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000800000000101"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x4c, 0x2, 0x6, 0x801, 0xe4340000, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x4c}}, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c80)={0x5c, 0x9, 0x6, 0x801, 0x0, 0x0, {0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x34, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @remote}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0xe1f}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x88}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) 5m18.279205981s ago: executing program 2 (id=2646): r0 = socket$inet(0x2, 0xa, 0x0) accept$inet(r0, 0x0, 0x0) 5m17.916529436s ago: executing program 2 (id=2648): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x80800) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002d00)=@delchain={0x24, 0x65, 0x200, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xd, 0xb}, {0xd, 0x7}, {0xfff1, 0xd}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0xc050) recvmsg$can_bcm(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/233, 0xe9}], 0x1}, 0x20) 5m15.996833806s ago: executing program 2 (id=2653): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@ipv4_newrule={0x24, 0x20, 0x301, 0x0, 0x0, {0x2, 0x0, 0x0, 0x4}, [@FRA_GENERIC_POLICY=@FRA_SUPPRESS_IFGROUP={0x8, 0xd, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x240480d4}, 0x0) 5m15.613949622s ago: executing program 2 (id=2654): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha1)\x00'}, 0x58) r2 = syz_io_uring_setup(0x10f, &(0x7f0000000140)={0x0, 0xb423, 0x0, 0x5, 0x199}, &(0x7f00000001c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_ACCEPT={0xd, 0x40, 0x3, r1, 0x0, 0x0, 0x0, 0x80800}) io_uring_enter(r2, 0x3516, 0x3e44, 0x8, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 5m9.547430255s ago: executing program 2 (id=2655): bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0700000004000000080200000100"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_emit_ethernet(0xd2, &(0x7f0000000d00)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60000000009c8800fe8000000000000000000000000000bbff02000000000000000000000000000100000e22009c90"], 0x0) 4m24.17883697s ago: executing program 34 (id=2655): bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0700000004000000080200000100"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_emit_ethernet(0xd2, &(0x7f0000000d00)=ANY=[@ANYBLOB="0180c2000000ffffffffffff86dd60000000009c8800fe8000000000000000000000000000bbff02000000000000000000000000000100000e22009c90"], 0x0) 7.066357075s ago: executing program 3 (id=2858): r0 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x400, 0x8000, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x4007, @fd_index=0x3, 0x6, 0x0, 0x0, 0x2, 0x1}) io_uring_enter(r0, 0x627, 0x4c1, 0x43, 0x0, 0x0) 4.323144809s ago: executing program 4 (id=2861): name_to_handle_at(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="14"], 0x0, 0x0) r0 = fsopen(&(0x7f0000000180)='proc\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x1) fchdir(r1) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x8042, 0x0) 3.636283168s ago: executing program 4 (id=2862): munmap(&(0x7f0000001000/0x2000)=nil, 0x2000) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000002000/0x11000)=nil) 3.169931457s ago: executing program 4 (id=2863): r0 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000100)) 2.534152294s ago: executing program 3 (id=2864): unshare(0xa000680) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setsig(r0, 0xa, 0x4002b) 2.382103171s ago: executing program 4 (id=2865): syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='oom_adj\x00') fchdir(r0) mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 1.810373595s ago: executing program 3 (id=2866): r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000080)=ANY=[@ANYBLOB="1201000041436120410e5150e8d5000000010902f98a5c01000000090401001186eee2000905821704"], 0x0) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) 1.43666402s ago: executing program 3 (id=2867): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) r1 = memfd_create(&(0x7f0000000000)='\xff\x00l\x1e\xa0,\xc1\x8d\\Rxt\'\xb6\xbf\xc8*\n\xaf\x1b\xec\xfd\xbbY\x99\xb3\x06c\xd6\xf6\xb0\xcd=\xf3\x03`\x93\xff\x05e\xaa$\x00\xeaw\xd9\x10\x0f\x1d\x888\x8cS\x12?R\x99\xda7\xce)\x8f\xcc\x87\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd32J\xd7\x9f\xea:=\xcc\x17(|L\xda\xc3\x1ca\xe8s\xb6\xebw\xc7\xabS\xd7pJ\xd2\xa1\xcf\xae\x1f2\x9f\x98\xa80\r\x85\xb4\x86\xbc\xd0\xea\xbf\xb1Z\xb7e$\xcf<\ra\x9b\xa5\xdc\v\x1e\xfd\xc7\x91\xf22\xcf\x96\x99\xc1\xbb\xa1j\xe5\xa8\x7f\a\xa9\xa7G\xad\xa3\x8b\xf1\xdb\\]R\x8cf\xac1\xd7V\xaf\xb5\x8e\x10\x95\x9f=2\xd0-\xe1K:\xc3b\x89\x15OS\xa5\x98Ky\x12\xe7Qt#\xeb\x99\a\x10\x1c\xb3N\x85\xeb\x80\x05\x82_\x15\xdc\xbc\xf93\xdd\xf5g\x98\xd4\x8az\xe4`\xa5\x00\x00\x00\x00\xcd\x13\xfc+\xac\xe5\x8bI\f\xd6\x89\xc7HY\xcf\x00O\x88\xe6\x8b\x8bF/\x82u\xffCnG\x02\x82\xfc\xe9Od\x92\x06\xdeg@y\xa6=4\xb1}\xa8Yr\xad9\xb9b)\xec}\x87=\x91:IV\xab\xdf\xa2\xba+6D\x1fuf\xdeJYw$L\xa1\x83NH\xe3\xf2\x91\x8cW\xb7\b\x04\x12\x8b\x8bV\x19\xf1\r\xcb\x94\xa3\xf4\xe4\x97$\x99c\rG\xd7#\xe2\xfd\x80\xadR\x83\xdc\xb8d\x15|\xac\xb8g$\x0f@\xca3\x9f\xb1\xea\xc6vQ\x1b\xdb#\xa3\"\x9f\x9e\xd8\xba\x13d\x9bx\x9a\xbf\xee\xf2kQ\xe0\xc4/~7\xcd\xd1\x06\xe5\x17\x9b\bW|\xbc\x86D\x05\xaf<\xdfy,I2f\xa7G\xe3Qp<\'6 x\n\x94f\xf8\xa2\xea\xf4\xa5\x9eY\xf80C\x91\x7f\x16u\x8c(Xl\x90\xd2\x9f\xa9\xb9kJy[\x93\xfe{\xe5\x1a\xe9\xb7T\x19;\xb9\t\xe7\x0ei\xfaZ\xfbS:\x9b\xc1r\xcbM.\xf8\xb8wR\xb3p~b\xcb\v1-\a-\x8a#\xaa1\xa9\x9a\x88\a\xc5\xb9*\xd3?\xac\n\x9c\xcd\xe2\xc9\xbd\xeb\xb3\xf65\xbdaP\t\xd6\x06\x1c\xeeNg\x92>\x92>\xaf\b3\x05\xfdM\xd2F\v\xbd\xeb\x83 \x9d\x90S\x11w\xefg\\\xca\xe2\xfc~w\xbe\xefh#\x96\xa5h\xec\xbfr\xc8Bi\x90\"(\xf2\xc6\xcc\xfbX\x14{\x9e5\x87\x91\xe2\x9b\xd4\xc6\xc2whk+\x0f\x82\xca\xc1@\xcb~P\xe4\x18\xf9E\'\xab\xc7z\xd7\x05V{\xa1X\xa3\x10\x13.]tlz\x12\xde\xf2\xa43\xee#\x92J~\xda \x9b\xc4\xc0V\xb3\x9dCO\x1fu\x1c4\x1d\v}\x1b\xe5>w\xfbsm\xa3\fI|\x96-p\x86\xd3O\xfa\x9a\x8f\xb2\x8e\x88qGEG', 0x6) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x4c092, r1, 0x200000000000000) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000240)={'comedi_test\x00', [0x4f27, 0x5, 0x10000, 0x30, 0x66, 0x4c7, 0x0, 0x8000, 0x7, 0x104, 0xffffffff, 0x1, 0xd, 0x1, 0x2, 0x80000101, 0x5, 0x1a449, 0x3, 0x400, 0x2086, 0x22, 0x0, 0x20001e5c, 0x2, 0x8002, 0x3c, 0x1, 0x6, 0x0, 0xf9]}) 1.19793784s ago: executing program 4 (id=2868): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000500), 0x141002, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000040)=0x5) 827.818035ms ago: executing program 3 (id=2869): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x52, &(0x7f00000006c0)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xc}, @val={@void, {0x8100, 0x0, 0x0, 0x1}}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f900f5", 0x18, 0x6, 0x0, @local, @local, {[], {{0xfffe, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x1ff, {[@fastopen={0x1e, 0x4, "4d1f"}]}}}}}}}}, 0x0) 119.072445ms ago: executing program 3 (id=2870): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x1f, 0x10000, 0x4, 0x3, 0xcc7, 0x4, 0x80008, 0xe, 0x6, 0x2, 0x1, 0x7, 0x1, 0x6, 0x10000105, 0x0, 0x1a44d, 0x3, 0x3fff7fff, 0x89, 0x10, 0x1, 0x20001e58, 0x80000b, 0xe69, 0x3c, 0x8, 0x6, 0xffffffff, 0xeffffff8]}) 0s ago: executing program 4 (id=2871): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r1, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000340), 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendto$inet(r0, &(0x7f0000000040)="081eed225b4b6b7b3da03ffbc59fb358cd5266dcacedb89d0396e481892790df3cbc02e27c302c4009b665220000000000006803b7d5cd70e1745d3d2ac608170041b0eab834e62765cf828748b73b2635be2f9b59c231207918213869e91b", 0xffffffffffffff47, 0x4000810, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000001c0), 0x4) kernel console output (not intermixed with test programs): read open } for pid=15404 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2157.094008][ T31] audit: type=1400 audit(2157.030:22358): avc: denied { getattr } for pid=15404 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2157.124476][ T31] audit: type=1400 audit(2157.060:22359): avc: denied { search } for pid=15404 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2157.124892][ T31] audit: type=1400 audit(2157.060:22360): avc: denied { search } for pid=15404 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2157.125158][ T31] audit: type=1400 audit(2157.060:22361): avc: denied { search } for pid=15404 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2157.125363][ T31] audit: type=1400 audit(2157.060:22362): avc: denied { search } for pid=15404 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2157.181888][ T31] audit: type=1400 audit(2157.120:22363): avc: denied { search } for pid=15404 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2157.183846][ T31] audit: type=1400 audit(2157.120:22364): avc: denied { search } for pid=15404 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2157.185829][ T31] audit: type=1400 audit(2157.120:22365): avc: denied { search } for pid=15404 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2157.187633][ T31] audit: type=1400 audit(2157.120:22366): avc: denied { read open } for pid=15404 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2162.292039][ T31] kauditd_printk_skb: 210 callbacks suppressed [ 2162.292371][ T31] audit: type=1400 audit(2162.230:22577): avc: denied { create } for pid=15410 comm="syz.2.2632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2162.330609][ T31] audit: type=1400 audit(2162.270:22578): avc: denied { read } for pid=15410 comm="syz.2.2632" name="renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2162.333228][ T31] audit: type=1400 audit(2162.270:22579): avc: denied { read open } for pid=15410 comm="syz.2.2632" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2162.382583][ T31] audit: type=1400 audit(2162.320:22580): avc: denied { ioctl } for pid=15410 comm="syz.2.2632" path="/dev/dri/renderD128" dev="devtmpfs" ino=612 ioctlcmd=0x642e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2162.431819][ T31] audit: type=1400 audit(2162.370:22581): avc: denied { search } for pid=15399 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2163.835219][ T31] audit: type=1400 audit(2163.770:22582): avc: denied { create } for pid=15413 comm="syz.2.2633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2163.928751][ T31] audit: type=1400 audit(2163.860:22583): avc: denied { create } for pid=15413 comm="syz.2.2633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2163.930521][ T31] audit: type=1400 audit(2163.870:22584): avc: denied { write } for pid=15416 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2163.937695][ T31] audit: type=1400 audit(2163.870:22585): avc: denied { write open } for pid=15416 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2163.954335][ T31] audit: type=1400 audit(2163.890:22586): avc: denied { setopt } for pid=15413 comm="syz.2.2633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2168.043876][ T31] kauditd_printk_skb: 213 callbacks suppressed [ 2168.044127][ T31] audit: type=1400 audit(2167.980:22800): avc: denied { search } for pid=15424 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2168.054130][ T31] audit: type=1400 audit(2167.990:22801): avc: denied { search } for pid=15424 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2168.055768][ T31] audit: type=1400 audit(2167.990:22802): avc: denied { search } for pid=15424 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2168.071721][ T31] audit: type=1400 audit(2168.010:22803): avc: denied { getattr } for pid=15424 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth6.ipv4ll" dev="tmpfs" ino=94 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2168.086467][ T31] audit: type=1400 audit(2168.020:22804): avc: denied { search } for pid=15424 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2168.087207][ T31] audit: type=1400 audit(2168.020:22805): avc: denied { search } for pid=15424 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2168.087556][ T31] audit: type=1400 audit(2168.020:22806): avc: denied { search } for pid=15424 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2168.088131][ T31] audit: type=1400 audit(2168.020:22807): avc: denied { search } for pid=15424 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2168.092231][ T31] audit: type=1400 audit(2168.030:22808): avc: denied { remove_name search } for pid=15424 comm="rm" name="resolv.conf.eth6.ipv4ll" dev="tmpfs" ino=94 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2168.104397][ T31] audit: type=1400 audit(2168.040:22809): avc: denied { unlink } for pid=15424 comm="rm" name="resolv.conf.eth6.ipv4ll" dev="tmpfs" ino=94 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2173.050902][ T31] kauditd_printk_skb: 417 callbacks suppressed [ 2173.057238][ T31] audit: type=1400 audit(2172.990:23227): avc: denied { getattr } for pid=15433 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2173.074706][ T31] audit: type=1400 audit(2173.000:23228): avc: denied { search } for pid=15433 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2173.109155][ T31] audit: type=1400 audit(2173.040:23229): avc: denied { getattr } for pid=15433 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2173.119706][ T31] audit: type=1400 audit(2173.060:23230): avc: denied { search } for pid=15433 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2173.120568][ T31] audit: type=1400 audit(2173.060:23231): avc: denied { search } for pid=15433 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2173.120927][ T31] audit: type=1400 audit(2173.060:23232): avc: denied { search } for pid=15433 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2173.143062][ T31] audit: type=1400 audit(2173.080:23233): avc: denied { getattr } for pid=15433 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth8.ipv4ll" dev="tmpfs" ino=96 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2173.157652][ T31] audit: type=1400 audit(2173.090:23234): avc: denied { write } for pid=15433 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2173.180080][ T31] audit: type=1400 audit(2173.110:23235): avc: denied { write open } for pid=15433 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2173.203001][ T31] audit: type=1400 audit(2173.140:23236): avc: denied { getattr } for pid=15433 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2187.191576][ T31] kauditd_printk_skb: 83 callbacks suppressed [ 2187.192605][ T31] audit: type=1400 audit(2187.130:23320): avc: denied { unmount } for pid=14900 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2187.367813][ T31] audit: type=1400 audit(2187.300:23321): avc: denied { read write } for pid=15458 comm="syz.3.2639" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2187.374239][ T31] audit: type=1400 audit(2187.310:23322): avc: denied { read write open } for pid=15458 comm="syz.3.2639" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2187.379357][ T31] audit: type=1400 audit(2187.310:23323): avc: denied { ioctl } for pid=15458 comm="syz.3.2639" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2187.381083][ T31] audit: type=1400 audit(2187.320:23324): avc: denied { ioctl } for pid=15458 comm="syz.3.2639" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2187.389783][T15459] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2187.397307][T15459] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2187.406530][ T31] audit: type=1400 audit(2187.340:23325): avc: denied { read write } for pid=15458 comm="syz.3.2639" name="sequencer2" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2187.408915][ T31] audit: type=1400 audit(2187.340:23326): avc: denied { read write open } for pid=15458 comm="syz.3.2639" path="/dev/sequencer2" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2187.830273][ T31] audit: type=1400 audit(2187.770:23327): avc: denied { read } for pid=15462 comm="syz.3.2640" dev="nsfs" ino=4026532787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2187.839085][ T31] audit: type=1400 audit(2187.770:23328): avc: denied { read open } for pid=15462 comm="syz.3.2640" path="net:[4026532787]" dev="nsfs" ino=4026532787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2187.857638][ T31] audit: type=1400 audit(2187.790:23329): avc: denied { create } for pid=15462 comm="syz.3.2640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2191.498230][T15487] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2650'. [ 2192.404869][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 2192.409249][ T31] audit: type=1400 audit(2192.340:23387): avc: denied { bpf } for pid=15491 comm="syz.3.2652" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2192.431354][ T31] audit: type=1400 audit(2192.370:23388): avc: denied { create } for pid=15491 comm="syz.3.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2192.454273][ T31] audit: type=1400 audit(2192.390:23389): avc: denied { prog_load } for pid=15491 comm="syz.3.2652" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2192.459486][ T31] audit: type=1400 audit(2192.400:23390): avc: denied { bpf } for pid=15491 comm="syz.3.2652" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2192.493143][ T31] audit: type=1400 audit(2192.430:23391): avc: denied { perfmon } for pid=15491 comm="syz.3.2652" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2192.497481][ T31] audit: type=1400 audit(2192.430:23392): avc: denied { perfmon } for pid=15491 comm="syz.3.2652" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2192.503135][ T31] audit: type=1400 audit(2192.440:23393): avc: denied { perfmon } for pid=15491 comm="syz.3.2652" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2192.506190][ T31] audit: type=1400 audit(2192.440:23394): avc: denied { perfmon } for pid=15491 comm="syz.3.2652" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2192.529066][ T31] audit: type=1400 audit(2192.460:23395): avc: denied { perfmon } for pid=15491 comm="syz.3.2652" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2192.529366][ T31] audit: type=1400 audit(2192.460:23396): avc: denied { bpf } for pid=15491 comm="syz.3.2652" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2197.583704][ T31] kauditd_printk_skb: 203 callbacks suppressed [ 2197.584774][ T31] audit: type=1400 audit(2197.520:23600): avc: denied { accept } for pid=15495 comm="syz.2.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2197.609447][ T31] audit: type=1400 audit(2197.540:23601): avc: denied { accept } for pid=15495 comm="syz.2.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2197.620941][ T31] audit: type=1400 audit(2197.560:23602): avc: denied { accept } for pid=15495 comm="syz.2.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2197.627319][ T31] audit: type=1400 audit(2197.560:23603): avc: denied { accept } for pid=15495 comm="syz.2.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2197.653956][ T31] audit: type=1400 audit(2197.590:23604): avc: denied { accept } for pid=15495 comm="syz.2.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2197.684430][ T31] audit: type=1400 audit(2197.610:23605): avc: denied { accept } for pid=15495 comm="syz.2.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2197.684819][ T31] audit: type=1400 audit(2197.610:23606): avc: denied { accept } for pid=15495 comm="syz.2.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2197.706265][ T31] audit: type=1400 audit(2197.630:23607): avc: denied { accept } for pid=15495 comm="syz.2.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2197.723845][ T31] audit: type=1400 audit(2197.660:23608): avc: denied { accept } for pid=15495 comm="syz.2.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2197.734886][ T31] audit: type=1400 audit(2197.670:23609): avc: denied { accept } for pid=15495 comm="syz.2.2654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2202.888755][ T31] kauditd_printk_skb: 183 callbacks suppressed [ 2202.889418][ T31] audit: type=1400 audit(2202.820:23793): avc: denied { ioctl } for pid=15506 comm="syz.3.2656" path="socket:[34885]" dev="sockfs" ino=34885 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2202.906801][ T31] audit: type=1400 audit(2202.840:23794): avc: denied { module_request } for pid=15506 comm="syz.3.2656" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2203.331627][ T31] audit: type=1400 audit(2203.270:23795): avc: denied { read } for pid=15506 comm="syz.3.2656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2203.393396][ T31] audit: type=1400 audit(2203.330:23796): avc: denied { write } for pid=15506 comm="syz.3.2656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2203.457536][ T31] audit: type=1400 audit(2203.390:23797): avc: denied { sys_module } for pid=15506 comm="syz.3.2656" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2203.482062][ T31] audit: type=1400 audit(2203.410:23798): avc: denied { module_request } for pid=15506 comm="syz.3.2656" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2204.595912][ T31] audit: type=1400 audit(2204.530:23799): avc: denied { prog_load } for pid=15514 comm="syz.3.2657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2204.597615][ T31] audit: type=1400 audit(2204.530:23800): avc: denied { bpf } for pid=15514 comm="syz.3.2657" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2204.605447][ T31] audit: type=1400 audit(2204.540:23801): avc: denied { perfmon } for pid=15514 comm="syz.3.2657" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2204.617253][ T31] audit: type=1400 audit(2204.540:23802): avc: denied { perfmon } for pid=15514 comm="syz.3.2657" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2204.858039][T15515] Illegal XDP return value 4294967274 on prog (id 53) dev syz_tun, expect packet loss! [ 2211.694909][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 2211.695113][ T31] audit: type=1400 audit(2211.630:23811): avc: denied { map_create } for pid=15522 comm="syz.3.2660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2211.714668][ T31] audit: type=1400 audit(2211.650:23812): avc: denied { perfmon } for pid=15522 comm="syz.3.2660" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2211.753512][ T31] audit: type=1400 audit(2211.690:23813): avc: denied { map_read map_write } for pid=15522 comm="syz.3.2660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2211.769168][ T31] audit: type=1400 audit(2211.700:23814): avc: denied { map_create } for pid=15522 comm="syz.3.2660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2211.776962][ T31] audit: type=1400 audit(2211.710:23815): avc: denied { map_read map_write } for pid=15522 comm="syz.3.2660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2224.979364][ T31] audit: type=1400 audit(2224.900:23816): avc: denied { read } for pid=15531 comm="syz.3.2663" dev="nsfs" ino=4026532787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2224.979705][ T31] audit: type=1400 audit(2224.910:23817): avc: denied { read open } for pid=15531 comm="syz.3.2663" path="net:[4026532787]" dev="nsfs" ino=4026532787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2224.979964][ T31] audit: type=1400 audit(2224.910:23818): avc: denied { create } for pid=15531 comm="syz.3.2663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2224.980153][ T31] audit: type=1400 audit(2224.910:23819): avc: denied { write } for pid=15531 comm="syz.3.2663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2224.986117][ T31] audit: type=1400 audit(2224.920:23820): avc: denied { read } for pid=15531 comm="syz.3.2663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2224.993024][ T31] audit: type=1400 audit(2224.930:23821): avc: denied { read } for pid=15531 comm="syz.3.2663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2225.009154][ T31] audit: type=1400 audit(2224.940:23822): avc: denied { write } for pid=15531 comm="syz.3.2663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2225.180927][ T31] audit: type=1400 audit(2225.120:23823): avc: denied { prog_load } for pid=15533 comm="syz.3.2664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2225.182858][ T31] audit: type=1400 audit(2225.120:23824): avc: denied { bpf } for pid=15533 comm="syz.3.2664" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2225.721929][ T31] audit: type=1400 audit(2225.660:23825): avc: denied { read write } for pid=15533 comm="syz.3.2664" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2230.849371][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 2230.850890][ T31] audit: type=1400 audit(2230.780:23848): avc: denied { unmount } for pid=14900 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2231.451716][ T31] audit: type=1400 audit(2231.390:23849): avc: denied { prog_load } for pid=15542 comm="syz.3.2666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2231.462431][ T31] audit: type=1400 audit(2231.400:23850): avc: denied { bpf } for pid=15542 comm="syz.3.2666" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2231.471831][ T31] audit: type=1400 audit(2231.410:23851): avc: denied { perfmon } for pid=15542 comm="syz.3.2666" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2231.482616][ T31] audit: type=1400 audit(2231.420:23852): avc: denied { prog_load } for pid=15542 comm="syz.3.2666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2231.642775][ T31] audit: type=1400 audit(2231.580:23853): avc: denied { bpf } for pid=15542 comm="syz.3.2666" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2231.664033][ T31] audit: type=1400 audit(2231.600:23854): avc: denied { execmem } for pid=15542 comm="syz.3.2666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2235.639184][ T31] audit: type=1400 audit(2235.560:23855): avc: denied { read } for pid=15542 comm="syz.3.2666" name="binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2235.693816][ T31] audit: type=1400 audit(2235.630:23856): avc: denied { read open } for pid=15542 comm="syz.3.2666" path="/dev/binderfs/binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2235.744107][ T31] audit: type=1400 audit(2235.680:23857): avc: denied { ioctl } for pid=15542 comm="syz.3.2666" path="/dev/binderfs/binder1" dev="binder" ino=11 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2243.323012][ T31] audit: type=1400 audit(2243.260:23858): avc: denied { execmem } for pid=15546 comm="syz.3.2667" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2244.319112][ T31] audit: type=1400 audit(2244.250:23859): avc: denied { execute } for pid=15548 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2244.322735][ T31] audit: type=1400 