last executing test programs: 24.060802798s ago: executing program 1 (id=1226): r0 = syz_usb_connect(0x5, 0x73, &(0x7f0000000400)=ANY=[@ANYBLOB="12010000396d0940fd101315ce7e0102030109026100010000000009040001"], 0x0) syz_usb_connect(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) syz_usb_control_io$lan78xx(r0, 0x0, 0x0) syz_usb_control_io$rtl8150(r0, 0x0, 0x0) 12.504559744s ago: executing program 1 (id=1237): ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a3200000000140000001100"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01020000000000100000020000000900020073797a310000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}}, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x3}}) r1 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x35}, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x89}}], 0x38}, 0x4080800) 12.168377176s ago: executing program 1 (id=1239): r0 = syz_usb_connect(0x2, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="120100001d9167204f17316a3f26010203010902120001000000000904"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) 6.160561239s ago: executing program 0 (id=1246): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000000), 0x208e24b) 3.752845844s ago: executing program 0 (id=1247): openat$nullb(0xffffffffffffff9c, &(0x7f0000000040), 0x84042, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x47ffffa, 0x122c42) writev(r0, &(0x7f0000000300)=[{&(0x7f00000000c0)='\b\r4V', 0x7e00}], 0x1) 3.381945331s ago: executing program 0 (id=1248): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="20000000170a0102"], 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x90) 3.14948098s ago: executing program 0 (id=1249): sigaltstack(&(0x7f0000000040)={&(0x7f00000010c0)=""/4076, 0x100000001, 0xfec}, 0x0) syz_clone(0xe200, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000400)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES8], 0x0) syz_usb_control_io(r0, &(0x7f0000000b00)={0x2c, &(0x7f0000000300)=ANY=[@ANYBLOB="00000f00000009003d140f3c369197d09647190890"], 0x0, 0x0, 0x0, 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000080), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xd01c4813, &(0x7f0000000000)={0x2, 0x100, 0x0, 0xad, 0x0, 0x1}) 1.398396223s ago: executing program 0 (id=1250): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x6c, r1, 0x1, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME={0x4e, 0x33, @beacon={{{}, {0xde6}, @device_a, @device_a, @initial, {0x0, 0xffe}}, 0x3, @random=0x1, 0x1, @val={0x0, 0x2, @random="28e3"}, @val={0x1, 0x3, [{0x60}, {0x9}, {0x2, 0x1}]}, @void, @val={0x4, 0x6, {0xf8, 0x97, 0x2, 0x2}}, @val={0x6, 0x2, 0x7}, @void, @void, @val={0x2a, 0x1, {0x1, 0x1, 0x1}}, @val={0x3c, 0x4, {0x1, 0x26, 0x34, 0x1}}, @void, @val={0x72, 0xffffffffffffff17}, @void, @void}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4008040}, 0x4080) 1.140461475s ago: executing program 1 (id=1251): mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000000)='tmpfs\x00', 0x8, &(0x7f0000000300)='usrquota') chdir(&(0x7f0000000140)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) prlimit64(0x0, 0x8, 0x0, 0x0) r1 = shmget(0x1, 0x2000, 0x200, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) quotactl_fd$Q_SETQUOTA(r0, 0xffffffff80000800, 0xee01, &(0x7f00000000c0)={0x0, 0x1, 0x2000200000a95c, 0x9, 0x1, 0x80000001, 0x48cd, 0xfffffffffffffffc, 0xffffff15}) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080), 0x22242, 0x0) write$USERIO_CMD_REGISTER(r2, 0x0, 0x0) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x181ac1, 0x0) write$eventfd(r3, 0x0, 0x0) syncfs(0xffffffffffffffff) fchown(r3, 0xee01, 0x0) fchown(r3, 0x0, 0x0) 852.775852ms ago: executing program 1 (id=1252): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_udp(0xa, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$igmp(0x2, 0x3, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r4, @ANYBLOB="1f003300d000000008021100000108021100000050505050505000001502", @ANYRES8=r2], 0x3c}, 0x1, 0x0, 0x0, 0x8800}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 231.474631ms ago: executing program 0 (id=1253): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x4f27, 0x20, 0x10000, 0x10000004, 0x8, 0xffeffbf9, 0x8, 0x40000000, 0x4800000, 0x100100, 0xfffffff9, 0x1, 0x4, 0xfffffffe, 0x403, 0xf, 0xfffffffc, 0x0, 0x3, 0x40000003, 0x89, 0xfffffffd, 0x0, 0x20001e55, 0x400000b, 0xfff, 0x1, 0x8, 0x7, 0x8000000, 0x1]}) 0s ago: executing program 1 (id=1254): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581d7"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000840)={0x24, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00220f000000540b4550182195f51584b3"], 0x0}, 0x0) r1 = syz_open_dev$hiddev(&(0x7f0000000540), 0x0, 0x0) ioctl$HIDIOCGUSAGE(r1, 0xc018480b, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000740)={0x84, &(0x7f00000002c0)={0x20, 0x16, 0x4, "c5e3d695"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) kernel console output (not intermixed with test programs): ext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 854.906583][ T29] audit: type=1400 audit(854.820:11868): avc: denied { create } for pid=7490 comm="syz.1.1089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 854.917452][ T29] audit: type=1400 audit(854.830:11869): avc: denied { write } for pid=7490 comm="syz.1.1089" path="socket:[12815]" dev="sockfs" ino=12815 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 854.938802][ T29] audit: type=1400 audit(854.850:11870): avc: denied { write } for pid=7490 comm="syz.1.1089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 855.952012][ T29] audit: type=1400 audit(855.860:11871): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 855.967648][ T29] audit: type=1400 audit(855.880:11872): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 855.974246][ T29] audit: type=1400 audit(855.890:11873): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 856.160975][ T29] audit: type=1400 audit(856.070:11874): avc: denied { create } for pid=7494 comm="syz.0.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 856.166858][ T29] audit: type=1400 audit(856.080:11875): avc: denied { write } for pid=7494 comm="syz.0.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 856.209730][ T29] audit: type=1400 audit(856.120:11876): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 858.108411][ T7499] FAULT_INJECTION: forcing a failure. [ 858.108411][ T7499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 858.118998][ T7499] CPU: 1 UID: 0 PID: 7499 Comm: syz.1.1092 Not tainted syzkaller #0 PREEMPT [ 858.119143][ T7499] Hardware name: ARM-Versatile Express [ 858.119169][ T7499] Call trace: [ 858.119216][ T7499] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 858.119342][ T7499] r7:00000003 r6:00000000 r5:60000013 r4:8228e5f0 [ 858.119362][ T7499] [<80201b08>] (show_stack) from [<8021ea68>] (dump_stack_lvl+0x70/0x7c) [ 858.119418][ T7499] [<8021e9f8>] (dump_stack_lvl) from [<8021ea8c>] (dump_stack+0x18/0x1c) [ 858.119473][ T7499] r5:85410000 r4:8294f410 [ 858.119490][ T7499] [<8021ea74>] (dump_stack) from [<8098d3b8>] (should_fail_ex+0x1c4/0x228) [ 858.119549][ T7499] [<8098d1f4>] (should_fail_ex) from [<8098d430>] (should_fail+0x14/0x18) [ 858.119610][ T7499] r8:8020029c r7:00000003 r6:82490928 r5:20000100 r4:20000100 [ 858.119628][ T7499] [<8098d41c>] (should_fail) from [<8098d450>] (should_fail_usercopy+0x1c/0x20) [ 858.119676][ T7499] [<8098d434>] (should_fail_usercopy) from [<809934b4>] (strncpy_from_user+0x20/0x1a0) [ 858.119728][ T7499] [<80993494>] (strncpy_from_user) from [<80571fdc>] (getname_flags.part.0+0x44/0x18c) [ 858.119807][ T7499] r10:0000003d r9:85410000 r8:8020029c r7:00000003 r6:82490928 r5:20000100 [ 858.119829][ T7499] r4:83309000 [ 858.119846][ T7499] [<80571f98>] (getname_flags.part.0) from [<80577a74>] (getname_flags+0x3c/0x50) [ 858.119913][ T7499] r9:85410000 r8:8020029c r7:00000002 r6:ffffff9c r5:00000003 r4:20000100 [ 858.119932][ T7499] [<80577a38>] (getname_flags) from [<8057802c>] (user_path_at+0x2c/0x64) [ 858.119982][ T7499] r5:00000003 r4:ed2d9f7c [ 858.119999][ T7499] [<80578000>] (user_path_at) from [<8055e91c>] (sys_chroot+0x48/0x104) [ 858.120059][ T7499] r6:85410000 r5:20000100 r4:00000000 [ 858.120076][ T7499] [<8055e8d4>] (sys_chroot) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 858.120124][ T7499] Exception stack(0xed2d9fa8 to 0xed2d9ff0) [ 858.120169][ T7499] 9fa0: 00000000 00000000 20000100 00000000 00000000 00000000 [ 858.120206][ T7499] 9fc0: 00000000 00000000 001302c8 0000003d 00300000 00000000 00006364 76f480bc [ 858.120244][ T7499] 9fe0: 76f47ec0 76f47eb0 0001929c 00132320 [ 858.120276][ T7499] r7:0000003d r6:001302c8 r5:00000000 r4:00000000 [ 860.169682][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 860.171818][ T29] audit: type=1400 audit(860.080:11923): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 860.310198][ T29] audit: type=1400 audit(860.220:11924): avc: denied { write } for pid=7496 comm="syz.0.1091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 860.350450][ T29] audit: type=1400 audit(860.260:11925): avc: denied { write } for pid=7496 comm="syz.0.1091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 860.470647][ T29] audit: type=1400 audit(860.380:11926): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.506476][ T29] audit: type=1400 audit(860.420:11928): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.508312][ T29] audit: type=1400 audit(860.420:11929): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.510198][ T29] audit: type=1400 audit(860.420:11930): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.514292][ T29] audit: type=1400 audit(860.380:11927): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.516462][ T29] audit: type=1400 audit(860.430:11931): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 860.898598][ T29] audit: type=1400 audit(860.810:11932): avc: denied { read write } for pid=7502 comm="syz.1.1093" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 860.915391][ T7505] fuse: Bad value for 'fd' [ 865.218601][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 865.219570][ T29] audit: type=1400 audit(865.130:12002): avc: denied { create } for pid=7526 comm="syz.0.1100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 865.254179][ T29] audit: type=1400 audit(865.170:12003): avc: denied { write } for pid=7526 comm="syz.0.1100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 865.369542][ T29] audit: type=1400 audit(865.280:12004): avc: denied { write } for pid=7526 comm="syz.0.1100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 866.463950][ T29] audit: type=1400 audit(866.370:12005): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 866.535970][ T29] audit: type=1400 audit(866.450:12006): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 866.537749][ T29] audit: type=1400 audit(866.450:12007): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 867.739052][ T29] audit: type=1400 audit(867.650:12008): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 867.746634][ T29] audit: type=1400 audit(867.660:12009): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 867.778718][ T29] audit: type=1400 audit(867.690:12010): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 868.195728][ T29] audit: type=1400 audit(868.110:12011): avc: denied { read } for pid=7532 comm="syz.0.1102" dev="nsfs" ino=4026532651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 868.232586][ T7533] FAULT_INJECTION: forcing a failure. [ 868.232586][ T7533] name failslab, interval 1, probability 0, space 0, times 0 [ 868.247818][ T7533] CPU: 1 UID: 0 PID: 7533 Comm: syz.0.1102 Not tainted syzkaller #0 PREEMPT [ 868.247976][ T7533] Hardware name: ARM-Versatile Express [ 868.248002][ T7533] Call trace: [ 868.248048][ T7533] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 868.248210][ T7533] r7:00000000 r6:00000000 r5:60000113 r4:8228e5f0 [ 868.248232][ T7533] [<80201b08>] (show_stack) from [<8021ea68>] (dump_stack_lvl+0x70/0x7c) [ 868.248287][ T7533] [<8021e9f8>] (dump_stack_lvl) from [<8021ea8c>] (dump_stack+0x18/0x1c) [ 868.248343][ T7533] r5:841f0c00 r4:82918a40 [ 868.248359][ T7533] [<8021ea74>] (dump_stack) from [<8098d3b8>] (should_fail_ex+0x1c4/0x228) [ 868.248415][ T7533] [<8098d1f4>] (should_fail_ex) from [<80532a94>] (should_failslab+0x6c/0x94) [ 868.248488][ T7533] r8:0000001c r7:00000000 r6:00000dc0 r5:00000000 r4:83001240 [ 868.248507][ T7533] [<80532a28>] (should_failslab) from [<805131f0>] (__kmalloc_cache_noprof+0x4c/0x44c) [ 868.248560][ T7533] [<805131a4>] (__kmalloc_cache_noprof) from [<8057bd10>] (file_f_owner_allocate+0x3c/0x88) [ 868.248630][ T7533] r10:00000037 r9:85cc2480 r8:00000003 r7:00000001 r6:85cc2480 r5:00000000 [ 868.248653][ T7533] r4:85cc2480 [ 868.248670][ T7533] [<8057bcd4>] (file_f_owner_allocate) from [<8057bdd4>] (f_setown+0x78/0xac) [ 868.248743][ T7533] r5:00000000 r4:00000000 [ 868.248762][ T7533] [<8057bd5c>] (f_setown) from [<8057c6dc>] (do_fcntl+0x654/0x994) [ 868.248856][ T7533] r7:00000003 r6:85cc2480 r5:00000000 r4:00000008 [ 868.248879][ T7533] [<8057c088>] (do_fcntl) from [<8057ca8c>] (sys_fcntl+0x70/0xd0) [ 868.248940][ T7533] r8:00000003 r7:00000000 r6:00000008 r5:00000000 r4:85cc2481 [ 868.248959][ T7533] [<8057ca1c>] (sys_fcntl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 868.249007][ T7533] Exception stack(0xed3edfa8 to 0xed3edff0) [ 868.249045][ T7533] dfa0: 00000000 00000000 00000003 00000008 00000000 00000000 [ 868.249082][ T7533] dfc0: 00000000 00000000 001302c8 00000037 00300000 00000000 00006364 76f990bc [ 868.249109][ T7533] dfe0: 76f98ec0 76f98eb0 0001929c 00132320 [ 868.249145][ T7533] r9:841f0c00 r8:8020029c r7:00000037 r6:001302c8 r5:00000000 r4:00000000 [ 868.881298][ T7535] FAULT_INJECTION: forcing a failure. [ 868.881298][ T7535] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 868.881618][ T7535] CPU: 1 UID: 0 PID: 7535 Comm: syz.0.1103 Not tainted syzkaller #0 PREEMPT [ 868.881681][ T7535] Hardware name: ARM-Versatile Express [ 868.881711][ T7535] Call trace: [ 868.881755][ T7535] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 868.881815][ T7535] r7:76f97e1c r6:00000000 r5:60000013 r4:8228e5f0 [ 868.881826][ T7535] [<80201b08>] (show_stack) from [<8021ea68>] (dump_stack_lvl+0x70/0x7c) [ 868.881853][ T7535] [<8021e9f8>] (dump_stack_lvl) from [<8021ea8c>] (dump_stack+0x18/0x1c) [ 868.881881][ T7535] r5:841f6000 r4:8294f410 [ 868.881889][ T7535] [<8021ea74>] (dump_stack) from [<8098d3b8>] (should_fail_ex+0x1c4/0x228) [ 868.881917][ T7535] [<8098d1f4>] (should_fail_ex) from [<8098d430>] (should_fail+0x14/0x18) [ 868.881947][ T7535] r8:85cc2481 r7:76f97e1c r6:ed3edee4 r5:0000000c r4:0000000c [ 868.881955][ T7535] [<8098d41c>] (should_fail) from [<8098d450>] (should_fail_usercopy+0x1c/0x20) [ 868.881978][ T7535] [<8098d434>] (should_fail_usercopy) from [<8155dc20>] (move_addr_to_kernel+0x34/0xf8) [ 868.882007][ T7535] [<8155dbec>] (move_addr_to_kernel) from [<8155f36c>] (__sys_sendto+0xd0/0x160) [ 868.882049][ T7535] r7:76f97e1c r6:853f2c80 r5:00000000 r4:00000000 [ 868.882166][ T7535] [<8155f29c>] (__sys_sendto) from [<8155f418>] (sys_sendto+0x1c/0x24) [ 868.882389][ T7535] r9:841f6000 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76f97e1c [ 868.882624][ T7535] [<8155f3fc>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 868.882695][ T7535] Exception stack(0xed3edfa8 to 0xed3edff0) [ 868.882809][ T7535] dfa0: 76f97e1c 0000000c 00000004 76f97eb0 00000028 00000000 [ 868.882849][ T7535] dfc0: 76f97e1c 0000000c 00000000 00000122 00000004 00000000 76f97eb0 76f990bc [ 868.883041][ T7535] dfe0: 00000000 76f97df0 000d7fdc 001347b8 [ 870.517534][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 870.523563][ T29] audit: type=1400 audit(870.430:12033): avc: denied { write } for pid=7539 comm="syz.1.1105" name="mouse0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 870.531612][ T29] audit: type=1400 audit(870.440:12034): avc: denied { write open } for pid=7539 comm="syz.1.1105" path="/dev/input/mouse0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 870.568532][ T29] audit: type=1400 audit(870.480:12035): avc: denied { write } for pid=7536 comm="syz.0.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 870.600528][ T29] audit: type=1400 audit(870.510:12036): avc: denied { create } for pid=7539 comm="syz.1.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 870.636306][ T29] audit: type=1400 audit(870.550:12037): avc: denied { write } for pid=7539 comm="syz.1.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 870.729152][ T29] audit: type=1400 audit(870.640:12038): avc: denied { write } for pid=7539 comm="syz.1.1105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 870.858382][ T29] audit: type=1400 audit(870.770:12039): avc: denied { write } for pid=7536 comm="syz.0.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 871.072307][ T29] audit: type=1400 audit(870.980:12040): avc: denied { write } for pid=7536 comm="syz.0.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 871.120383][ T29] audit: type=1400 audit(871.030:12041): avc: denied { write } for pid=7536 comm="syz.0.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 871.162599][ T29] audit: type=1400 audit(871.070:12042): avc: denied { write } for pid=7536 comm="syz.0.1104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 875.548975][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 875.550059][ T29] audit: type=1400 audit(875.460:12090): avc: denied { read } for pid=7558 comm="syz.1.1111" dev="nsfs" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 875.586566][ T29] audit: type=1400 audit(875.500:12091): avc: denied { read open } for pid=7558 comm="syz.1.1111" path="net:[4026532737]" dev="nsfs" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 875.609943][ T29] audit: type=1400 audit(875.520:12092): avc: denied { create } for pid=7558 comm="syz.1.1111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 875.657141][ T29] audit: type=1400 audit(875.570:12093): avc: denied { write } for pid=7558 comm="syz.1.1111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 875.668782][ T29] audit: type=1400 audit(875.580:12094): avc: denied { create } for pid=7558 comm="syz.1.1111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 875.690996][ T29] audit: type=1400 audit(875.600:12095): avc: denied { read } for pid=7558 comm="syz.1.1111" dev="nsfs" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 875.717315][ T29] audit: type=1400 audit(875.630:12096): avc: denied { read open } for pid=7558 comm="syz.1.1111" path="net:[4026532737]" dev="nsfs" ino=4026532737 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 875.763468][ T29] audit: type=1400 audit(875.670:12097): avc: denied { create } for pid=7558 comm="syz.1.1111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 875.799005][ T29] audit: type=1400 audit(875.710:12098): avc: denied { ioctl } for pid=7558 comm="syz.1.1111" path="socket:[12937]" dev="sockfs" ino=12937 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 875.865476][ T29] audit: type=1400 audit(875.780:12099): avc: denied { read } for pid=7558 comm="syz.1.1111" name="dsp" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 876.445766][ T7562] fuse: Bad value for 'rootmode' [ 881.028725][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 881.031383][ T29] audit: type=1400 audit(880.940:12143): avc: denied { bind } for pid=7569 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 881.211224][ T29] audit: type=1400 audit(881.120:12144): avc: denied { connect } for pid=7569 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 881.236633][ T29] audit: type=1400 audit(881.150:12145): avc: denied { connect } for pid=7569 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 881.308809][ T29] audit: type=1400 audit(881.220:12146): avc: denied { connect } for pid=7569 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 881.388131][ T29] audit: type=1400 audit(881.300:12147): avc: denied { connect } for pid=7569 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 881.556704][ T29] audit: type=1400 audit(881.470:12148): avc: denied { connect } for pid=7569 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 881.667418][ T29] audit: type=1400 audit(881.580:12149): avc: denied { connect } for pid=7569 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 881.704969][ T29] audit: type=1400 audit(881.620:12150): avc: denied { connect } for pid=7569 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 881.867690][ T29] audit: type=1400 audit(881.780:12151): avc: denied { connect } for pid=7569 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 881.929705][ T29] audit: type=1400 audit(881.840:12152): avc: denied { connect } for pid=7569 comm="syz.0.1116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 886.488597][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 886.489663][ T29] audit: type=1400 audit(886.400:12197): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 886.491513][ T29] audit: type=1400 audit(886.400:12198): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 886.494646][ T29] audit: type=1400 audit(886.400:12199): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 887.008786][ T29] audit: type=1400 audit(886.920:12200): avc: denied { create } for pid=7574 comm="syz.0.1117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 887.021244][ T29] audit: type=1400 audit(886.930:12201): avc: denied { ioctl } for pid=7574 comm="syz.0.1117" path="socket:[12967]" dev="sockfs" ino=12967 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 887.076128][ T7575] FAULT_INJECTION: forcing a failure. [ 887.076128][ T7575] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 887.076511][ T29] audit: type=1400 audit(886.990:12202): avc: denied { getopt } for pid=7574 comm="syz.0.1117" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 887.076669][ T7575] CPU: 1 UID: 0 PID: 7575 Comm: syz.0.1117 Not tainted syzkaller #0 PREEMPT [ 887.076755][ T7575] Hardware name: ARM-Versatile Express [ 887.076782][ T7575] Call trace: [ 887.076833][ T7575] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 887.076954][ T7575] r7:20000100 r6:00000000 r5:60000113 r4:8228e5f0 [ 887.076976][ T7575] [<80201b08>] (show_stack) from [<8021ea68>] (dump_stack_lvl+0x70/0x7c) [ 887.077035][ T7575] [<8021e9f8>] (dump_stack_lvl) from [<8021ea8c>] (dump_stack+0x18/0x1c) [ 887.077165][ T7575] r5:841f1800 r4:8294f410 [ 887.077286][ T7575] [<8021ea74>] (dump_stack) from [<8098d3b8>] (should_fail_ex+0x1c4/0x228) [ 887.077703][ T7575] [<8098d1f4>] (should_fail_ex) from [<8098d430>] (should_fail+0x14/0x18) [ 887.078024][ T7575] r8:841f1800 r7:20000100 r6:ed4c1e0c r5:00000004 r4:00000004 [ 887.078141][ T7575] [<8098d41c>] (should_fail) from [<8098d450>] (should_fail_usercopy+0x1c/0x20) [ 887.078249][ T7575] [<8098d434>] (should_fail_usercopy) from [<815611b8>] (copy_from_sockptr_offset.constprop.0+0x5c/0x11c) [ 887.078365][ T7575] [<8156115c>] (copy_from_sockptr_offset.constprop.0) from [<81567fc8>] (sk_getsockopt+0x68/0xe98) [ 887.078582][ T7575] r8:841f1800 r7:83cfd500 r6:00000015 r5:ed4c1e1c r4:00000001 [ 887.078844][ T7575] [<81567f64>] (sk_getsockopt) from [<8155d83c>] (do_sock_getsockopt+0x108/0x1ec) [ 887.079143][ T7575] r10:00000127 r9:841f1800 r8:20000100 r7:b5403587 r6:84f78000 r5:00000015 [ 887.079172][ T7575] r4:00000001 [ 887.079295][ T7575] [<8155d734>] (do_sock_getsockopt) from [<8155f77c>] (__sys_getsockopt+0x94/0xdc) [ 887.079619][ T7575] r8:85cc5000 r7:ed4c1f50 r6:00000015 r5:ed4c1f58 r4:85cc5001 [ 887.079999][ T7575] [<8155f6e8>] (__sys_getsockopt) from [<8155f7e0>] (sys_getsockopt+0x1c/0x24) [ 887.080415][ T7575] r8:8020029c r7:00000127 r6:001302c8 r5:00000000 r4:20000100 [ 887.080494][ T7575] [<8155f7c4>] (sys_getsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 887.080552][ T7575] Exception stack(0xed4c1fa8 to 0xed4c1ff0) [ 887.080737][ T7575] 1fa0: 20000100 00000000 00000004 00000001 00000015 00000000 [ 887.080796][ T7575] 1fc0: 20000100 00000000 001302c8 00000127 00300000 00000000 00006364 76f990bc [ 887.080940][ T7575] 1fe0: 76f98ec0 76f98eb0 0001929c 00132320 [ 887.372297][ T29] audit: type=1400 audit(887.260:12203): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 887.379400][ T29] audit: type=1400 audit(887.290:12204): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 887.397906][ T29] audit: type=1400 audit(887.310:12205): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 887.874079][ T29] audit: type=1400 audit(887.770:12206): avc: denied { read append } for pid=7576 comm="syz.0.1118" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 891.673806][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 891.674895][ T29] audit: type=1400 audit(891.570:12226): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.676679][ T29] audit: type=1400 