audit(2244.260:23860): avc: denied { execute_no_trans } for pid=15548 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2244.355260][ T31] audit: type=1400 audit(2244.280:23861): avc: denied { execute } for pid=15548 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2244.436418][ T31] audit: type=1400 audit(2244.370:23862): avc: denied { execmem } for pid=15548 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2244.499754][ T31] audit: type=1400 audit(2244.440:23863): avc: denied { read } for pid=15550 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2244.502838][ T31] audit: type=1400 audit(2244.440:23864): avc: denied { read open } for pid=15550 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2244.533662][ T31] audit: type=1400 audit(2244.470:23865): avc: denied { mounton } for pid=15550 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2244.576684][ T31] audit: type=1400 audit(2244.510:23866): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-nr4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2244.845011][ T31] audit: type=1400 audit(2244.780:23867): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2248.595163][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 2248.595494][ T31] audit: type=1400 audit(2248.530:23883): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2248.986888][ T31] audit: type=1400 audit(2248.920:23884): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2249.309068][ T31] audit: type=1400 audit(2249.230:23885): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2249.835507][ T31] audit: type=1400 audit(2249.770:23886): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2250.152455][ T31] audit: type=1400 audit(2250.090:23887): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2250.156078][ T31] audit: type=1400 audit(2250.090:23888): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2250.356482][ T31] audit: type=1400 audit(2250.290:23889): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2250.567202][ T31] audit: type=1400 audit(2250.500:23890): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2250.571775][ T31] audit: type=1400 audit(2250.510:23891): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2251.051370][T15550] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2251.066829][T15550] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2251.235464][ T31] audit: type=1400 audit(2251.170:23892): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2253.612396][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 2253.612711][ T31] audit: type=1400 audit(2253.550:23901): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2253.984212][ T31] audit: type=1400 audit(2253.920:23902): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2253.984584][ T31] audit: type=1400 audit(2253.920:23903): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2254.420966][T15550] hsr_slave_0: entered promiscuous mode [ 2254.427027][T15550] hsr_slave_1: entered promiscuous mode [ 2254.562002][ T31] audit: type=1400 audit(2254.500:23904): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="rtnl-link-virt_wifi" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2255.505878][ T31] audit: type=1400 audit(2255.440:23905): avc: denied { create } for pid=15550 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2255.531555][ T31] audit: type=1400 audit(2255.460:23906): avc: denied { write } for pid=15550 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2255.539181][ T31] audit: type=1400 audit(2255.470:23907): avc: denied { read } for pid=15550 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2255.544743][ T31] audit: type=1400 audit(2255.480:23908): avc: denied { read } for pid=15550 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2255.562677][ T31] audit: type=1400 audit(2255.500:23909): avc: denied { write } for pid=15550 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2255.589406][ T31] audit: type=1400 audit(2255.520:23910): avc: denied { read } for pid=15550 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2255.596491][T15550] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 2255.651860][T15550] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 2255.678204][T15550] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 2255.708052][T15550] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 2259.338065][T15550] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2259.700495][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 2259.700819][ T31] audit: type=1400 audit(2259.630:23939): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2260.369005][ T31] audit: type=1400 audit(2260.300:23940): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2260.404974][ T31] audit: type=1400 audit(2260.340:23941): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2260.679590][ T31] audit: type=1400 audit(2260.610:23942): avc: denied { map_create } for pid=15877 comm="syz.3.2672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2260.679969][ T31] audit: type=1400 audit(2260.610:23943): avc: denied { bpf } for pid=15877 comm="syz.3.2672" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2260.684077][ T31] audit: type=1400 audit(2260.620:23944): avc: denied { prog_load } for pid=15877 comm="syz.3.2672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2260.729394][ T31] audit: type=1400 audit(2260.630:23945): avc: denied { bpf } for pid=15877 comm="syz.3.2672" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2260.729717][ T31] audit: type=1400 audit(2260.650:23946): avc: denied { prog_load } for pid=15877 comm="syz.3.2672" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2260.729946][ T31] audit: type=1400 audit(2260.650:23947): avc: denied { bpf } for pid=15877 comm="syz.3.2672" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2260.737003][ T31] audit: type=1400 audit(2260.670:23948): avc: denied { perfmon } for pid=15877 comm="syz.3.2672" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2261.424527][T15882] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2673'. [ 2264.895176][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 2264.895530][ T31] audit: type=1400 audit(2264.830:23977): avc: denied { write } for pid=15895 comm="syz.3.2676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2265.232940][ T31] audit: type=1400 audit(2265.170:23978): avc: denied { read } for pid=15895 comm="syz.3.2676" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2265.556370][ T31] audit: type=1400 audit(2265.490:23979): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2266.506875][ T31] audit: type=1400 audit(2266.440:23980): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2266.515988][ T31] audit: type=1400 audit(2266.450:23981): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2267.369134][ T31] audit: type=1400 audit(2267.300:23982): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2267.926562][ T31] audit: type=1400 audit(2267.860:23983): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2267.931706][ T31] audit: type=1400 audit(2267.870:23984): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2268.584311][ T31] audit: type=1400 audit(2268.520:23985): avc: denied { create } for pid=15908 comm="syz.3.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2268.613850][ T31] audit: type=1400 audit(2268.550:23986): avc: denied { create } for pid=15908 comm="syz.3.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2269.029809][T15911] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2269.033952][T15911] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2269.967672][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 2269.975736][ T31] audit: type=1400 audit(2269.890:24000): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2269.977723][ T31] audit: type=1400 audit(2269.890:24001): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2270.189331][ T31] audit: type=1400 audit(2270.120:24002): avc: denied { create } for pid=15917 comm="syz.3.2681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2270.244310][ T31] audit: type=1400 audit(2270.180:24003): avc: denied { bind } for pid=15917 comm="syz.3.2681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2270.740284][ T31] audit: type=1400 audit(2270.680:24004): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2270.752584][ T31] audit: type=1400 audit(2270.690:24005): avc: denied { read } for pid=15920 comm="syz.3.2682" dev="nsfs" ino=4026532787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2270.755436][ T31] audit: type=1400 audit(2270.690:24006): avc: denied { read open } for pid=15920 comm="syz.3.2682" path="net:[4026532787]" dev="nsfs" ino=4026532787 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2270.791496][ T31] audit: type=1400 audit(2270.730:24007): avc: denied { create } for pid=15920 comm="syz.3.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2270.832609][ T31] audit: type=1400 audit(2270.770:24008): avc: denied { write } for pid=15920 comm="syz.3.2682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2271.489176][ T31] audit: type=1400 audit(2271.420:24009): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2271.569517][T15924] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2271.571360][T15924] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2274.341057][T15941] kernel read not supported for file /cgroup.controllers (pid: 15941 comm: syz.3.2688) [ 2275.033653][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 2275.033970][ T31] audit: type=1400 audit(2274.970:24035): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2275.143503][ T31] audit: type=1400 audit(2275.080:24036): avc: denied { read } for pid=15942 comm="syz.3.2689" name="controlC0" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2275.163996][ T31] audit: type=1400 audit(2275.100:24037): avc: denied { read open } for pid=15942 comm="syz.3.2689" path="/dev/snd/controlC0" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2275.181765][ T31] audit: type=1400 audit(2275.120:24038): avc: denied { ioctl } for pid=15942 comm="syz.3.2689" path="/dev/snd/controlC0" dev="devtmpfs" ino=726 ioctlcmd=0x5531 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2275.664266][ T31] audit: type=1400 audit(2275.600:24039): avc: denied { execmem } for pid=15945 comm="syz.3.2690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2275.713180][ T31] audit: type=1400 audit(2275.650:24040): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2275.737161][ T31] audit: type=1400 audit(2275.670:24041): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2276.319430][ T31] audit: type=1400 audit(2276.260:24042): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2276.859673][ T31] audit: type=1400 audit(2276.790:24043): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2276.863518][ T31] audit: type=1400 audit(2276.800:24044): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2280.175880][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 2280.176221][ T31] audit: type=1400 audit(2280.110:24059): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2280.522868][ T31] audit: type=1400 audit(2280.460:24060): avc: denied { read } for pid=15960 comm="syz.3.2691" name="iommu" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2280.536610][ T31] audit: type=1400 audit(2280.470:24061): avc: denied { read open } for pid=15960 comm="syz.3.2691" path="/dev/iommu" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2280.576794][ T31] audit: type=1400 audit(2280.510:24062): avc: denied { ioctl } for pid=15960 comm="syz.3.2691" path="/dev/iommu" dev="devtmpfs" ino=610 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2280.602267][ T31] audit: type=1400 audit(2280.540:24063): avc: denied { ioctl } for pid=15960 comm="syz.3.2691" path="/dev/iommu" dev="devtmpfs" ino=610 ioctlcmd=0x3b87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2280.667402][ T31] audit: type=1400 audit(2280.600:24064): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2280.689407][ T31] audit: type=1400 audit(2280.620:24065): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2281.026347][ T31] audit: type=1400 audit(2280.960:24066): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2281.215914][ T31] audit: type=1400 audit(2281.150:24067): avc: denied { sys_module } for pid=15550 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2281.218204][ T31] audit: type=1400 audit(2281.150:24068): avc: denied { module_request } for pid=15550 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2281.573827][T15550] veth0_vlan: entered promiscuous mode [ 2281.633432][T15550] veth1_vlan: entered promiscuous mode [ 2281.855257][T15550] veth0_macvtap: entered promiscuous mode [ 2281.886905][T15550] veth1_macvtap: entered promiscuous mode [ 2282.092142][T13671] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2282.093184][T13671] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2282.093809][T13671] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2282.093910][T13671] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2285.875009][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 2285.879249][ T31] audit: type=1400 audit(2285.810:24101): avc: denied { read write } for pid=15977 comm="syz.4.2693" name="sequencer2" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2285.882058][ T31] audit: type=1400 audit(2285.810:24102): avc: denied { read write open } for pid=15977 comm="syz.4.2693" path="/dev/sequencer2" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2286.711903][ T7687] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2286.770482][ T7687] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2286.772226][ T7687] bond0 (unregistering): Released all slaves [ 2286.884549][ T7687] hsr_slave_0: left promiscuous mode [ 2286.885829][ T7687] hsr_slave_1: left promiscuous mode [ 2287.133229][ T31] audit: type=1400 audit(2287.070:24103): avc: denied { allowed } for pid=15977 comm="syz.4.2693" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2288.724434][ T31] audit: type=1400 audit(2288.650:24104): avc: denied { create } for pid=15995 comm="syz.4.2694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2288.738994][ T31] audit: type=1400 audit(2288.670:24105): avc: denied { create } for pid=15995 comm="syz.4.2694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2288.766592][ T31] audit: type=1400 audit(2288.700:24106): avc: denied { write } for pid=15995 comm="syz.4.2694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2288.766906][ T31] audit: type=1400 audit(2288.700:24107): avc: denied { module_request } for pid=15995 comm="syz.4.2694" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2288.867736][ T31] audit: type=1400 audit(2288.800:24108): avc: denied { write } for pid=15994 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2288.913636][ T31] audit: type=1400 audit(2288.850:24109): avc: denied { write open } for pid=15994 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2289.255855][ T31] audit: type=1400 audit(2289.180:24110): avc: denied { ioctl } for pid=15995 comm="syz.4.2694" path="socket:[36123]" dev="sockfs" ino=36123 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2290.884938][ T31] kauditd_printk_skb: 158 callbacks suppressed [ 2290.885268][ T31] audit: type=1400 audit(2290.820:24269): avc: denied { read open } for pid=16001 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2290.953981][ T31] audit: type=1400 audit(2290.890:24270): avc: denied { getattr } for pid=16001 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2291.144115][ T31] audit: type=1400 audit(2291.080:24271): avc: denied { search } for pid=16001 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2291.145768][ T31] audit: type=1400 audit(2291.080:24272): avc: denied { search } for pid=16001 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2291.146120][ T31] audit: type=1400 audit(2291.080:24273): avc: denied { search } for pid=16001 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2291.146510][ T31] audit: type=1400 audit(2291.080:24274): avc: denied { search } for pid=16001 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2291.151727][ T31] audit: type=1400 audit(2291.090:24275): avc: denied { search } for pid=16001 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2291.152223][ T31] audit: type=1400 audit(2291.090:24276): avc: denied { search } for pid=16001 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2291.152813][ T31] audit: type=1400 audit(2291.090:24277): avc: denied { search } for pid=16001 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2291.155640][ T31] audit: type=1400 audit(2291.090:24278): avc: denied { read open } for pid=16001 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.899249][ T31] kauditd_printk_skb: 257 callbacks suppressed [ 2295.900932][ T31] audit: type=1400 audit(2295.830:24536): avc: denied { read open } for pid=16013 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.906953][ T31] audit: type=1400 audit(2295.840:24537): avc: denied { getattr } for pid=16013 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.934114][ T31] audit: type=1400 audit(2295.870:24538): avc: denied { search } for pid=16013 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.935805][ T31] audit: type=1400 audit(2295.870:24539): avc: denied { search } for pid=16013 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.937316][ T31] audit: type=1400 audit(2295.870:24540): avc: denied { search } for pid=16013 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.942931][ T31] audit: type=1400 audit(2295.870:24541): avc: denied { search } for pid=16013 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2295.995984][ T31] audit: type=1400 audit(2295.930:24542): avc: denied { search } for pid=16011 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2296.009925][ T31] audit: type=1400 audit(2295.950:24543): avc: denied { search } for pid=16011 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2296.011526][ T31] audit: type=1400 audit(2295.950:24544): avc: denied { search } for pid=16011 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2296.016203][ T31] audit: type=1400 audit(2295.950:24545): avc: denied { search } for pid=16011 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2299.524588][T16025] trusted_key: encrypted_key: insufficient parameters specified [ 2301.004472][ T31] kauditd_printk_skb: 293 callbacks suppressed [ 2301.005585][ T31] audit: type=1400 audit(2300.940:24839): avc: denied { search } for pid=16027 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2301.021172][ T31] audit: type=1400 audit(2300.960:24840): avc: denied { read } for pid=16027 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2301.022882][ T31] audit: type=1400 audit(2300.960:24841): avc: denied { read open } for pid=16027 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2301.029302][ T31] audit: type=1400 audit(2300.960:24842): avc: denied { search } for pid=16027 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2301.050247][ T31] audit: type=1400 audit(2300.990:24843): avc: denied { search } for pid=16027 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2301.052662][ T31] audit: type=1400 audit(2300.990:24844): avc: denied { search } for pid=16027 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2301.057949][ T31] audit: type=1400 audit(2300.990:24845): avc: denied { read } for pid=16027 comm="cmp" name="resolv.conf.eth11.link" dev="tmpfs" ino=99 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2301.064157][ T31] audit: type=1400 audit(2301.000:24846): avc: denied { read open } for pid=16027 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth11.link" dev="tmpfs" ino=99 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2301.071338][ T31] audit: type=1400 audit(2301.010:24847): avc: denied { getattr } for pid=16027 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2301.076999][ T31] audit: type=1400 audit(2301.010:24848): avc: denied { getattr } for pid=16027 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth11.link" dev="tmpfs" ino=99 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2306.269252][ T31] kauditd_printk_skb: 292 callbacks suppressed [ 2306.269533][ T31] audit: type=1400 audit(2306.200:25141): avc: denied { search } for pid=16041 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2306.269754][ T31] audit: type=1400 audit(2306.200:25142): avc: denied { search } for pid=16041 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2306.276673][ T31] audit: type=1400 audit(2306.210:25143): avc: denied { search } for pid=16041 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2306.382051][ T31] audit: type=1400 audit(2306.320:25144): avc: denied { search } for pid=16032 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2307.477030][ T31] audit: type=1400 audit(2307.410:25145): avc: denied { write } for pid=16044 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2307.512945][ T31] audit: type=1400 audit(2307.450:25146): avc: denied { write open } for pid=16044 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2308.507709][ T31] audit: type=1400 audit(2308.440:25147): avc: denied { write } for pid=16045 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2308.523195][ T31] audit: type=1400 audit(2308.460:25148): avc: denied { write open } for pid=16045 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2309.796246][ T31] audit: type=1400 audit(2309.730:25149): avc: denied { write } for pid=16046 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2309.821793][ T31] audit: type=1400 audit(2309.760:25150): avc: denied { write open } for pid=16046 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2311.710240][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 2311.710454][ T31] audit: type=1400 audit(2311.650:25156): avc: denied { write } for pid=16052 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2311.712349][ T31] audit: type=1400 audit(2311.650:25157): avc: denied { write open } for pid=16052 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2314.632868][ T31] audit: type=1400 audit(2314.570:25158): avc: denied { write } for pid=16056 comm="syz.3.2702" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2314.635443][ T31] audit: type=1400 audit(2314.570:25159): avc: denied { write open } for pid=16056 comm="syz.3.2702" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2314.646618][ T31] audit: type=1400 audit(2314.580:25160): avc: denied { ioctl } for pid=16056 comm="syz.3.2702" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2314.877525][ T31] audit: type=1400 audit(2314.810:25161): avc: denied { create } for pid=16062 comm="syz.3.2703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2314.884217][ T31] audit: type=1400 audit(2314.820:25162): avc: denied { bind } for pid=16062 comm="syz.3.2703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2316.199342][ T31] audit: type=1400 audit(2316.080:25163): avc: denied { write } for pid=16064 comm="syz.3.2704" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2316.199656][ T31] audit: type=1400 audit(2316.110:25164): avc: denied { write open } for pid=16064 comm="syz.3.2704" path="/dev/snd/seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2316.199895][ T31] audit: type=1400 audit(2316.110:25165): avc: denied { ioctl } for pid=16064 comm="syz.3.2704" path="/dev/snd/seq" dev="devtmpfs" ino=719 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2320.197604][ T31] audit: type=1400 audit(2320.130:25166): avc: denied { module_request } for pid=16072 comm="syz.4.2705" kmod="tcp_O" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2320.827153][ T31] audit: type=1400 audit(2320.760:25167): avc: denied { prog_load } for pid=16076 comm="syz.4.2706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2320.838252][ T31] audit: type=1400 audit(2320.770:25168): avc: denied { write } for pid=16075 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2320.844846][ T31] audit: type=1400 audit(2320.780:25169): avc: denied { bpf } for pid=16076 comm="syz.4.2706" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2320.855736][ T31] audit: type=1400 audit(2320.790:25170): avc: denied { write open } for pid=16075 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2320.868735][ T31] audit: type=1400 audit(2320.800:25171): avc: denied { perfmon } for pid=16076 comm="syz.4.2706" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2320.933443][ T31] audit: type=1400 audit(2320.870:25172): avc: denied { execmem } for pid=16076 comm="syz.4.2706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2320.941156][ T31] audit: type=1400 audit(2320.880:25173): avc: denied { search } for pid=16075 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2320.943539][ T31] audit: type=1400 audit(2320.880:25174): avc: denied { search } for pid=16075 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2320.943834][ T31] audit: type=1400 audit(2320.880:25175): avc: denied { search } for pid=16075 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2325.577410][ T31] kauditd_printk_skb: 495 callbacks suppressed [ 2325.577860][ T31] audit: type=1400 audit(2325.510:25671): avc: denied { search } for pid=16086 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2325.601220][ T31] audit: type=1400 audit(2325.540:25672): avc: denied { read } for pid=16086 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2325.604886][ T31] audit: type=1400 audit(2325.540:25673): avc: denied { read open } for pid=16086 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2325.624277][ T31] audit: type=1400 audit(2325.560:25674): avc: denied { search } for pid=16086 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2325.625836][ T31] audit: type=1400 audit(2325.560:25675): avc: denied { search } for pid=16086 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2325.627207][ T31] audit: type=1400 audit(2325.560:25676): avc: denied { search } for pid=16086 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2325.628558][ T31] audit: type=1400 audit(2325.560:25677): avc: denied { read } for pid=16086 comm="cmp" name="resolv.conf.eth11.ipv4ll" dev="tmpfs" ino=102 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2325.629965][ T31] audit: type=1400 audit(2325.560:25678): avc: denied { read open } for pid=16086 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth11.ipv4ll" dev="tmpfs" ino=102 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2325.632555][ T31] audit: type=1400 audit(2325.560:25679): avc: denied { getattr } for pid=16086 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2325.635786][ T31] audit: type=1400 audit(2325.560:25680): avc: denied { getattr } for pid=16086 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth11.ipv4ll" dev="tmpfs" ino=102 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2331.303321][ T31] kauditd_printk_skb: 314 callbacks suppressed [ 2331.304322][ T31] audit: type=1400 audit(2330.830:25995): avc: denied { prog_load } for pid=16109 comm="syz.3.