audit(891.570:12227): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.678254][ T29] audit: type=1400 audit(891.570:12228): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.832373][ T29] audit: type=1400 audit(891.740:12229): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.841907][ T29] audit: type=1400 audit(891.750:12230): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 891.848854][ T29] audit: type=1400 audit(891.760:12231): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 892.036245][ T29] audit: type=1400 audit(891.950:12232): avc: denied { write } for pid=7583 comm="syz.0.1125" name="mouse0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 892.038410][ T29] audit: type=1400 audit(891.950:12233): avc: denied { write open } for pid=7583 comm="syz.0.1125" path="/dev/input/mouse0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 892.042797][ T29] audit: type=1400 audit(891.950:12234): avc: denied { create } for pid=7583 comm="syz.0.1125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 892.050009][ T29] audit: type=1400 audit(891.960:12235): avc: denied { read write } for pid=7584 comm="syz.1.1121" name="vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 896.891191][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 896.898150][ T29] audit: type=1400 audit(896.800:12273): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 896.901466][ T29] audit: type=1400 audit(896.810:12274): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 896.925003][ T29] audit: type=1400 audit(896.840:12275): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 896.993619][ T29] audit: type=1400 audit(896.900:12276): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 897.037654][ T29] audit: type=1400 audit(896.950:12277): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 897.152012][ T29] audit: type=1400 audit(897.060:12278): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 897.205248][ T29] audit: type=1400 audit(897.110:12279): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 897.297711][ T29] audit: type=1400 audit(897.210:12280): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 897.436969][ T29] audit: type=1400 audit(897.350:12281): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 897.512762][ T29] audit: type=1400 audit(897.420:12282): avc: denied { ioctl } for pid=7584 comm="syz.1.1121" path="/dev/vhost-net" dev="devtmpfs" ino=708 ioctlcmd=0x3305 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 900.640078][ T7602] fuse: Unknown parameter 'user_i00000000000000000000' [ 901.932798][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 901.935780][ T29] audit: type=1400 audit(901.840:12321): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 902.067612][ T29] audit: type=1400 audit(901.980:12322): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 902.151045][ T29] audit: type=1400 audit(902.060:12323): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 902.285498][ T29] audit: type=1400 audit(902.200:12324): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 902.289128][ T29] audit: type=1400 audit(902.200:12325): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 902.308144][ T29] audit: type=1400 audit(902.220:12326): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 902.423305][ T29] audit: type=1400 audit(902.310:12327): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 902.574270][ T29] audit: type=1400 audit(902.480:12328): avc: denied { connect } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 902.607316][ T29] audit: type=1400 audit(902.520:12329): avc: denied { create } for pid=7584 comm="syz.1.1121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 902.709190][ T29] audit: type=1400 audit(902.620:12330): avc: denied { read write } for pid=7608 comm="syz.0.1131" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 905.869990][ T7619] fuse: Unknown parameter 'user_id00000000000000000000' [ 907.121278][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 907.123771][ T29] audit: type=1400 audit(907.030:12398): avc: denied { read } for pid=7623 comm="syz.1.1136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 907.127510][ T29] audit: type=1400 audit(907.040:12399): avc: denied { ioctl } for pid=7623 comm="syz.1.1136" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x3b81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 907.155237][ T29] audit: type=1400 audit(907.070:12400): avc: denied { ioctl } for pid=7623 comm="syz.1.1136" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 907.158992][ T29] audit: type=1400 audit(907.070:12401): avc: denied { ioctl } for pid=7623 comm="syz.1.1136" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 907.197726][ T29] audit: type=1400 audit(907.110:12402): avc: denied { ioctl } for pid=7623 comm="syz.1.1136" path="socket:[13707]" dev="sockfs" ino=13707 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 907.206853][ T29] audit: type=1400 audit(907.120:12403): avc: denied { module_request } for pid=7623 comm="syz.1.1136" kmod="netdev-wpan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 907.324953][ T29] audit: type=1400 audit(907.240:12404): avc: denied { read write } for pid=7628 comm="syz.0.1138" name="vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 907.345159][ T29] audit: type=1400 audit(907.260:12405): avc: denied { read write open } for pid=7628 comm="syz.0.1138" path="/dev/vhost-net" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 907.376397][ T29] audit: type=1400 audit(907.290:12406): avc: denied { create } for pid=7628 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 907.422508][ T29] audit: type=1400 audit(907.330:12407): avc: denied { connect } for pid=7628 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 908.498772][ T7634] fuse: Unknown parameter 'user_id00000000000000000000' [ 912.160696][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 912.163516][ T29] audit: type=1400 audit(912.070:12490): avc: denied { read } for pid=7647 comm="syz.1.1143" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 912.177310][ T29] audit: type=1400 audit(912.090:12491): avc: denied { read open } for pid=7647 comm="syz.1.1143" path="/dev/iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 912.194532][ T29] audit: type=1400 audit(912.110:12492): avc: denied { create } for pid=7628 comm="syz.0.1138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 912.206121][ T29] audit: type=1400 audit(912.120:12493): avc: denied { create } for pid=7647 comm="syz.1.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 912.215998][ T29] audit: type=1400 audit(912.130:12494): avc: denied { ioctl } for pid=7647 comm="syz.1.1143" path="socket:[13728]" dev="sockfs" ino=13728 ioctlcmd=0x5408 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 912.225619][ T29] audit: type=1400 audit(912.140:12495): avc: denied { write } for pid=7647 comm="syz.1.1143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 912.237651][ T7648] SELinux: Context system_u:object_r:syslogd_var_run_t:s0 is not valid (left unmapped). [ 912.243591][ T29] audit: type=1400 audit(912.150:12496): avc: denied { mac_admin } for pid=7647 comm="syz.1.1143" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 912.243829][ T29] audit: type=1400 audit(912.150:12497): avc: denied { relabelto } for pid=7647 comm="syz.1.1143" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_var_run_t:s0" [ 912.249308][ T29] audit: type=1400 audit(912.160:12498): avc: denied { associate } for pid=7647 comm="syz.1.1143" name="iommu" dev="devtmpfs" ino=611 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:syslogd_var_run_t:s0" [ 912.309598][ T29] audit: type=1400 audit(912.220:12499): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 912.709450][ T7650] fuse: Unknown parameter 'user_id00000000000000000000' [ 917.177733][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 917.178968][ T29] audit: type=1400 audit(917.090:12545): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 917.197508][ T29] audit: type=1400 audit(917.110:12546): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 917.204971][ T29] audit: type=1400 audit(917.110:12547): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 917.219012][ T29] audit: type=1400 audit(917.130:12548): avc: denied { write } for pid=7655 comm="syz.0.1147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 917.487122][ T29] audit: type=1400 audit(917.380:12549): avc: denied { read append } for pid=7665 comm="syz.1.1150" name="vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 917.487544][ T29] audit: type=1400 audit(917.380:12550): avc: denied { read append open } for pid=7665 comm="syz.1.1150" path="/dev/vcsa1" dev="devtmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 917.493828][ T29] audit: type=1400 audit(917.400:12551): avc: denied { ioctl } for pid=7665 comm="syz.1.1150" path="/dev/vcsa1" dev="devtmpfs" ino=18 ioctlcmd=0x4103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 917.496779][ T29] audit: type=1400 audit(917.410:12552): avc: denied { ioctl } for pid=7665 comm="syz.1.1150" path="/dev/vcsa1" dev="devtmpfs" ino=18 ioctlcmd=0x3b65 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 917.527579][ T29] audit: type=1400 audit(917.440:12553): avc: denied { create } for pid=7665 comm="syz.1.1150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 917.543749][ T29] audit: type=1400 audit(917.450:12554): avc: denied { ioctl } for pid=7665 comm="syz.1.1150" path="socket:[13757]" dev="sockfs" ino=13757 ioctlcmd=0x6609 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 922.451599][ T29] kauditd_printk_skb: 98 callbacks suppressed [ 922.459037][ T29] audit: type=1400 audit(922.360:12653): avc: denied { read } for pid=7679 comm="syz.0.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 922.478705][ T29] audit: type=1400 audit(922.390:12654): avc: denied { write } for pid=7679 comm="syz.0.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 922.518481][ T7681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7681 comm=syz.0.1157 [ 922.537483][ T7681] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7681 comm=syz.0.1157 [ 922.587698][ T29] audit: type=1400 audit(922.500:12655): avc: denied { create } for pid=7679 comm="syz.0.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 922.598122][ T29] audit: type=1400 audit(922.500:12656): avc: denied { write } for pid=7679 comm="syz.0.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 922.614908][ T29] audit: type=1400 audit(922.510:12657): avc: denied { read } for pid=7679 comm="syz.0.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 922.618954][ T29] audit: type=1400 audit(922.530:12658): avc: denied { read } for pid=7679 comm="syz.0.1157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 922.871198][ T29] audit: type=1400 audit(922.780:12659): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 922.880860][ T29] audit: type=1400 audit(922.790:12660): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 922.897062][ T29] audit: type=1400 audit(922.810:12661): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 923.035556][ T29] audit: type=1400 audit(922.950:12662): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 926.174942][ T7701] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7701 comm=syz.0.1163 [ 926.178678][ T7701] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7701 comm=syz.0.1163 [ 927.608156][ T29] kauditd_printk_skb: 80 callbacks suppressed [ 927.611765][ T29] audit: type=1400 audit(927.520:12743): avc: denied { create } for pid=7705 comm="syz.0.1164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 927.617597][ T29] audit: type=1400 audit(927.530:12744): avc: denied { write } for pid=7705 comm="syz.0.1164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 927.634483][ T29] audit: type=1400 audit(927.540:12745): avc: denied { write } for pid=7705 comm="syz.0.1164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 927.660284][ T29] audit: type=1400 audit(927.570:12746): avc: denied { module_request } for pid=7705 comm="syz.0.1164" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 928.089346][ T29] audit: type=1400 audit(928.000:12747): avc: denied { read } for pid=7705 comm="syz.0.1164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 928.110046][ T29] audit: type=1400 audit(928.020:12748): avc: denied { ioctl } for pid=7705 comm="syz.0.1164" path="socket:[13831]" dev="sockfs" ino=13831 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 928.148611][ T29] audit: type=1400 audit(928.060:12749): avc: denied { module_request } for pid=7705 comm="syz.0.1164" kmod="netdev-wpan4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 928.570854][ T29] audit: type=1400 audit(928.480:12750): avc: denied { sys_module } for pid=7705 comm="syz.0.1164" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 928.588624][ T29] audit: type=1400 audit(928.500:12751): avc: denied { module_request } for pid=7705 comm="syz.0.1164" kmod="wpan4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 928.645134][ T29] audit: type=1400 audit(928.550:12752): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 931.431049][ T7740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7740 comm=syz.1.1168 [ 931.439723][ T7740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7740 comm=syz.1.1168 [ 932.763720][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 932.770799][ T29] audit: type=1400 audit(932.670:12843): avc: denied { create } for pid=7753 comm="syz.1.1173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 932.978459][ T29] audit: type=1400 audit(932.890:12844): avc: denied { create } for pid=7755 comm="syz.0.1174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 933.020492][ T29] audit: type=1400 audit(932.930:12845): avc: denied { bind } for pid=7755 comm="syz.0.1174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 933.022252][ T29] audit: type=1400 audit(932.930:12846): avc: denied { node_bind } for pid=7755 comm="syz.0.1174" saddr=fe80::bb scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 933.161613][ T29] audit: type=1400 audit(933.070:12847): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.164765][ T29] audit: type=1400 audit(933.070:12848): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.206057][ T29] audit: type=1400 audit(933.120:12849): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.699089][ T29] audit: type=1400 audit(933.610:12850): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.702741][ T29] audit: type=1400 audit(933.610:12851): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 933.705195][ T29] audit: type=1400 audit(933.610:12852): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 937.839055][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 937.842657][ T29] audit: type=1400 audit(937.750:12900): avc: denied { read write } for pid=3100 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 937.883249][ T29] audit: type=1400 audit(937.790:12901): avc: denied { read write open } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 937.883696][ T29] audit: type=1400 audit(937.790:12902): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 937.933470][ T29] audit: type=1400 audit(937.830:12903): avc: denied { create } for pid=7770 comm="syz.1.1179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 937.933702][ T29] audit: type=1400 audit(937.830:12904): avc: denied { write } for pid=7770 comm="syz.1.1179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 937.935444][ T29] audit: type=1400 audit(937.830:12905): avc: denied { module_request } for pid=7770 comm="syz.1.1179" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 938.206759][ T29] audit: type=1400 audit(938.120:12906): avc: denied { read } for pid=7770 comm="syz.1.1179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 938.225138][ T29] audit: type=1400 audit(938.140:12907): avc: denied { create } for pid=7770 comm="syz.1.1179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 938.261860][ T29] audit: type=1400 audit(938.170:12908): avc: denied { setattr } for pid=7770 comm="syz.1.1179" name="RAWv6" dev="sockfs" ino=14337 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 938.268014][ T29] audit: type=1400 audit(938.180:12909): avc: denied { create } for pid=7770 comm="syz.1.1179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 938.718050][ T7771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7771 comm=syz.1.1179 [ 938.784227][ T7771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7771 comm=syz.1.1179 [ 939.829236][ T52] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 939.920876][ T52] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 940.008792][ T52] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 940.117992][ T52] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 940.517664][ T52] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 940.549920][ T52] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 940.556189][ T52] bond0 (unregistering): Released all slaves [ 940.683858][ T52] hsr_slave_0: left promiscuous mode [ 940.686912][ T52] hsr_slave_1: left promiscuous mode [ 940.752524][ T52] veth1_macvtap: left promiscuous mode [ 940.757586][ T52] veth0_macvtap: left promiscuous mode [ 940.761920][ T52] veth1_vlan: left promiscuous mode [ 940.762526][ T52] veth0_vlan: left promiscuous mode [ 942.844096][ T29] kauditd_printk_skb: 49 callbacks suppressed [ 942.845378][ T29] audit: type=1400 audit(942.750:12959): avc: denied { sys_module } for pid=7786 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 942.850228][ T29] audit: type=1400 audit(942.760:12960): avc: denied { module_request } for pid=7786 comm="syz-executor" kmod="rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 942.925878][ T29] audit: type=1400 audit(942.840:12961): avc: denied { write } for pid=7815 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 942.930912][ T29] audit: type=1400 audit(942.840:12962): avc: denied { write open } for pid=7815 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 942.954709][ T29] audit: type=1400 audit(942.870:12963): avc: denied { search } for pid=7815 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 942.957441][ T29] audit: type=1400 audit(942.870:12964): avc: denied { search } for pid=7815 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 942.959379][ T29] audit: type=1400 audit(942.870:12965): avc: denied { search } for pid=7815 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 942.961338][ T29] audit: type=1400 audit(942.870:12966): avc: denied { search } for pid=7815 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 943.074401][ T29] audit: type=1400 audit(942.990:12967): avc: denied { search } for pid=7818 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 943.076838][ T29] audit: type=1400 audit(942.990:12968): avc: denied { search } for pid=7818 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.981276][ T29] kauditd_printk_skb: 346 callbacks suppressed [ 947.983250][ T29] audit: type=1400 audit(947.890:13315): avc: denied { search } for pid=7935 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.993587][ T29] audit: type=1400 audit(947.900:13316): avc: denied { search } for pid=7935 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.997910][ T29] audit: type=1400 audit(947.910:13317): avc: denied { search } for pid=7935 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 948.019924][ T29] audit: type=1400 audit(947.930:13318): avc: denied { read } for pid=7934 comm="syz.1.1187" name="event0" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 948.020155][ T29] audit: type=1400 audit(947.930:13319): avc: denied { read open } for pid=7934 comm="syz.1.1187" path="/dev/input/event0" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 948.044080][ T29] audit: type=1400 audit(947.940:13320): avc: denied { ioctl } for pid=7934 comm="syz.1.1187" path="/dev/input/event0" dev="devtmpfs" ino=702 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 948.101845][ T7786] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 948.109724][ T7786] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 948.119093][ T29] audit: type=1400 audit(948.030:13321): avc: denied { search } for pid=7925 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 948.216135][ T29] audit: type=1400 audit(948.130:13322): avc: denied { module_request } for pid=7786 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 948.315428][ T29] audit: type=1400 audit(948.230:13323): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 948.344967][ T29] audit: type=1400 audit(948.240:13324): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 951.456682][ T7786] hsr_slave_0: entered promiscuous mode [ 951.462020][ T7786] hsr_slave_1: entered promiscuous mode [ 952.984824][ T29] kauditd_printk_skb: 344 callbacks suppressed [ 952.993993][ T29] audit: type=1400 audit(952.900:13669): avc: denied { search } for pid=8039 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.011148][ T29] audit: type=1400 audit(952.900:13670): avc: denied { search } for pid=8039 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.011324][ T29] audit: type=1400 audit(952.900:13671): avc: denied { search } for pid=8039 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.011385][ T29] audit: type=1400 audit(952.900:13672): avc: denied { read } for pid=7786 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 953.011454][ T29] audit: type=1400 audit(952.900:13673): avc: denied { read } for pid=7786 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 953.011500][ T29] audit: type=1400 audit(952.900:13674): avc: denied { getattr } for pid=8039 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.022451][ T29] audit: type=1400 audit(952.930:13675): avc: denied { write } for pid=7786 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 953.027022][ T29] audit: type=1400 audit(952.940:13676): avc: denied { search } for pid=8039 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.034327][ T29] audit: type=1400 audit(952.940:13677): avc: denied { search } for pid=8039 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.034715][ T29] audit: type=1400 audit(952.940:13678): avc: denied { search } for pid=8039 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.043862][ T7786] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 953.062824][ T7786] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 953.091859][ T7786] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 953.196347][ T7786] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 957.094484][ T7786] 8021q: adding VLAN 0 to HW filter on device bond0 [ 957.996646][ T29] kauditd_printk_skb: 205 callbacks suppressed [ 957.997043][ T29] audit: type=1400 audit(957.900:13884): avc: denied { read open } for pid=8159 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 957.997260][ T29] audit: type=1400 audit(957.900:13885): avc: denied { getattr } for pid=8159 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.020983][ T29] audit: type=1400 audit(957.930:13886): avc: denied { search } for pid=8159 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.042466][ T29] audit: type=1400 audit(957.950:13887): avc: denied { search } for pid=8159 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.064008][ T29] audit: type=1400 audit(957.960:13888): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 958.064486][ T29] audit: type=1400 audit(957.960:13889): avc: denied { search } for pid=8159 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.064779][ T29] audit: type=1400 audit(957.960:13890): avc: denied { search } for pid=8159 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.070956][ T29] audit: type=1400 audit(957.980:13891): avc: denied { search } for pid=8159 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.086392][ T29] audit: type=1400 audit(958.000:13892): avc: denied { search } for pid=8159 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.087298][ T29] audit: type=1400 audit(958.000:13893): avc: denied { search } for pid=8159 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.054593][ T29] kauditd_printk_skb: 298 callbacks suppressed [ 963.058282][ T29] audit: type=1400 audit(962.960:14192): avc: denied { create } for pid=8184 comm="syz.1.1193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 963.100511][ T29] audit: type=1400 audit(963.010:14193): avc: denied { write } for pid=8184 comm="syz.1.1193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 963.126849][ T29] audit: type=1400 audit(963.040:14194): avc: denied { search } for pid=8185 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.128899][ T29] audit: type=1400 audit(963.040:14195): avc: denied { search } for pid=8185 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.129259][ T29] audit: type=1400 audit(963.040:14196): avc: denied { search } for pid=8185 