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2331.305832][ T31] audit: type=1400 audit(2330.850:25996): avc: denied { bpf } for pid=16109 comm="syz.3.2713" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.307311][ T31] audit: type=1400 audit(2330.900:25997): avc: denied { perfmon } for pid=16109 comm="syz.3.2713" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.309781][ T31] audit: type=1400 audit(2330.930:25998): avc: denied { perfmon } for pid=16109 comm="syz.3.2713" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.311462][ T31] audit: type=1400 audit(2330.950:25999): avc: denied { perfmon } for pid=16109 comm="syz.3.2713" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.314213][ T31] audit: type=1400 audit(2330.980:26000): avc: denied { perfmon } for pid=16109 comm="syz.3.2713" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.315981][ T31] audit: type=1400 audit(2331.010:26001): avc: denied { bpf } for pid=16109 comm="syz.3.2713" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.317780][ T31] audit: type=1400 audit(2331.040:26002): avc: denied { bpf } for pid=16109 comm="syz.3.2713" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.320285][ T31] audit: type=1400 audit(2331.070:26003): avc: denied { perfmon } for pid=16109 comm="syz.3.2713" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.322481][ T31] audit: type=1400 audit(2331.100:26004): avc: denied { bpf } for pid=16109 comm="syz.3.2713" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2332.219129][T16116] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2713'. [ 2336.905693][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 2336.906008][ T31] audit: type=1400 audit(2336.840:26066): avc: denied { search } for pid=16118 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2336.906228][ T31] audit: type=1400 audit(2336.840:26067): avc: denied { search } for pid=16118 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2336.906454][ T31] audit: type=1400 audit(2336.840:26068): avc: denied { search } for pid=16118 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2336.906641][ T31] audit: type=1400 audit(2336.840:26069): avc: denied { search } for pid=16118 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2336.916819][ T31] audit: type=1400 audit(2336.850:26070): avc: denied { search } for pid=16118 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2336.918350][ T31] audit: type=1400 audit(2336.850:26071): avc: denied { search } for pid=16118 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2336.920215][ T31] audit: type=1400 audit(2336.850:26072): avc: denied { search } for pid=16118 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2336.932919][ T31] audit: type=1400 audit(2336.870:26073): avc: denied { read open } for pid=16118 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2336.935968][ T31] audit: type=1400 audit(2336.870:26074): avc: denied { getattr } for pid=16118 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2337.909114][ T31] audit: type=1400 audit(2337.840:26075): avc: denied { search } for pid=16118 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2339.812437][T16128] can0: slcan on ttyS3. [ 2339.979836][T16128] can0 (unregistered): slcan off ttyS3. [ 2339.981122][T16128] Falling back ldisc for ttyS3. [ 2340.407967][T16140] netlink: 'syz.3.2720': attribute type 15 has an invalid length. [ 2340.419327][T16140] netlink: 24 bytes leftover after parsing attributes in process `syz.3.2720'. [ 2342.100903][ T31] kauditd_printk_skb: 264 callbacks suppressed [ 2342.101922][ T31] audit: type=1400 audit(2342.030:26340): avc: denied { write } for pid=16142 comm="syz.3.2721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2342.262153][ T31] audit: type=1400 audit(2342.200:26341): avc: denied { sys_module } for pid=16142 comm="syz.3.2721" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2342.280520][ T31] audit: type=1400 audit(2342.210:26342): avc: denied { module_request } for pid=16142 comm="syz.3.2721" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2342.693418][ T31] audit: type=1400 audit(2342.620:26343): avc: denied { search } for pid=16150 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2342.695459][ T31] audit: type=1400 audit(2342.620:26344): avc: denied { search } for pid=16150 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2342.697312][ T31] audit: type=1400 audit(2342.630:26345): avc: denied { search } for pid=16150 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2343.347969][ T31] audit: type=1400 audit(2343.280:26346): avc: denied { search } for pid=16117 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2343.630698][ T31] audit: type=1400 audit(2343.550:26347): avc: denied { read write } for pid=16156 comm="syz.3.2723" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2343.631042][ T31] audit: type=1400 audit(2343.560:26348): avc: denied { read write open } for pid=16156 comm="syz.3.2723" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2343.631356][ T31] audit: type=1400 audit(2343.560:26349): avc: denied { create } for pid=16156 comm="syz.3.2723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2345.185091][T16170] netlink: 'syz.3.2726': attribute type 1 has an invalid length. [ 2345.242668][T16170] 8021q: adding VLAN 0 to HW filter on device bond1 [ 2345.250747][T16170] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2726'. [ 2345.256829][T16170] bond1 (unregistering): Released all slaves [ 2349.417464][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 2349.417677][ T31] audit: type=1400 audit(2349.350:26397): avc: denied { name_bind } for pid=16246 comm="syz.3.2730" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 2353.204889][ T31] audit: type=1400 audit(2353.140:26398): avc: denied { read } for pid=16251 comm="syz.4.2731" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2353.220674][ T31] audit: type=1400 audit(2353.160:26399): avc: denied { read open } for pid=16251 comm="syz.4.2731" path="net:[4026532648]" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2353.228036][ T31] audit: type=1400 audit(2353.160:26400): avc: denied { create } for pid=16251 comm="syz.4.2731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2353.249720][ T31] audit: type=1400 audit(2353.190:26401): avc: denied { create } for pid=16251 comm="syz.4.2731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2353.255376][ T31] audit: type=1400 audit(2353.190:26402): avc: denied { write } for pid=16251 comm="syz.4.2731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2353.264579][ T31] audit: type=1400 audit(2353.200:26403): avc: denied { module_request } for pid=16251 comm="syz.4.2731" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2353.538176][ T31] audit: type=1400 audit(2353.470:26404): avc: denied { read } for pid=16251 comm="syz.4.2731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2353.548023][ T31] audit: type=1400 audit(2353.480:26405): avc: denied { write } for pid=16251 comm="syz.4.2731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2354.034964][ T31] audit: type=1400 audit(2353.970:26406): avc: denied { prog_load } for pid=16256 comm="syz.4.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2356.480886][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 2356.481229][ T31] audit: type=1400 audit(2356.420:26429): avc: denied { module_request } for pid=16261 comm="syz.3.2735" kmod="tcp_" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2356.634068][ T31] audit: type=1400 audit(2356.570:26430): avc: denied { read } for pid=16256 comm="syz.4.2733" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2356.664705][ T31] audit: type=1400 audit(2356.600:26431): avc: denied { read open } for pid=16256 comm="syz.4.2733" path="net:[4026532648]" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2356.684490][ T31] audit: type=1400 audit(2356.620:26432): avc: denied { create } for pid=16256 comm="syz.4.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2356.714088][ T31] audit: type=1400 audit(2356.650:26433): avc: denied { create } for pid=16256 comm="syz.4.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2356.726333][ T31] audit: type=1400 audit(2356.660:26434): avc: denied { write } for pid=16256 comm="syz.4.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2356.746151][ T31] audit: type=1400 audit(2356.680:26435): avc: denied { module_request } for pid=16256 comm="syz.4.2733" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2357.033788][ T31] audit: type=1400 audit(2356.970:26436): avc: denied { read } for pid=16256 comm="syz.4.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2357.054551][ T31] audit: type=1400 audit(2356.990:26437): avc: denied { create } for pid=16256 comm="syz.4.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2357.073732][ T31] audit: type=1400 audit(2357.010:26438): avc: denied { write } for pid=16256 comm="syz.4.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2368.456387][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 2368.456714][ T31] audit: type=1400 audit(2368.390:26440): avc: denied { create } for pid=16271 comm="syz.4.2737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2368.569093][ T31] audit: type=1400 audit(2368.490:26441): avc: denied { write } for pid=16271 comm="syz.4.2737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2368.578249][ T31] audit: type=1400 audit(2368.510:26442): avc: denied { read } for pid=16271 comm="syz.4.2737" path="socket:[36322]" dev="sockfs" ino=36322 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2368.612484][ T31] audit: type=1400 audit(2368.550:26443): avc: denied { read } for pid=16271 comm="syz.4.2737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2370.005902][ T31] audit: type=1400 audit(2369.940:26444): avc: denied { execmem } for pid=16275 comm="syz.3.2738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2372.488240][ T31] audit: type=1400 audit(2372.420:26445): avc: denied { module_request } for pid=16275 comm="syz.3.2738" kmod="fs-ceph" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2372.721949][ T31] audit: type=1400 audit(2372.660:26446): avc: denied { map_create } for pid=16275 comm="syz.3.2738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2372.727366][ T31] audit: type=1400 audit(2372.660:26447): avc: denied { perfmon } for pid=16275 comm="syz.3.2738" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2372.733164][ T31] audit: type=1400 audit(2372.660:26448): avc: denied { map_read map_write } for pid=16275 comm="syz.3.2738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2372.753848][ T31] audit: type=1400 audit(2372.690:26449): avc: denied { map_create } for pid=16275 comm="syz.3.2738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2375.710508][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 2375.711559][ T31] audit: type=1400 audit(2375.650:26451): avc: denied { read } for pid=16280 comm="syz.4.2739" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2375.721953][ T31] audit: type=1400 audit(2375.660:26452): avc: denied { read open } for pid=16280 comm="syz.4.2739" path="net:[4026532648]" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2375.729450][ T31] audit: type=1400 audit(2375.670:26453): avc: denied { create } for pid=16280 comm="syz.4.2739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2375.750774][ T31] audit: type=1400 audit(2375.690:26454): avc: denied { execmem } for pid=16280 comm="syz.4.2739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2378.009322][ T31] audit: type=1400 audit(2377.940:26455): avc: denied { read } for pid=16280 comm="syz.4.2739" name="card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2378.034854][ T31] audit: type=1400 audit(2377.970:26456): avc: denied { read open } for pid=16280 comm="syz.4.2739" path="/dev/dri/card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2378.063929][ T31] audit: type=1400 audit(2378.000:26457): avc: denied { ioctl } for pid=16280 comm="syz.4.2739" path="/dev/dri/card0" dev="devtmpfs" ino=613 ioctlcmd=0x641f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2379.009625][ T31] audit: type=1400 audit(2378.950:26458): avc: denied { read } for pid=16284 comm="syz.3.2740" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2379.012918][ T31] audit: type=1400 audit(2378.950:26459): avc: denied { read open } for pid=16284 comm="syz.3.2740" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2379.042193][ T31] audit: type=1400 audit(2378.980:26460): avc: denied { ioctl } for pid=16284 comm="syz.3.2740" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2384.995629][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 2384.995908][ T31] audit: type=1400 audit(2384.930:26489): avc: denied { module_request } for pid=16290 comm="syz.4.2742" kmod="fs-ceph" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2385.456947][ T31] audit: type=1400 audit(2385.390:26490): avc: denied { prog_load } for pid=16293 comm="syz.4.2743" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2385.461363][ T31] audit: type=1400 audit(2385.400:26491): avc: denied { bpf } for pid=16293 comm="syz.4.2743" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.464387][ T31] audit: type=1400 audit(2385.400:26492): avc: denied { perfmon } for pid=16293 comm="syz.4.2743" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.471354][ T31] audit: type=1400 audit(2385.410:26493): avc: denied { perfmon } for pid=16293 comm="syz.4.2743" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.474549][ T31] audit: type=1400 audit(2385.410:26494): avc: denied { perfmon } for pid=16293 comm="syz.4.2743" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.477262][ T31] audit: type=1400 audit(2385.410:26495): avc: denied { perfmon } for pid=16293 comm="syz.4.2743" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.487434][ T31] audit: type=1400 audit(2385.420:26496): avc: denied { perfmon } for pid=16293 comm="syz.4.2743" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.500621][ T31] audit: type=1400 audit(2385.430:26497): avc: denied { bpf } for pid=16293 comm="syz.4.2743" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2385.500830][ T31] audit: type=1400 audit(2385.430:26498): avc: denied { bpf } for pid=16293 comm="syz.4.2743" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2392.289667][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 2392.297552][ T31] audit: type=1400 audit(2392.220:26545): avc: denied { name_bind } for pid=16297 comm="syz.3.2744" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2392.301697][ T31] audit: type=1400 audit(2392.220:26546): avc: denied { node_bind } for pid=16297 comm="syz.3.2744" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2401.001070][ T31] audit: type=1326 audit(2400.940:26547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.4.2745" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2401.003632][ T31] audit: type=1326 audit(2400.940:26548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.4.2745" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2401.005686][ T31] audit: type=1326 audit(2400.940:26549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.4.2745" exe="/syz-executor" sig=0 arch=40000028 syscall=39 compat=0 ip=0x132510 code=0x7ffc0000 [ 2401.011379][ T31] audit: type=1326 audit(2400.950:26550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.4.2745" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2401.013230][ T31] audit: type=1326 audit(2400.950:26551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.4.2745" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2401.015065][ T31] audit: type=1326 audit(2400.950:26552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.4.2745" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2401.018858][ T31] audit: type=1326 audit(2400.950:26553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.4.2745" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2401.030917][ T31] audit: type=1326 audit(2400.970:26554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.4.2745" exe="/syz-executor" sig=0 arch=40000028 syscall=40 compat=0 ip=0x132510 code=0x7ffc0000 [ 2401.033947][ T31] audit: type=1326 audit(2400.970:26555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.4.2745" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2401.035067][ T31] audit: type=1326 audit(2400.970:26556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.4.2745" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 2407.833223][T16333] wg1: entered promiscuous mode [ 2407.840384][T16333] wg1: entered allmulticast mode [ 2407.939867][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 2407.948176][ T31] audit: type=1400 audit(2407.880:26587): avc: denied { read write } for pid=16332 comm="syz.3.2750" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2407.967139][ T31] audit: type=1400 audit(2407.900:26588): avc: denied { read write open } for pid=16332 comm="syz.3.2750" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2408.239600][ T31] audit: type=1400 audit(2408.150:26589): avc: denied { module_request } for pid=16335 comm="syz.3.2751" kmod="fs-udf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2408.537250][ T31] audit: type=1400 audit(2408.470:26590): avc: denied { prog_load } for pid=16335 comm="syz.3.2751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2408.541319][ T31] audit: type=1400 audit(2408.480:26591): avc: denied { bpf } for pid=16335 comm="syz.3.2751" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2408.544466][ T31] audit: type=1400 audit(2408.480:26592): avc: denied { perfmon } for pid=16335 comm="syz.3.2751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2408.550371][ T31] audit: type=1400 audit(2408.490:26593): avc: denied { perfmon } for pid=16335 comm="syz.3.2751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2408.553620][ T31] audit: type=1400 audit(2408.490:26594): avc: denied { perfmon } for pid=16335 comm="syz.3.2751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2408.557435][ T31] audit: type=1400 audit(2408.490:26595): avc: denied { perfmon } for pid=16335 comm="syz.3.2751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2408.564254][ T31] audit: type=1400 audit(2408.500:26596): avc: denied { perfmon } for pid=16335 comm="syz.3.2751" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2408.970430][T16341] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2408.973155][T16341] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2417.769120][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 2417.770528][ T31] audit: type=1400 audit(2417.700:26623): avc: denied { create } for pid=16348 comm="syz.4.2755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2417.775274][ T31] audit: type=1400 audit(2417.710:26624): avc: denied { write } for pid=16348 comm="syz.4.2755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2418.011693][ T31] audit: type=1400 audit(2417.950:26625): avc: denied { allowed } for pid=16352 comm="syz.4.2757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2418.022527][ T31] audit: type=1400 audit(2417.960:26626): avc: denied { create } for pid=16352 comm="syz.4.2757" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2418.153843][ T31] audit: type=1400 audit(2418.090:26627): avc: denied { execmem } for pid=16354 comm="syz.4.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2420.372953][ T31] audit: type=1400 audit(2420.310:26628): avc: denied { map_create } for pid=16354 comm="syz.4.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2420.385329][ T31] audit: type=1400 audit(2420.320:26629): avc: denied { prog_load } for pid=16354 comm="syz.4.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2420.386758][ T31] audit: type=1400 audit(2420.320:26630): avc: denied { bpf } for pid=16354 comm="syz.4.2758" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2420.388162][ T31] audit: type=1400 audit(2420.320:26631): avc: denied { perfmon } for pid=16354 comm="syz.4.2758" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2420.418907][ T31] audit: type=1400 audit(2420.350:26632): avc: denied { perfmon } for pid=16354 comm="syz.4.2758" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2426.042529][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 2426.042857][ T31] audit: type=1400 audit(2425.980:26658): avc: denied { map_create } for pid=16374 comm="syz.3.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2426.276427][T16377] syz.3.2764 (16377): drop_caches: 2 [ 2426.296004][T16377] syz.3.2764 (16377): drop_caches: 2 [ 2430.781387][ T31] audit: type=1400 audit(2430.720:26659): avc: denied { create } for pid=16382 comm="syz.4.2767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2430.794251][ T31] audit: type=1400 audit(2430.730:26660): avc: denied { write } for pid=16382 comm="syz.4.2767" path="socket:[35674]" dev="sockfs" ino=35674 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2430.802579][ T31] audit: type=1400 audit(2430.740:26661): avc: denied { write } for pid=16382 comm="syz.4.2767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2430.957320][ T31] audit: type=1400 audit(2430.890:26662): avc: denied { create } for pid=16384 comm="syz.4.2768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2430.972637][ T31] audit: type=1400 audit(2430.910:26663): avc: denied { bind } for pid=16384 comm="syz.4.2768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2430.976707][ T31] audit: type=1400 audit(2430.910:26664): avc: denied { module_request } for pid=16384 comm="syz.4.2768" kmod="crypto-cts(cbc(aes))" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2431.280323][ T31] audit: type=1400 audit(2431.220:26665): avc: denied { module_request } for pid=16384 comm="syz.4.2768" kmod="crypto-cts(cbc(aes))-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2431.492043][ T31] audit: type=1400 audit(2431.430:26666): avc: denied { accept } for pid=16384 comm="syz.4.2768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2431.517054][ T31] audit: type=1400 audit(2431.450:26667): avc: denied { setopt } for pid=16384 comm="syz.4.2768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2431.731920][ T31] audit: type=1400 audit(2431.670:26668): avc: denied { read } for pid=16390 comm="syz.4.2769" name="card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2431.735948][ T31] audit: type=1400 audit(2431.670:26669): avc: denied { read open } for pid=16390 comm="syz.4.2769" path="/dev/dri/card0" dev="devtmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2431.757719][ T31] audit: type=1400 audit(2431.690:26670): avc: denied { ioctl } for pid=16390 comm="syz.4.2769" path="/dev/dri/card0" dev="devtmpfs" ino=613 ioctlcmd=0x641f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2431.942716][ T31] audit: type=1400 audit(2431.880:26671): avc: denied { mounton } for pid=16392 comm="syz.4.2770" path="/36/file0" dev="tmpfs" ino=199 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2431.956620][ T31] audit: type=1400 audit(2431.890:26672): avc: denied { mount } for pid=16392 comm="syz.4.2770" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2432.027844][ T31] audit: type=1400 audit(2431.960:26673): avc: denied { unmount } for pid=15550 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 2432.215225][ T31] audit: type=1400 audit(2432.150:26674): avc: denied { read } for pid=16394 comm="syz.4.2771" dev="nsfs" ino=4026532648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2436.833623][ T31] kauditd_printk_skb: 42 callbacks suppressed [ 2436.833916][ T31] audit: type=1400 audit(2436.770:26717): avc: denied { read write } for pid=16423 comm="syz.4.2782" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2436.836800][ T31] audit: type=1400 audit(2436.770:26718): avc: denied { read write open } for pid=16423 comm="syz.4.2782" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2436.842818][ T31] audit: type=1400 audit(2436.780:26719): avc: denied { ioctl } for pid=16423 comm="syz.4.2782" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2436.853896][ T31] audit: type=1400 audit(2436.780:26720): avc: denied { ioctl } for pid=16423 comm="syz.4.2782" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2436.854455][T16424] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2436.855192][T16424] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2437.051843][ T31] audit: type=1400 audit(2436.990:26721): avc: denied { map_create } for pid=16427 comm="syz.4.2783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2437.229266][ T31] audit: type=1400 audit(2437.160:26722): avc: denied { create } for pid=16420 comm="syz.3.2781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2437.256196][ T31] audit: type=1400 audit(2437.190:26723): avc: denied { bpf } for pid=16420 comm="syz.3.2781" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2437.497065][ T31] audit: type=1400 audit(2437.430:26724): avc: denied { write } for pid=16428 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2437.500999][ T31] audit: type=1400 audit(2437.440:26725): avc: denied { write open } for pid=16428 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2437.536519][ T31] audit: type=1400 audit(2437.470:26726): avc: denied { search } for pid=16428 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2449.052717][ T31] kauditd_printk_skb: 274 callbacks suppressed [ 2449.052954][ T31] audit: type=1400 audit(2448.990:27001): avc: denied { create } for pid=16443 comm="syz.3.2787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2449.073244][ T31] audit: type=1400 audit(2449.010:27002): avc: denied { setopt } for pid=16443 comm="syz.3.2787" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2449.085700][ T31] audit: type=1400 audit(2449.020:27003): avc: denied { setopt } for pid=16443 comm="syz.3.2787" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2449.246327][ T31] audit: type=1400 audit(2449.180:27004): avc: denied { map_create } for pid=16445 comm="syz.3.2788" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2449.484885][ T31] audit: type=1400 audit(2449.420:27005): avc: denied { create } for pid=16449 comm="syz.3.2790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2449.491546][ T31] audit: type=1400 audit(2449.430:27006): avc: denied { write } for pid=16449 comm="syz.3.2790" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2449.625215][ T31] audit: type=1400 audit(2449.560:27007): avc: denied { execmem } for pid=16451 comm="syz.3.2791" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2451.785967][ T31] audit: type=1400 audit(2451.720:27008): avc: denied { read write } for pid=16454 comm="syz.4.2792" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2451.797235][ T31] audit: type=1400 audit(2451.730:27009): avc: denied { read write open } for pid=16454 comm="syz.4.2792" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2451.813256][ T31] audit: type=1400 audit(2451.750:27010): avc: denied { mounton } for pid=16454 comm="syz.4.2792" path="/49/file0" dev="tmpfs" ino=266 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2452.733379][T16461] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2452.736761][T16461] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2459.710039][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 2459.710973][ T31] audit: type=1400 audit(2459.650:27022): avc: denied { module_request } for pid=16474 comm="syz.3.2798" kmod="fs-iso9660" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2460.259552][T16480] netlink: 2 bytes leftover after parsing attributes in process `syz.3.2800'. [ 2460.515649][ T31] audit: type=1400 audit(2460.450:27023): avc: denied { append } for pid=16483 comm="syz.3.2802" name="midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2460.518187][ T31] audit: type=1400 audit(2460.450:27024): avc: denied { append open } for pid=16483 comm="syz.3.2802" path="/dev/midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2460.673999][ T31] audit: type=1400 audit(2460.610:27025): avc: denied { name_bind } for pid=16485 comm="syz.3.2803" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2460.676768][ T31] audit: type=1400 audit(2460.610:27026): avc: denied { node_bind } for pid=16485 comm="syz.3.2803" saddr=::ffff:172.20.20.21 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2461.051461][ T31] audit: type=1400 audit(2460.990:27027): avc: denied { read } for pid=16489 comm="syz.3.2805" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2461.055795][ T31] audit: type=1400 audit(2460.990:27028): avc: denied { read open } for pid=16489 comm="syz.3.2805" path="/dev/ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2461.075360][ T31] audit: type=1400 audit(2461.000:27029): avc: denied { create } for pid=16489 comm="syz.3.2805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2461.075751][ T31] audit: type=1400 audit(2461.010:27030): avc: denied { create } for pid=16489 comm="syz.3.2805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2461.089017][ T31] audit: type=1400 audit(2461.020:27031): avc: denied { prog_load } for pid=16489 comm="syz.3.2805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2461.111060][T16490] syz_tun: entered allmulticast mode [ 2461.253915][T16489] syz_tun: left allmulticast mode [ 2465.845052][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 2465.848797][ T31] audit: type=1400 audit(2465.770:27093): avc: denied { execmem } for pid=16509 comm="syz.3.2814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2467.749100][ T31] audit: type=1400 audit(2467.680:27094): avc: denied { allowed } for pid=16500 comm="syz.4.2811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2467.939285][ T31] audit: type=1400 audit(2467.860:27095): avc: denied { create } for pid=16500 comm="syz.4.2811" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2467.941658][ T31] audit: type=1400 audit(2467.870:27096): avc: denied { map } for pid=16500 comm="syz.4.2811" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36907 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2467.949958][ T31] audit: type=1400 audit(2467.890:27097): avc: denied { read write } for pid=16500 comm="syz.4.2811" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36907 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2467.963574][ T31] audit: type=1400 audit(2467.900:27098): avc: denied { map } for pid=16500 comm="syz.4.2811" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36907 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2467.967799][ T31] audit: type=1400 audit(2467.900:27099): avc: denied { read write } for pid=16500 comm="syz.4.2811" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36907 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2468.395416][ T31] audit: type=1400 audit(2468.330:27100): avc: denied { create } for pid=16512 comm="syz.4.2815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 2468.397461][ T31] audit: type=1400 audit(2468.330:27101): avc: denied { module_request } for pid=16512 comm="syz.4.2815" kmod="net-pf-10-proto-132-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2469.024936][ T31] audit: type=1400 audit(2468.960:27102): avc: denied { module_request } for pid=16512 comm="syz.4.2815" kmod="net-pf-10-proto-132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2471.445732][ T31] audit: type=1400 audit(2471.380:27103): avc: denied { read write } for pid=16521 comm="syz.4.2817" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2471.457868][ T31] audit: type=1400 audit(2471.390:27104): avc: denied { read write open } for pid=16521 comm="syz.4.2817" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2471.458193][ T31] audit: type=1400 audit(2471.390:27105): avc: denied { create } for pid=16521 comm="syz.4.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2471.622673][ T31] audit: type=1400 audit(2471.540:27106): avc: denied { bind } for pid=16521 comm="syz.4.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2471.691013][ T31] audit: type=1400 audit(2471.630:27107): avc: denied { module_request } for pid=16521 comm="syz.4.2817" kmod="crypto-cbc-camellia-aesni" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2472.010585][ T31] audit: type=1400 audit(2471.950:27108): avc: denied { write } for pid=16521 comm="syz.4.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2472.017022][ T31] audit: type=1400 audit(2471.950:27109): avc: denied { setopt } for pid=16521 comm="syz.4.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2472.041187][ T31] audit: type=1400 audit(2471.980:27110): avc: denied { accept } for pid=16521 comm="syz.4.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2472.098393][ T31] audit: type=1400 audit(2472.030:27111): avc: denied { create } for pid=16521 comm="syz.4.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2472.116180][ T31] audit: type=1400 audit(2472.050:27112): avc: denied { create } for pid=16521 comm="syz.4.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2479.422329][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 2479.423337][ T31] audit: type=1400 audit(2479.360:27174): avc: denied { connect } for pid=16540 comm="syz.4.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2480.082765][ T31] audit: type=1400 audit(2480.020:27175): avc: denied { mount } for pid=16543 comm="syz.4.2822" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 2480.553027][ T31] audit: type=1400 audit(2480.490:27176): avc: denied { map_create } for pid=16545 comm="syz.4.2823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2480.555844][ T31] audit: type=1400 audit(2480.490:27177): avc: denied { bpf } for pid=16545 comm="syz.4.2823" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2480.576558][ T31] audit: type=1400 audit(2480.510:27178): avc: denied { map_read map_write } for pid=16545 comm="syz.4.2823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2480.617475][ T31] audit: type=1400 audit(2480.550:27179): avc: denied { map_create } for pid=16545 comm="syz.4.2823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2480.651011][ T31] audit: type=1400 audit(2480.590:27180): avc: denied { bpf } for pid=16545 comm="syz.4.2823" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2480.690752][ T31] audit: type=1400 audit(2480.630:27181): avc: denied { map_read map_write } for pid=16545 comm="syz.4.2823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2480.781280][ T31] audit: type=1400 audit(2480.710:27182): avc: denied { prog_load } for pid=16545 comm="syz.4.2823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2480.781668][ T31] audit: type=1400 audit(2480.710:27183): avc: denied { bpf } for pid=16545 comm="syz.4.2823" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2482.330568][T16553] netlink: 72 bytes leftover after parsing attributes in process `syz.4.2826'. [ 2484.219702][T16559] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2484.220558][T16559] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2484.659989][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 2484.669397][ T31] audit: type=1400 audit(2484.600:27209): avc: denied { create } for pid=16562 comm="syz.4.2830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2484.678110][ T31] audit: type=1400 audit(2484.610:27210): avc: denied { create } for pid=16562 comm="syz.4.2830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2484.684567][ T31] audit: type=1400 audit(2484.620:27211): avc: denied { write } for pid=16562 comm="syz.4.2830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2484.692946][ T31] audit: type=1400 audit(2484.630:27212): avc: denied { module_request } for pid=16562 comm="syz.4.2830" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2485.269091][ T31] audit: type=1400 audit(2485.200:27213): avc: denied { ioctl } for pid=16562 comm="syz.4.2830" path="socket:[36682]" dev="sockfs" ino=36682 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2485.287027][ T31] audit: type=1400 audit(2485.220:27214): avc: denied { module_request } for pid=16562 comm="syz.4.2830" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2485.319637][ T31] audit: type=1400 audit(2485.260:27215): avc: denied { read } for pid=16562 comm="syz.4.2830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2485.773260][ T31] audit: type=1400 audit(2485.710:27216): avc: denied { write } for pid=16562 comm="syz.4.2830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2485.837136][ T31] audit: type=1400 audit(2485.770:27217): avc: denied { sys_module } for pid=16562 comm="syz.4.2830" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2485.841942][ T31] audit: type=1400 audit(2485.780:27218): avc: denied { module_request } for pid=16562 comm="syz.4.2830" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2487.377747][T16573] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2833'. [ 2487.433777][T16573] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2487.461004][T16573] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2487.490426][T16573] bond0 (unregistering): Released all slaves [ 2489.161923][T16620] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2489.162616][T16620] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2489.784095][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2489.784398][ T31] audit: type=1400 audit(2489.720:27252): avc: denied { prog_load } for pid=16626 comm="syz.3.2841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2489.792442][ T31] audit: type=1400 audit(2489.730:27253): avc: denied { bpf } for pid=16626 comm="syz.3.2841" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2490.188226][ T31] audit: type=1400 audit(2490.120:27254): avc: denied { create } for pid=16624 comm="syz.4.2840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2490.189282][ T31] audit: type=1400 audit(2490.120:27255): avc: denied { module_request } for pid=16624 comm="syz.4.2840" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2490.743766][ T31] audit: type=1400 audit(2490.680:27256): avc: denied { create } for pid=16624 comm="syz.4.2840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 2490.774822][ T31] audit: type=1400 audit(2490.710:27257): avc: denied { module_request } for pid=16624 comm="syz.4.2840" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2490.964321][ T31] audit: type=1400 audit(2490.900:27258): avc: denied { prog_load } for pid=16628 comm="syz.3.2842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2490.972470][ T31] audit: type=1400 audit(2490.900:27259): avc: denied { bpf } for pid=16628 comm="syz.3.2842" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2490.972794][ T31] audit: type=1400 audit(2490.910:27260): avc: denied { perfmon } for pid=16628 comm="syz.3.2842" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2490.980342][ T31] audit: type=1400 audit(2490.920:27261): avc: denied { perfmon } for pid=16628 comm="syz.3.2842" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2495.060913][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 2495.061213][ T31] audit: type=1400 audit(2495.000:27286): avc: denied { prog_load } for pid=16641 comm="syz.3.2845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2495.065314][ T31] audit: type=1400 audit(2495.000:27287): avc: denied { bpf } for pid=16641 comm="syz.3.2845" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2495.089065][ T31] audit: type=1400 audit(2495.000:27288): avc: denied { perfmon } for pid=16641 comm="syz.3.2845" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2495.115152][ T31] audit: type=1400 audit(2495.050:27289): avc: denied { perfmon } for pid=16641 comm="syz.3.2845" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2495.123483][ T31] audit: type=1400 audit(2495.060:27290): avc: denied { perfmon } for pid=16641 comm="syz.3.2845" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2495.143012][ T31] audit: type=1400 audit(2495.080:27291): avc: denied { perfmon } for pid=16641 comm="syz.3.2845" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2495.153412][ T31] audit: type=1400 audit(2495.090:27292): avc: denied { perfmon } for pid=16641 comm="syz.3.2845" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2495.174748][ T31] audit: type=1400 audit(2495.110:27293): avc: denied { bpf } for pid=16641 comm="syz.3.2845" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2495.193078][ T31] audit: type=1400 audit(2495.130:27294): avc: denied { bpf } for pid=16641 comm="syz.3.2845" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2495.196921][ T31] audit: type=1400 audit(2495.130:27295): avc: denied { perfmon } for pid=16641 comm="syz.3.2845" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2500.070707][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 2500.070951][ T31] audit: type=1400 audit(2500.010:27348): avc: denied { write } for pid=16658 comm="syz.3.2852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2500.104425][ T31] audit: type=1400 audit(2500.040:27349): avc: denied { write } for pid=16658 comm="syz.3.2852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2500.106891][T16664] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2852'. [ 2500.321318][ T31] audit: type=1400 audit(2500.260:27350): avc: denied { prog_load } for pid=16666 comm="syz.4.2854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2500.337848][ T31] audit: type=1400 audit(2500.270:27351): avc: denied { bpf } for pid=16666 comm="syz.4.2854" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2500.347870][ T31] audit: type=1400 audit(2500.280:27352): avc: denied { perfmon } for pid=16666 comm="syz.4.2854" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2500.348129][ T31] audit: type=1400 audit(2500.280:27353): avc: denied { perfmon } for pid=16666 comm="syz.4.2854" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2500.348244][ T31] audit: type=1400 audit(2500.280:27354): avc: denied { perfmon } for pid=16666 comm="syz.4.2854" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2500.348641][ T31] audit: type=1400 audit(2500.280:27355): avc: denied { perfmon } for pid=16666 comm="syz.4.2854" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2500.348745][ T31] audit: type=1400 audit(2500.280:27356): avc: denied { bpf } for pid=16666 comm="syz.4.2854" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2500.366076][ T31] audit: type=1400 audit(2500.300:27357): avc: denied { bpf } for pid=16666 comm="syz.4.2854" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2500.939237][T16671] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2500.939927][T16671] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2501.253789][T16674] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2501.269763][T16674] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2505.103246][ T31] kauditd_printk_skb: 388 callbacks suppressed [ 2505.104327][ T31] audit: type=1400 audit(2505.040:27746): avc: denied { read } for pid=16679 comm="syz.3.2858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2505.113493][ T31] audit: type=1400 audit(2505.050:27747): avc: denied { read } for pid=16679 comm="syz.3.2858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2505.121746][ T31] audit: type=1400 audit(2505.060:27748): avc: denied { read } for pid=16679 comm="syz.3.2858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2505.149474][ T31] audit: type=1400 audit(2505.090:27749): avc: denied { read } for pid=16679 comm="syz.3.2858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2505.155554][ T31] audit: type=1400 audit(2505.090:27750): avc: denied { read } for pid=16679 comm="syz.3.2858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2505.169281][ T31] audit: type=1400 audit(2505.100:27751): avc: denied { read } for pid=16679 comm="syz.3.2858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2505.169617][ T31] audit: type=1400 audit(2505.100:27752): avc: denied { read } for pid=16679 comm="syz.3.2858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2505.169812][ T31] audit: type=1400 audit(2505.100:27753): avc: denied { read } for pid=16679 comm="syz.3.2858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2505.185839][ T31] audit: type=1400 audit(2505.120:27754): avc: denied { read } for pid=16679 comm="syz.3.2858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2505.191477][ T31] audit: type=1400 audit(2505.130:27755): avc: denied { read } for pid=16679 comm="syz.3.2858" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2506.791686][T16700] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2506.792254][T16700] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2507.275913][T16706] comedi comedi3: comedi_test: 20263 microvolt, 5 microsecond waveform attached [ 2508.801622][T16716] genirq: Flags mismatch irq 31. 00200001 (comedi_parport) vs. 00200081 (virtio0) [ 2508.829957][T16716] 8<--- cut here --- [ 2508.830115][T16716] Unable to handle kernel paging request at virtual address fee04f27 when write [ 2508.830253][T16716] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 2508.831271][T16716] Internal error: Oops: a06 [#1] SMP ARM [ 2508.833545][T16716] Modules linked in: [ 2508.833988][T16716] CPU: 1 UID: 0 PID: 16716 Comm: syz.3.2870 Not tainted syzkaller #0 PREEMPT [ 2508.834342][T16716] Hardware name: ARM-Versatile Express [ 2508.834584][T16716] PC is at parport_attach+0x174/0x1d0 [ 2508.834845][T16716] LR is at parport_attach+0x164/0x1d0 [ 2508.835084][T16716] pc : [<813bbc28>] lr : [<813bbc18>] psr: 60000113 [ 2508.835918][T16716] sp : dfa8dd30 ip : dfa8dd30 fp : dfa8dd54 [ 2508.836172][T16716] r10: 82b16f28 r9 : 00000003 r8 : 8416b6c0 [ 2508.836920][T16716] r7 : dfa8dd90 r6 : 8416b6c0 r5 : 00000000 r4 : 00000000 [ 2508.837433][T16716] r3 : fee04f27 r2 : 81e16b04 r1 : 00000001 r0 : 813bb898 [ 2508.837999][T16716] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 2508.838419][T16716] Control: 30c5387d Table: 84995ac0 DAC: 00000000 [ 2508.839041][T16716] Register r0 information: non-slab/vmalloc memory [ 2508.839913][T16716] Register r1 information: non-paged memory [ 2508.840243][T16716] Register r2 information: non-slab/vmalloc memory [ 2508.840530][T16716] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 2508.841758][T16716] Register r4 information: NULL pointer [ 2508.842229][T16716] Register r5 information: NULL pointer [ 2508.842637][T16716] Register r6 information: slab kmalloc-192 start 8416b6c0 pointer offset 0 size 192 [ 2508.843609][T16716] Register r7 information: 2-page vmalloc region starting at 0xdfa8c000 allocated at kernel_clone+0xac/0x3ec [ 2508.844327][T16716] Register r8 information: slab kmalloc-192 start 8416b6c0 pointer offset 0 size 192 [ 2508.844865][T16716] Register r9 information: non-paged memory [ 2508.845142][T16716] Register r10 information: non-slab/vmalloc memory [ 2508.845408][T16716] Register r11 information: 2-page vmalloc region starting at 0xdfa8c000 allocated at kernel_clone+0xac/0x3ec [ 2508.845814][T16716] Register r12 information: 2-page vmalloc region starting at 0xdfa8c000 allocated at kernel_clone+0xac/0x3ec [ 2508.848330][T16716] Process syz.3.2870 (pid: 16716, stack limit = 0xdfa8c000) [ 2508.848868][T16716] Stack: (0xdfa8dd30 to 0xdfa8e000) [ 2508.849163][T16716] dd20: 82403704 8416b6c0 829cf9ac 829cf9ac [ 2508.849508][T16716] dd40: 81e16fc4 8416b704 dfa8dd8c dfa8dd58 813b7cc4 813bbac0 200000c0 00000000 [ 2508.849842][T16716] dd60: dfa8dd7c 200000c0 8416b6c0 b5403587 200000c0 84046000 40946400 00000003 [ 2508.850172][T16716] dd80: dfa8de4c dfa8dd90 813b3810 813b7bc8 656d6f63 705f6964 6f707261 00007472 [ 2508.850502][T16716] dda0: 00000000 00004f27 0000001f 00010000 00000004 00000003 00000cc7 00000004 [ 2508.850952][T16716] ddc0: 00080008 0000000e 00000006 00000002 00000001 00000007 00000001 00000006 [ 2508.851260][T16716] dde0: 10000105 00000000 0001a44d 00000003 3fff7fff 00000089 00000010 00000001 [ 2508.851573][T16716] de00: 20001e58 0080000b 00000e69 0000003c 00000008 00000006 ffffffff effffff8 [ 2508.851855][T16716] de20: 00000000 0826340b 00000000 84f7cb40 8416b6c0 200000c0 200000c0 84046000 [ 2508.852154][T16716] de40: dfa8df14 dfa8de50 813b47dc 813b371c 00000000 dfa8de54 dfa8de54 0826340b [ 2508.852485][T16716] de60: 00000000 00000000 82477544 0000005f 83c26058 8416b6f0 841de564 84046000 [ 2508.852761][T16716] de80: dfa8dee4 dfa8de90 8079fd20 80796118 00000064 00000001 00000000 dfa8deac [ 2508.853042][T16716] dea0: 8557b310 834de6e8 00006400 0000000b dfa8dea0 00000000 dfa8dd30 0826340b [ 2508.853313][T16716] dec0: 84f7cb40 40946400 200000c0 200000c0 84f7cb40 00000003 dfa8def4 dfa8dee8 [ 2508.853651][T16716] dee0: 8079fe40 0826340b dfa8df14 40946400 00000000 84f7cb41 200000c0 84f7cb40 [ 2508.853948][T16716] df00: 00000003 84046000 dfa8dfa4 dfa8df18 80573398 813b420c ecac8b10 84046000 [ 2508.854279][T16716] df20: dfa8df3c dfa8df30 81a4f298 81a4f168 dfa8df54 dfa8df40 8025c288 8028d5d4 [ 2508.854871][T16716] df40: dfa8dfb0 40000000 dfa8df84 dfa8df58 00000000 dfa8df60 80200bec 81a1daec [ 2508.855561][T16716] df60: 00000003 40946400 200000c0 00000000 00000000 0826340b 00316308 00000000 [ 2508.855909][T16716] df80: 00000000 00316308 00000036 8020029c 84046000 00000036 00000000 dfa8dfa8 [ 2508.856540][T16716] dfa0: 80200060 80573274 00000000 00000000 00000003 40946400 200000c0 00000000 [ 2508.857011][T16716] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f270bc [ 2508.857299][T16716] dfe0: 76f26ec0 76f26eb0 000195a4 00132510 60000010 00000003 00000000 00000000 [ 2508.857613][T16716] Call trace: [ 2508.857824][T16716] [<813bbab4>] (parport_attach) from [<813b7cc4>] (comedi_device_attach+0x108/0x250) [ 2508.858428][T16716] r6:8416b704 r5:81e16fc4 r4:829cf9ac [ 2508.858626][T16716] [<813b7bbc>] (comedi_device_attach) from [<813b3810>] (do_devconfig_ioctl+0x100/0x220) [ 2508.858903][T16716] r10:00000003 r9:40946400 r8:84046000 r7:200000c0 r6:b5403587 r5:8416b6c0 [ 2508.859057][T16716] r4:200000c0 [ 2508.859185][T16716] [<813b3710>] (do_devconfig_ioctl) from [<813b47dc>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 2508.859384][T16716] r8:84046000 r7:200000c0 r6:200000c0 r5:8416b6c0 r4:84f7cb40 [ 2508.859567][T16716] [<813b4200>] (comedi_unlocked_ioctl) from [<80573398>] (sys_ioctl+0x130/0xba0) [ 2508.859755][T16716] r10:84046000 r9:00000003 r8:84f7cb40 r7:200000c0 r6:84f7cb41 r5:00000000 [ 2508.859942][T16716] r4:40946400 [ 2508.860024][T16716] [<80573268>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2508.860274][T16716] Exception stack(0xdfa8dfa8 to 0xdfa8dff0) [ 2508.860392][T16716] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 2508.860544][T16716] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f270bc [ 2508.860706][T16716] dfe0: 76f26ec0 76f26eb0 000195a4 00132510 [ 2508.860823][T16716] r10:00000036 r9:84046000 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 2508.861017][T16716] r4:00000000 [ 2508.861305][T16716] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 2508.861723][T16716] ---[ end trace 0000000000000000 ]--- [ 2508.862382][T16716] Kernel panic - not syncing: Fatal exception [ 2508.864249][T16716] Rebooting in 86400 seconds.. VM DIAGNOSIS: 07:53:03 Registers: info registers vcpu 0 CPU#0 R00=83ba3600 R01=00000400 R02=00000001 R03=dfa49400 R04=83ba3600 R05=8324ac00 R06=00000000 R07=833e7800 R08=833e7808 R09=833e7800 R10=00000040 R11=82801564 R12=82801550 R13=82801550 R14=80a292d0 R15=80a292d8 PSR=60000113 -ZC- A S svc32 s00=00000000 s01=00000300 d00=0000030000000000 s02=ff7e0000 s03=0008ffff d01=0008ffffff7e0000 s04=9d63547d s05=1b3ad8d8 d02=1b3ad8d89d63547d s06=2cba7fbf s07=b7b69dca d03=b7b69dca2cba7fbf s08=9f0bc0f2 s09=104e93ea d04=104e93ea9f0bc0f2 s10=2043be33 s11=e4d2f7c5 d05=e4d2f7c52043be33 s12=00000005 s13=00000000 d06=0000000000000005 s14=00000000 s15=1e160000 d07=1e16000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=33d3b3bb s33=e7249965 d16=e724996533d3b3bb s34=d378224c s35=fe8e8c30 d17=fe8e8c30d378224c s36=c592fa55 s37=715313f1 d18=715313f1c592fa55 s38=4e3f6a37 s39=a2ed2bc6 d19=a2ed2bc64e3f6a37 s40=71c40f3e s41=9fc859ad d20=9fc859ad71c40f3e s42=c9b877a7 s43=f8fabfbc d21=f8fabfbcc9b877a7 s44=a2c17bcf s45=ad9a3975 d22=ad9a3975a2c17bcf s46=fad0ae92 s47=deb6c8c3 d23=deb6c8c3fad0ae92 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=00b40000 s53=00a00000 d26=00a0000000b40000 s54=008c0000 s55=00740000 d27=00740000008c0000 s56=00540000 s57=00400000 d28=0040000000540000 s58=00280000 s59=00140000 d29=0014000000280000 s60=00080000 s61=00000008 d30=0000000800080000 s62=00080004 s63=03e60000 d31=03e6000000080004 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=82b066ec R01=80000193 R02=84046000 R03=00005f94 R04=82b066e4 R05=80000193 R06=00000f01 R07=00000000 R08=82826f28 R09=00000000 R10=00001af5 R11=dfa8d984 R12=dfa8d988 R13=dfa8d978 R14=80a04dec R15=81a5bdbc PSR=60000193 -ZC- A S svc32 s00=20313830 s01=72697628 d00=7269762820313830 s02=30353220 s03=30382e38 d01=30382e3830353220 s04=32323631 s05=31545b5d d02=31545b5d32323631 s06=36313736 s07=6567205d d03=6567205d36313736 s08=7172696e s09=6c46203a d04=6c46203a7172696e s10=20736761 s11=6d73696d d05=6d73696d20736761 s12=68637461 s13=71726920 d06=7172692068637461 s14=2e313320 s15=32303020 d07=323030202e313320 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000