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.188744][ T29] audit: type=1400 audit(963.100:14197): avc: denied { search } for pid=8172 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.318867][ T29] audit: type=1400 audit(963.230:14198): avc: denied { read write } for pid=3101 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 963.368796][ T29] audit: type=1400 audit(963.280:14199): avc: denied { module_request } for pid=7786 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 963.371315][ T29] audit: type=1400 audit(963.280:14200): avc: denied { read write open } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 963.395799][ T29] audit: type=1400 audit(963.310:14201): avc: denied { ioctl } for pid=3101 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 963.929554][ T8193] netlink: 'syz.1.1194': attribute type 10 has an invalid length. [ 963.929998][ T8193] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1194'. [ 963.931359][ T8193] macvlan0: entered promiscuous mode [ 963.931980][ T8193] macvlan0: entered allmulticast mode [ 963.932057][ T8193] veth1_vlan: entered allmulticast mode [ 964.001177][ T8193] A link change request failed with some changes committed already. Interface macvlan0 may have been left with an inconsistent configuration, please check. [ 967.224059][ T23] usb 2-1: new high-speed USB device number 22 using dummy_hcd [ 967.494896][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 967.496094][ T23] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 967.497096][ T23] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 967.498193][ T23] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 967.499047][ T23] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 967.536600][ T23] usb 2-1: config 0 descriptor?? [ 968.179094][ T29] kauditd_printk_skb: 389 callbacks suppressed [ 968.181097][ T29] audit: type=1400 audit(968.090:14591): avc: denied { sys_module } for pid=7786 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 968.186170][ T29] audit: type=1400 audit(968.100:14592): avc: denied { module_request } for pid=7786 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 968.210366][ T29] audit: type=1400 audit(968.120:14593): avc: denied { ioctl } for pid=8208 comm="syz.1.1196" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 968.222358][ T29] audit: type=1400 audit(968.130:14594): avc: denied { ioctl } for pid=8208 comm="syz.1.1196" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 968.277808][ T23] plantronics 0003:047F:FFFF.0002: reserved main item tag 0xd [ 968.322401][ T23] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 968.483411][ T29] audit: type=1400 audit(968.390:14595): avc: denied { search } for pid=8222 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 968.483820][ T29] audit: type=1400 audit(968.390:14596): avc: denied { search } for pid=8222 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 968.485976][ T29] audit: type=1400 audit(968.390:14597): avc: denied { search } for pid=8222 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 968.486050][ T29] audit: type=1400 audit(968.390:14598): avc: denied { getattr } for pid=8222 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=42 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 968.494670][ T29] audit: type=1400 audit(968.410:14599): avc: denied { search } for pid=8222 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 968.494904][ T29] audit: type=1400 audit(968.410:14600): avc: denied { search } for pid=8222 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 968.615109][ T9] usb 2-1: USB disconnect, device number 22 [ 970.111991][ T7786] veth0_vlan: entered promiscuous mode [ 970.143954][ T9] usb 2-1: new full-speed USB device number 23 using dummy_hcd [ 970.212198][ T7786] veth1_vlan: entered promiscuous mode [ 970.585809][ T7786] veth0_macvtap: entered promiscuous mode [ 970.648032][ T7786] veth1_macvtap: entered promiscuous mode [ 970.917927][ T9] usb 2-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=26.3f [ 970.918274][ T9] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 970.923542][ T9] usb 2-1: Product: syz [ 970.924017][ T9] usb 2-1: Manufacturer: syz [ 970.924184][ T9] usb 2-1: SerialNumber: syz [ 970.935361][ T9] usb 2-1: config 0 descriptor?? [ 971.016510][ T8082] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 971.020011][ T8082] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 971.021926][ T8082] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 971.024372][ T8082] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 973.191946][ T29] kauditd_printk_skb: 320 callbacks suppressed [ 973.192393][ T29] audit: type=1400 audit(973.100:14921): avc: denied { search } for pid=8265 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 973.192640][ T29] audit: type=1400 audit(973.100:14922): avc: denied { search } for pid=8265 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 973.192775][ T29] audit: type=1400 audit(973.100:14923): avc: denied { search } for pid=8265 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 973.192833][ T29] audit: type=1400 audit(973.100:14924): avc: denied { read open } for pid=8265 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 973.192880][ T29] audit: type=1400 audit(973.100:14925): avc: denied { getattr } for pid=8265 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 973.204246][ T29] audit: type=1400 audit(973.110:14926): avc: denied { search } for pid=8265 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 973.205035][ T29] audit: type=1400 audit(973.120:14927): avc: denied { search } for pid=8265 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 973.205424][ T29] audit: type=1400 audit(973.120:14928): avc: denied { search } for pid=8265 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 973.205838][ T29] audit: type=1400 audit(973.120:14929): avc: denied { search } for pid=8265 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 973.208072][ T29] audit: type=1400 audit(973.120:14930): avc: denied { ioctl } for pid=8264 comm="syz.0.1199" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 973.355501][ T23] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 973.642173][ T23] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 973.643922][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 973.644970][ T23] usb 1-1: Product: syz [ 973.645633][ T23] usb 1-1: Manufacturer: syz [ 973.646339][ T23] usb 1-1: SerialNumber: syz [ 974.202167][ T23] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPIPE [ 974.205566][ T23] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to sync IRQ enable register: -EPIPE [ 975.567097][ T23] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000010. ret = -EPIPE [ 975.587123][ T23] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00001000. ret = -EPIPE [ 975.831263][ T23] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to write register index 0x00000118. ret = -EPROTO [ 975.833478][ T23] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 975.845217][ T23] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 975.849294][ T23] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -71 [ 975.855786][ T23] usb 1-1: USB disconnect, device number 20 [ 977.273820][ T11] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 977.445222][ T11] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 977.445580][ T11] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 977.449115][ T11] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 977.451492][ T11] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 977.461979][ T11] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 977.480439][ T11] usb 1-1: config 0 descriptor?? [ 977.963875][ T11] plantronics 0003:047F:FFFF.0003: reserved main item tag 0xd [ 978.007445][ T11] plantronics 0003:047F:FFFF.0003: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 978.245636][ T29] kauditd_printk_skb: 351 callbacks suppressed [ 978.246033][ T29] audit: type=1400 audit(978.160:15282): avc: denied { ioctl } for pid=8285 comm="syz.0.1200" path="/dev/usb/hiddev0" dev="devtmpfs" ino=822 ioctlcmd=0x4813 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 978.268087][ T11] usb 1-1: USB disconnect, device number 21 [ 978.453472][ T29] audit: type=1400 audit(978.360:15283): avc: denied { read write } for pid=7786 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 978.486007][ T29] audit: type=1400 audit(978.370:15284): avc: denied { read write open } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 978.494598][ T29] audit: type=1400 audit(978.400:15285): avc: denied { ioctl } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 978.577705][ T29] audit: type=1400 audit(978.490:15286): avc: denied { ioctl } for pid=8246 comm="syz.1.1197" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 978.901025][ T29] audit: type=1400 audit(978.810:15287): avc: denied { create } for pid=8316 comm="syz.0.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 978.906534][ T29] audit: type=1400 audit(978.820:15288): avc: denied { write } for pid=8316 comm="syz.0.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 978.918026][ T29] audit: type=1400 audit(978.830:15289): avc: denied { write } for pid=8303 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 978.921162][ T29] audit: type=1400 audit(978.830:15290): avc: denied { create } for pid=8316 comm="syz.0.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 978.927290][ T29] audit: type=1400 audit(978.840:15291): avc: denied { module_request } for pid=8316 comm="syz.0.1201" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 980.899566][ T8326] syz.0.1202 uses obsolete (PF_INET,SOCK_PACKET) [ 981.551895][ T6145] usb 2-1: USB disconnect, device number 23 [ 983.455462][ T29] kauditd_printk_skb: 348 callbacks suppressed [ 983.457872][ T29] audit: type=1400 audit(983.360:15640): avc: denied { search } for pid=8348 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 983.459904][ T29] audit: type=1400 audit(983.370:15641): avc: denied { search } for pid=8348 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 983.460286][ T29] audit: type=1400 audit(983.370:15642): avc: denied { search } for pid=8348 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 983.466740][ T29] audit: type=1400 audit(983.380:15643): avc: denied { getattr } for pid=8348 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.dhcp" dev="tmpfs" ino=47 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 983.480000][ T29] audit: type=1400 audit(983.390:15644): avc: denied { search } for pid=8348 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 983.482019][ T29] audit: type=1400 audit(983.390:15645): avc: denied { search } for pid=8348 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 983.485360][ T29] audit: type=1400 audit(983.390:15646): avc: denied { search } for pid=8348 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 983.487364][ T29] audit: type=1400 audit(983.390:15647): avc: denied { search } for pid=8348 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 983.510551][ T29] audit: type=1400 audit(983.420:15648): avc: denied { remove_name search } for pid=8348 comm="rm" name="resolv.conf.eth1.dhcp" dev="tmpfs" ino=47 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 983.517165][ T29] audit: type=1400 audit(983.420:15649): avc: denied { unlink } for pid=8348 comm="rm" name="resolv.conf.eth1.dhcp" dev="tmpfs" ino=47 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 984.693627][ T11] usb 1-1: new full-speed USB device number 22 using dummy_hcd [ 985.112555][ T11] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ea [ 985.113844][ T11] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 985.113914][ T11] usb 1-1: Product: syz [ 985.113946][ T11] usb 1-1: Manufacturer: syz [ 985.113973][ T11] usb 1-1: SerialNumber: syz [ 985.149528][ T11] usb 1-1: config 0 descriptor?? [ 987.892311][ T1369] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 987.967971][ T1369] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 988.040615][ T1369] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 988.100380][ T1369] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 988.363802][ T1369] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 988.367998][ T1369] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 988.382762][ T1369] bond0 (unregistering): Released all slaves [ 988.446724][ T1369] hsr_slave_0: left promiscuous mode [ 988.448561][ T1369] hsr_slave_1: left promiscuous mode [ 988.459169][ T1369] veth1_macvtap: left promiscuous mode [ 988.459950][ T1369] veth0_macvtap: left promiscuous mode [ 988.467198][ T1369] veth1_vlan: left allmulticast mode [ 988.468331][ T1369] veth1_vlan: left promiscuous mode [ 988.468675][ T1369] veth0_vlan: left promiscuous mode [ 988.736266][ T29] kauditd_printk_skb: 241 callbacks suppressed [ 988.736647][ T29] audit: type=1400 audit(988.650:15891): avc: denied { sys_module } for pid=8382 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 988.740196][ T29] audit: type=1400 audit(988.650:15892): avc: denied { module_request } for pid=8382 comm="syz-executor" kmod="nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 989.024067][ T29] audit: type=1400 audit(988.920:15893): avc: denied { ioctl } for pid=8355 comm="syz.0.1206" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 989.091612][ T29] audit: type=1400 audit(989.000:15894): avc: denied { module_request } for pid=8382 comm="syz-executor" kmod="netdev-rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 989.331477][ T29] audit: type=1400 audit(989.240:15895): avc: denied { write } for pid=8402 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 989.334994][ T29] audit: type=1400 audit(989.240:15896): avc: denied { write open } for pid=8402 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 989.397720][ T29] audit: type=1400 audit(989.310:15897): avc: denied { sys_module } for pid=8382 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 989.401686][ T29] audit: type=1400 audit(989.310:15898): avc: denied { module_request } for pid=8382 comm="syz-executor" kmod="rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 989.695960][ T29] audit: type=1400 audit(989.610:15899): avc: denied { write } for pid=8404 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 989.698020][ T29] audit: type=1400 audit(989.610:15900): avc: denied { module_request } for pid=8382 comm="syz-executor" kmod="netdev-rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 993.350242][ T8382] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 993.369629][ T8382] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 993.765281][ T29] kauditd_printk_skb: 351 callbacks suppressed [ 993.773698][ T29] audit: type=1400 audit(993.680:16252): avc: denied { search } for pid=8460 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 993.938388][ T29] audit: type=1400 audit(993.850:16253): avc: denied { module_request } for pid=8382 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 994.176651][ T29] audit: type=1400 audit(994.080:16254): avc: denied { sys_module } for pid=8382 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 994.177013][ T29] audit: type=1400 audit(994.090:16255): avc: denied { module_request } for pid=8382 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 994.549071][ T29] audit: type=1400 audit(994.460:16256): avc: denied { module_request } for pid=8382 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 994.628383][ T29] audit: type=1400 audit(994.540:16257): avc: denied { write } for pid=8555 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 994.634290][ T29] audit: type=1400 audit(994.540:16258): avc: denied { write open } for pid=8555 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 994.807036][ T29] audit: type=1400 audit(994.720:16259): avc: denied { sys_module } for pid=8382 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 994.808649][ T29] audit: type=1400 audit(994.720:16260): avc: denied { module_request } for pid=8382 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 994.974655][ T29] audit: type=1400 audit(994.890:16261): avc: denied { write } for pid=8573 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 995.522658][ T11] usb 1-1: USB disconnect, device number 22 [ 995.972477][ T8382] hsr_slave_0: entered promiscuous mode [ 995.979395][ T8382] hsr_slave_1: entered promiscuous mode [ 995.980569][ T8382] debugfs: 'hsr0' already exists in 'hsr' [ 995.980846][ T8382] Cannot create hsr debugfs directory [ 996.220262][ T8621] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 996.349487][ T8621] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 996.477242][ T8621] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 996.561030][ T8621] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 996.738333][ T1369] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 996.776996][ T54] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 996.795180][ T1369] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 996.832031][ T7924] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 997.619967][ T8382] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 997.659459][ T8382] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 997.705063][ T8382] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 997.734079][ T8382] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 998.786686][ T29] kauditd_printk_skb: 296 callbacks suppressed [ 998.794156][ T29] audit: type=1400 audit(998.700:16558): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 998.794651][ T29] audit: type=1400 audit(998.700:16559): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 998.794929][ T29] audit: type=1400 audit(998.700:16560): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 998.795009][ T29] audit: type=1400 audit(998.700:16561): avc: denied { read open } for pid=8735 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 998.806207][ T29] audit: type=1400 audit(998.720:16562): avc: denied { getattr } for pid=8735 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 998.835920][ T29] audit: type=1400 audit(998.740:16563): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 998.836424][ T29] audit: type=1400 audit(998.740:16564): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 998.836680][ T29] audit: type=1400 audit(998.740:16565): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 998.836764][ T29] audit: type=1400 audit(998.740:16566): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 998.850506][ T29] audit: type=1400 audit(998.760:16567): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 999.194506][ T9] usb 1-1: new high-speed USB device number 23 using dummy_hcd [ 999.355738][ T9] usb 1-1: too many configurations: 88, using maximum allowed: 8 [ 999.389425][ T9] usb 1-1: config index 0 descriptor too short (expected 107, got 45) [ 999.440826][ T9] usb 1-1: config index 1 descriptor too short (expected 107, got 45) [ 999.480232][ T9] usb 1-1: config index 2 descriptor too short (expected 107, got 45) [ 999.519064][ T9] usb 1-1: config index 3 descriptor too short (expected 107, got 45) [ 999.554269][ T9] usb 1-1: config index 4 descriptor too short (expected 107, got 45) [ 999.594726][ T9] usb 1-1: config index 5 descriptor too short (expected 107, got 45) [ 999.633855][ T9] usb 1-1: config index 6 descriptor too short (expected 107, got 45) [ 999.662554][ T9] usb 1-1: config index 7 descriptor too short (expected 107, got 45) [ 999.728214][ T9] usb 1-1: New USB device found, idVendor=0424, idProduct=7850, bcdDevice= 0.00 [ 999.728535][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 999.734172][ T9] usb 1-1: Product: syz [ 999.734451][ T9] usb 1-1: Manufacturer: syz [ 999.734636][ T9] usb 1-1: SerialNumber: syz [ 1000.252265][ T9] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000098. ret = -EPIPE [ 1000.252554][ T9] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to sync IRQ enable register: -EPIPE [ 1001.619237][ T9] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00000010. ret = -EPIPE [ 1002.212007][ T8382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1002.954855][ T9] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to read register index 0x00001030. ret = -EPROTO [ 1002.956100][ T9] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Failed to write register index 0x0000011c. ret = -EPROTO [ 1002.956188][ T9] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Registers INIT FAILED.... [ 1002.956685][ T9] lan78xx 1-1:1.0 (unnamed net_device) (uninitialized): Bind routine FAILED [ 1002.959041][ T9] lan78xx 1-1:1.0: probe with driver lan78xx failed with error -71 [ 1002.991042][ T9] usb 1-1: USB disconnect, device number 23 [ 1003.578554][ T9] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 1003.614267][ T9] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1004.091276][ T29] kauditd_printk_skb: 397 callbacks suppressed [ 1004.098953][ T29] audit: type=1400 audit(1004.000:16965): avc: denied { search } for pid=8773 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1004.100668][ T29] audit: type=1400 audit(1004.000:16966): avc: denied { search } for pid=8773 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1004.100968][ T29] audit: type=1400 audit(1004.000:16967): avc: denied { search } for pid=8773 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1004.101163][ T29] audit: type=1400 audit(1004.010:16968): avc: denied { getattr } for pid=8773 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=53 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1004.107268][ T29] audit: type=1400 audit(1004.020:16969): avc: denied { search } for pid=8773 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1004.107384][ T29] audit: type=1400 audit(1004.020:16970): avc: denied { search } for pid=8773 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1004.107438][ T29] audit: type=1400 audit(1004.020:16971): avc: denied { search } for pid=8773 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1004.107501][ T29] audit: type=1400 audit(1004.020:16972): avc: denied { search } for pid=8773 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1004.112022][ T29] audit: type=1400 audit(1004.020:16973): avc: denied { remove_name search } for pid=8773 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=53 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1004.114574][ T29] audit: type=1400 audit(1004.020:16974): avc: denied { unlink } for pid=8773 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=53 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1007.384121][ T7324] usb 1-1: new high-speed USB device number 24 using dummy_hcd [ 1007.596912][ T7324] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1007.597143][ T7324] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1007.597300][ T7324] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1007.597406][ T7324] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1007.597453][ T7324] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1007.602683][ T7324] usb 1-1: config 0 descriptor?? [ 1008.199198][ T7324] plantronics 0003:047F:FFFF.0005: reserved main item tag 0xd [ 1008.255424][ T7324] plantronics 0003:047F:FFFF.0005: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1008.436372][ T9] usb 1-1: USB disconnect, device number 24 [ 1009.097906][ T29] kauditd_printk_skb: 390 callbacks suppressed [ 1009.099036][ T29] audit: type=1400 audit(1009.010:17365): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1009.100599][ T29] audit: type=1400 audit(1009.010:17366): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1009.102244][ T29] audit: type=1400 audit(1009.010:17367): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1009.104778][ T29] audit: type=1400 audit(1009.010:17368): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1009.113834][ T9] usb 1-1: new high-speed USB device number 25 using dummy_hcd [ 1009.118416][ T29] audit: type=1400 audit(1009.030:17369): avc: denied { add_name search } for pid=8810 comm="dhcpcd-run-hook" name="resolv.conf.eth3.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1009.122001][ T29] audit: type=1400 audit(1009.030:17370): avc: denied { create } for pid=8810 comm="dhcpcd-run-hook" name="resolv.conf.eth3.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1009.134774][ T29] audit: type=1400 audit(1009.040:17371): avc: denied { write open } for pid=8810 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=55 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1009.150547][ T29] audit: type=1400 audit(1009.060:17372): avc: denied { ioctl } for pid=8830 comm="syz.0.1220" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1009.172251][ T29] audit: type=1400 audit(1009.070:17373): avc: denied { search } for pid=8810 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1009.172661][ T29] audit: type=1400 audit(1009.080:17374): avc: denied { ioctl } for pid=8830 comm="syz.0.1220" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1009.350454][ T9] usb 1-1: New USB device found, idVendor=056e, idProduct=4010, bcdDevice=20.1c [ 1009.351421][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1009.366694][ T9] usb 1-1: config 0 descriptor?? [ 1011.807848][ T9] pegasus 1-1:0.0: setup Pegasus II specific registers [ 1013.166119][ T9] pegasus 1-1:0.0: can't locate MII phy, using default [ 1013.180633][ T9] pegasus 1-1:0.0: eth1, ELECOM USB Ethernet LD-USB20, 2a:48:27:01:7e:af [ 1013.192331][ T9] usb 1-1: USB disconnect, device number 25 [ 1014.129406][ T8382] veth0_vlan: entered promiscuous mode [ 1014.184206][ T29] kauditd_printk_skb: 301 callbacks suppressed [ 1014.188064][ T29] audit: type=1400 audit(1014.090:17676): avc: denied { create } for pid=8875 comm="syz.0.1222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1014.192777][ T29] audit: type=1400 audit(1014.100:17677): avc: denied { bind } for pid=8875 comm="syz.0.1222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1014.207264][ T29] audit: type=1400 audit(1014.120:17678): avc: denied { module_request } for pid=8875 comm="syz.0.1222" kmod="crypto-ecb-twofish-avx" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1014.335240][ T8382] veth1_vlan: entered promiscuous mode [ 1014.525063][ T8382] veth0_macvtap: entered promiscuous mode [ 1014.573635][ T8382] veth1_macvtap: entered promiscuous mode [ 1014.596342][ T29] audit: type=1400 audit(1014.510:17679): avc: denied { module_request } for pid=8875 comm="syz.0.1222" kmod="crypto-ecb-twofish-avx-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1014.663938][ T29] audit: type=1400 audit(1014.570:17680): avc: denied { write } for pid=8880 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1014.666212][ T29] audit: type=1400 audit(1014.580:17681): avc: denied { write open } for pid=8880 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1014.709166][ T29] audit: type=1400 audit(1014.620:17682): avc: denied { setopt } for pid=8875 comm="syz.0.1222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1014.729610][ T29] audit: type=1400 audit(1014.640:17683): avc: denied { accept } for pid=8875 comm="syz.0.1222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1014.740248][ T29] audit: type=1400 audit(1014.650:17684): avc: denied { search } for pid=8880 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1014.742004][ T29] audit: type=1400 audit(1014.650:17685): avc: denied { search } for pid=8880 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1014.927858][ T8082] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1014.928453][ T8082] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1014.928514][ T8082] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1014.928545][ T8082] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1015.604095][ T8889] input: syz1 as /devices/virtual/input/input8 [ 1016.014204][ T41] usb 1-1: new high-speed USB device number 26 using dummy_hcd [ 1016.347844][ T41] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1016.348172][ T41] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1016.353707][ T41] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1016.354075][ T41] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1016.354173][ T41] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1016.364928][ T41] usb 1-1: config 0 descriptor?? [ 1016.889377][ T41] plantronics 0003:047F:FFFF.0006: reserved main item tag 0xd [ 1016.955198][ T41] plantronics 0003:047F:FFFF.0006: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1017.082628][ T41] usb 1-1: USB disconnect, device number 26 [ 1019.268812][ T29] kauditd_printk_skb: 418 callbacks suppressed [ 1019.269958][ T29] audit: type=1400 audit(1019.180:18104): avc: denied { ioctl } for pid=8930 comm="syz.1.1226" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1019.337798][ T29] audit: type=1400 audit(1019.250:18105): avc: denied { ioctl } for pid=8930 comm="syz.1.1226" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1019.377086][ T29] audit: type=1400 audit(1019.290:18106): avc: denied { write } for pid=8932 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1019.381135][ T29] audit: type=1400 audit(1019.290:18107): avc: denied { write open } for pid=8932 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1019.395951][ T8846] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 1019.416628][ T29] audit: type=1400 audit(1019.330:18108): avc: denied { search } for pid=8932 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1019.423632][ T29] audit: type=1400 audit(1019.330:18109): avc: denied { search } for pid=8932 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1019.427489][ T29] audit: type=1400 audit(1019.330:18110): avc: denied { search } for pid=8932 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1019.432060][ T29] audit: type=1400 audit(1019.330:18111): avc: denied { search } for pid=8932 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1019.462442][ T29] audit: type=1400 audit(1019.370:18112): avc: denied { ioctl } for pid=8930 comm="syz.1.1226" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1019.501221][ T29] audit: type=1400 audit(1019.410:18113): avc: denied { ioctl } for pid=8930 comm="syz.1.1226" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1019.772487][ T8846] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 1019.772818][ T8846] usb 2-1: config 0 interface 0 has no altsetting 0 [ 1019.927826][ T8846] usb 2-1: New USB device found, idVendor=10fd, idProduct=1513, bcdDevice=7e.ce [ 1019.928183][ T8846] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1019.931809][ T8846] usb 2-1: Product: syz [ 1019.932111][ T8846] usb 2-1: Manufacturer: syz [ 1019.932303][ T8846] usb 2-1: SerialNumber: syz [ 1019.962283][ T8846] usb 2-1: config 0 descriptor?? [ 1020.299883][ T8931] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1020.300870][ T8931] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1021.773728][ T41] usb 1-1: new high-speed USB device number 27 using dummy_hcd [ 1022.005354][ T41] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1022.005737][ T41] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1022.012623][ T41] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1022.013745][ T41] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1022.013924][ T41] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1022.039066][ T41] usb 1-1: config 0 descriptor?? [ 1022.597257][ T41] plantronics 0003:047F:FFFF.0007: reserved main item tag 0xd [ 1022.634701][ T41] plantronics 0003:047F:FFFF.0007: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1022.793833][ T8846] usb 1-1: USB disconnect, device number 27 [ 1024.281918][ T29] kauditd_printk_skb: 559 callbacks suppressed [ 1024.284973][ T29] audit: type=1400 audit(1024.190:18673): avc: denied { search } for pid=8991 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1024.285343][ T29] audit: type=1400 audit(1024.190:18674): avc: denied { search } for pid=8991 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1024.285553][ T29] audit: type=1400 audit(1024.190:18675): avc: denied { search } for pid=8991 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1024.335720][ T29] audit: type=1400 audit(1024.250:18676): avc: denied { search } for pid=8983 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1024.579811][ T29] audit: type=1400 audit(1024.490:18677): avc: denied { write } for pid=8992 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1024.580276][ T29] audit: type=1400 audit(1024.490:18678): avc: denied { write open } for pid=8992 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1024.624376][ T29] audit: type=1400 audit(1024.530:18679): avc: denied { search } for pid=8992 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1024.627096][ T29] audit: type=1400 audit(1024.540:18680): avc: denied { search } for pid=8992 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1024.632600][ T29] audit: type=1400 audit(1024.540:18681): avc: denied { search } for pid=8992 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1024.644447][ T29] audit: type=1400 audit(1024.540:18682): avc: denied { search } for pid=8992 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1025.894397][ T8999] netlink: 64 bytes leftover after parsing attributes in process `syz.0.1230'. [ 1025.897267][ T8999] block nbd0: not configured, cannot reconfigure [ 1026.204126][ T9001] raw_sendmsg: syz.0.1231 forgot to set AF_INET. Fix it! [ 1027.583918][ T7324] usb 1-1: new high-speed USB device number 28 using dummy_hcd [ 1027.746664][ T7324] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1027.747059][ T7324] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1027.749925][ T7324] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1027.750265][ T7324] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1027.750329][ T7324] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1027.784954][ T7324] usb 1-1: config 0 descriptor?? [ 1028.317977][ T7324] usbhid 1-1:0.0: can't add hid device: -71 [ 1028.318297][ T7324] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 1028.324108][ T7324] usb 1-1: USB disconnect, device number 28 [ 1028.743722][ T7324] usb 1-1: new high-speed USB device number 29 using dummy_hcd [ 1028.909503][ T7324] usb 1-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 1028.909826][ T7324] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 1028.913878][ T7324] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 1028.914271][ T7324] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1028.914534][ T7324] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1028.914642][ T7324] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1028.933916][ T7324] usb 1-1: config 0 descriptor?? [ 1029.395025][ T29] kauditd_printk_skb: 392 callbacks suppressed [ 1029.395647][ T29] audit: type=1400 audit(1029.310:19075): avc: denied { ioctl } for pid=9025 comm="syz.0.1234" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1029.415172][ T29] audit: type=1400 audit(1029.320:19076): avc: denied { ioctl } for pid=9025 comm="syz.0.1234" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1029.418501][ T7324] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1029.419038][ T7324] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1029.419167][ T7324] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1029.419264][ T7324] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1029.419358][ T7324] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1029.419460][ T7324] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1029.419554][ T7324] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1029.419647][ T7324] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1029.419737][ T7324] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1029.419830][ T7324] plantronics 0003:047F:FFFF.0008: unknown main item tag 0x0 [ 1029.458197][ T7324] plantronics 0003:047F:FFFF.0008: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1029.619406][ T29] audit: type=1400 audit(1029.530:19077): avc: denied { read } for pid=9025 comm="syz.0.1234" name="hiddev0" dev="devtmpfs" ino=846 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1029.621546][ T29] audit: type=1400 audit(1029.530:19078): avc: denied { read open } for pid=9025 comm="syz.0.1234" path="/dev/usb/hiddev0" dev="devtmpfs" ino=846 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1029.726065][ T29] audit: type=1400 audit(1029.640:19079): avc: denied { ioctl } for pid=9025 comm="syz.0.1234" path="/dev/usb/hiddev0" dev="devtmpfs" ino=846 ioctlcmd=0x480f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1029.731715][ T8846] usb 1-1: USB disconnect, device number 29 [ 1029.845558][ T29] audit: type=1400 audit(1029.760:19080): avc: denied { read write } for pid=7786 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1029.849993][ T29] audit: type=1400 audit(1029.760:19081): avc: denied { read write open } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1029.857650][ T29] audit: type=1400 audit(1029.770:19082): avc: denied { ioctl } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1030.125277][ T29] audit: type=1400 audit(1030.040:19083): avc: denied { read write } for pid=7786 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1030.128040][ T29] audit: type=1400 audit(1030.040:19084): avc: denied { read write open } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1030.318190][ T8846] usb 2-1: USB disconnect, device number 24 [ 1031.183799][ T8846] usb 2-1: new full-speed USB device number 25 using dummy_hcd [ 1031.392806][ T8846] usb 2-1: New USB device found, idVendor=174f, idProduct=6a31, bcdDevice=26.3f [ 1031.394609][ T8846] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1031.395699][ T8846] usb 2-1: Product: syz [ 1031.396318][ T8846] usb 2-1: Manufacturer: syz [ 1031.397105][ T8846] usb 2-1: SerialNumber: syz [ 1031.410927][ T8846] usb 2-1: config 0 descriptor?? [ 1031.414971][ T9] usb 1-1: new high-speed USB device number 30 using dummy_hcd [ 1031.612181][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1031.614240][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1031.615635][ T9] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1031.616718][ T9] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1031.617857][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1031.637923][ T9] usb 1-1: config 0 descriptor?? [ 1032.162455][ T9] usbhid 1-1:0.0: can't add hid device: -71 [ 1032.166811][ T9] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 1032.178877][ T9] usb 1-1: USB disconnect, device number 30 [ 1033.594339][ T7324] usb 1-1: new high-speed USB device number 31 using dummy_hcd [ 1033.744243][ T7324] usb 1-1: Using ep0 maxpacket: 8 [ 1033.770608][ T7324] usb 1-1: unable to get BOS descriptor or descriptor too short [ 1033.796806][ T7324] usb 1-1: config 3 has an invalid interface number: 40 but max is 0 [ 1033.797144][ T7324] usb 1-1: config 3 has no interface number 0 [ 1033.799688][ T7324] usb 1-1: config 3 interface 40 altsetting 0 bulk endpoint 0x4 has invalid maxpacket 32 [ 1033.799995][ T7324] usb 1-1: config 3 interface 40 altsetting 0 bulk endpoint 0x8 has invalid maxpacket 64 [ 1033.836285][ T7324] usb 1-1: New USB device found, idVendor=1a72, idProduct=1002, bcdDevice=60.21 [ 1033.836599][ T7324] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1033.836775][ T7324] usb 1-1: Product: syz [ 1033.836966][ T7324] usb 1-1: Manufacturer: syz [ 1033.837124][ T7324] usb 1-1: SerialNumber: syz [ 1033.877476][ T9093] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 1033.887881][ T9093] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 1034.135716][ T7324] ftdi_sio 1-1:3.40: FTDI USB Serial Device converter detected [ 1034.138797][ T7324] ftdi_sio ttyUSB0: unknown device type: 0x6021 [ 1034.161480][ T7324] usb 1-1: USB disconnect, device number 31 [ 1034.190184][ T7324] ftdi_sio 1-1:3.40: device disconnected [ 1034.438521][ T29] kauditd_printk_skb: 137 callbacks suppressed [ 1034.441837][ T29] audit: type=1400 audit(1034.350:19222): avc: denied { read } for pid=9111 comm="syz.0.1243" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1034.442214][ T29] audit: type=1400 audit(1034.350:19223): avc: denied { read open } for pid=9111 comm="syz.0.1243" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1034.451401][ T29] audit: type=1400 audit(1034.360:19224): avc: denied { create } for pid=9111 comm="syz.0.1243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1034.460856][ T29] audit: type=1400 audit(1034.370:19225): avc: denied { write } for pid=9111 comm="syz.0.1243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1034.469929][ T29] audit: type=1400 audit(1034.380:19226): avc: denied { module_request } for pid=9111 comm="syz.0.1243" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1034.620853][ T29] audit: type=1400 audit(1034.530:19227): avc: denied { read } for pid=9111 comm="syz.0.1243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1034.628520][ T29] audit: type=1400 audit(1034.540:19228): avc: denied { write } for pid=9111 comm="syz.0.1243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1034.685354][ T29] audit: type=1400 audit(1034.600:19229): avc: denied { read write } for pid=7786 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1034.688622][ T29] audit: type=1400 audit(1034.600:19230): avc: denied { read write open } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1034.694333][ T29] audit: type=1400 audit(1034.610:19231): avc: denied { ioctl } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1035.654075][ T7324] usb 1-1: new high-speed USB device number 32 using dummy_hcd [ 1035.849877][ T7324] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1035.853601][ T7324] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1035.854674][ T7324] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1035.854971][ T7324] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1035.855287][ T7324] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1035.870716][ T7324] usb 1-1: config 0 descriptor?? [ 1036.400385][ T7324] usbhid 1-1:0.0: can't add hid device: -71 [ 1036.400913][ T7324] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 1036.417099][ T7324] usb 1-1: USB disconnect, device number 32 [ 1039.530633][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 1039.532415][ T29] audit: type=1400 audit(1039.440:19269): avc: denied { read write } for pid=7786 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1039.543696][ T29] audit: type=1400 audit(1039.450:19270): avc: denied { read write open } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1039.545629][ T29] audit: type=1400 audit(1039.450:19271): avc: denied { ioctl } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1039.706246][ T29] audit: type=1400 audit(1039.620:19272): avc: denied { create } for pid=9138 comm="syz.0.1248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1039.712373][ T29] audit: type=1400 audit(1039.620:19273): avc: denied { write } for pid=9138 comm="syz.0.1248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1039.717830][ T9139] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1248'. [ 1039.779458][ T29] audit: type=1400 audit(1039.690:19274): avc: denied { read write } for pid=7786 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1039.785561][ T29] audit: type=1400 audit(1039.690:19275): avc: denied { read write open } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1039.796889][ T29] audit: type=1400 audit(1039.710:19276): avc: denied { ioctl } for pid=7786 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1040.419186][ T29] audit: type=1400 audit(1040.330:19277): avc: denied { read write } for pid=9140 comm="syz.0.1249" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1040.425418][ T29] audit: type=1400 audit(1040.330:19278): avc: denied { read write open } for pid=9140 comm="syz.0.1249" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1040.673722][ T41] usb 1-1: new high-speed USB device number 33 using dummy_hcd [ 1040.841563][ T41] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1040.842007][ T41] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1040.846063][ T41] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1040.846589][ T41] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1040.846750][ T41] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1040.861698][ T41] usb 1-1: config 0 descriptor?? [ 1041.412476][ T41] usbhid 1-1:0.0: can't add hid device: -71 [ 1041.413655][ T41] usbhid 1-1:0.0: probe with driver usbhid failed with error -71 [ 1041.419559][ T41] usb 1-1: USB disconnect, device number 33 [ 1041.705778][ T41] usb 2-1: USB disconnect, device number 25 [ 1041.997222][ T9166] misc userio: Invalid payload size [ 1042.982519][ T9177] genirq: Flags mismatch irq 32. 00200001 (comedi_parport) vs. 00200081 (virtio1) [ 1042.984579][ T9177] 8<--- cut here --- [ 1042.984691][ T9177] Unable to handle kernel paging request at virtual address fee04f27 when write [ 1042.984796][ T9177] [fee04f27] *pgd=80000080007003, *pmd=00000000 [ 1042.985721][ T9177] Internal error: Oops: a06 [#1] SMP ARM [ 1042.988437][ T9177] Modules linked in: [ 1042.988898][ T9177] CPU: 1 UID: 0 PID: 9177 Comm: syz.0.1253 Not tainted syzkaller #0 PREEMPT [ 1042.989499][ T9177] Hardware name: ARM-Versatile Express [ 1042.989743][ T9177] PC is at parport_attach+0x174/0x1d0 [ 1042.990474][ T9177] LR is at parport_attach+0x164/0x1d0 [ 1042.991098][ T9177] pc : [<813d34f0>] lr : [<813d34e0>] psr: 60000013 [ 1042.991392][ T9177] sp : ea8c1d30 ip : ea8c1d30 fp : ea8c1d54 [ 1042.991872][ T9177] r10: 82b258f8 r9 : 00000003 r8 : 84166300 [ 1042.992122][ T9177] r7 : ea8c1d90 r6 : 84166300 r5 : 00000000 r4 : 00000000 [ 1042.992446][ T9177] r3 : fee04f27 r2 : 81e17a5c r1 : 00000001 r0 : 813d3160 [ 1042.992870][ T9177] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1042.993315][ T9177] Control: 30c5387d Table: 85ba2fc0 DAC: 00000000 [ 1042.993679][ T9177] Register r0 information: non-slab/vmalloc memory [ 1042.994573][ T9177] Register r1 information: non-paged memory [ 1042.994852][ T9177] Register r2 information: non-slab/vmalloc memory [ 1042.995135][ T9177] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 1042.995693][ T9177] Register r4 information: NULL pointer [ 1042.995932][ T9177] Register r5 information: NULL pointer [ 1042.996158][ T9177] Register r6 information: slab kmalloc-192 start 84166300 pointer offset 0 size 192 [ 1042.997047][ T9177] Register r7 information: 2-page vmalloc region starting at 0xea8c0000 allocated at kernel_clone+0xac/0x3ec [ 1042.997499][ T9177] Register r8 information: slab kmalloc-192 start 84166300 pointer offset 0 size 192 [ 1042.997915][ T9177] Register r9 information: non-paged memory [ 1042.998191][ T9177] Register r10 information: non-slab/vmalloc memory [ 1042.998467][ T9177] Register r11 information: 2-page vmalloc region starting at 0xea8c0000 allocated at kernel_clone+0xac/0x3ec [ 1042.998890][ T9177] Register r12 information: 2-page vmalloc region starting at 0xea8c0000 allocated at kernel_clone+0xac/0x3ec [ 1042.999394][ T9177] Process syz.0.1253 (pid: 9177, stack limit = 0xea8c0000) [ 1042.999699][ T9177] Stack: (0xea8c1d30 to 0xea8c2000) [ 1042.999921][ T9177] 1d20: 8242a638 84166300 829d1ab4 829d1ab4 [ 1043.000241][ T9177] 1d40: 81e17f1c 84166344 ea8c1d8c ea8c1d58 813cf580 813d3388 200000c0 00000000 [ 1043.000575][ T9177] 1d60: ea8c1d7c 200000c0 84166300 b5403587 200000c0 85679800 40946400 00000003 [ 1043.000884][ T9177] 1d80: ea8c1e4c ea8c1d90 813cb0d8 813cf484 656d6f63 705f6964 6f707261 00007472 [ 1043.001186][ T9177] 1da0: 00000000 00004f27 00000020 00010000 10000004 00000008 ffeffbf9 00000008 [ 1043.001505][ T9177] 1dc0: 40000000 04800000 00100100 fffffff9 00000001 00000004 fffffffe 00000403 [ 1043.001829][ T9177] 1de0: 0000000f fffffffc 00000000 00000003 40000003 00000089 fffffffd 00000000 [ 1043.002170][ T9177] 1e00: 20001e55 0400000b 00000fff 00000001 00000008 00000007 08000000 00000001 [ 1043.002516][ T9177] 1e20: 00000000 7e8209b4 00000000 84b913c0 84166300 200000c0 200000c0 85679800 [ 1043.002839][ T9177] 1e40: ea8c1f14 ea8c1e50 813cc0a4 813cafe4 00000000 ea8c1e54 ea8c1e54 7e8209b4 [ 1043.003517][ T9177] 1e60: 00000000 00000000 8249b5e4 0000005f 83b1cc28 84166330 8417451c 85679800 [ 1043.004002][ T9177] 1e80: ea8c1ee4 ea8c1e90 807ad8f8 807a3e1c 00000064 00000001 00000000 ea8c1eac [ 1043.004423][ T9177] 1ea0: 85c040d0 834233b8 00006400 0000000b ea8c1ea0 00000000 ea8c1d40 7e8209b4 [ 1043.004860][ T9177] 1ec0: 84b913c0 40946400 200000c0 200000c0 84b913c0 00000003 ea8c1ef4 ea8c1ee8 [ 1043.005177][ T9177] 1ee0: 807ada18 7e8209b4 ea8c1f14 40946400 00000000 84b913c1 200000c0 84b913c0 [ 1043.005504][ T9177] 1f00: 00000003 85679800 ea8c1fa4 ea8c1f18 8057da6c 813cbad4 ecac8b10 85679800 [ 1043.005816][ T9177] 1f20: ea8c1f3c ea8c1f30 81a68b84 81a68a54 ea8c1f54 ea8c1f40 8025b5c8 8028dcd4 [ 1043.006160][ T9177] 1f40: ea8c1fb0 40000000 ea8c1f84 ea8c1f58 802219ec 8025b584 00000000 8281d0bc [ 1043.006489][ T9177] 1f60: ea8c1fb0 0014c880 ecac8b10 80221940 00000000 7e8209b4 ea8c1fac 00000000 [ 1043.006945][ T9177] 1f80: 00000000 00316310 00000036 8020029c 85679800 00000036 00000000 ea8c1fa8 [ 1043.007316][ T9177] 1fa0: 80200060 8057d948 00000000 00000000 00000003 40946400 200000c0 00000000 [ 1043.007635][ T9177] 1fc0: 00000000 00000000 00316310 00000036 00300000 00000000 00006364 76fa60bc [ 1043.007949][ T9177] 1fe0: 76fa5ec0 76fa5eb0 0001929c 00132320 60000010 00000003 00000000 00000000 [ 1043.008286][ T9177] Call trace: [ 1043.008493][ T9177] [<813d337c>] (parport_attach) from [<813cf580>] (comedi_device_attach+0x108/0x250) [ 1043.008886][ T9177] r6:84166344 r5:81e17f1c r4:829d1ab4 [ 1043.009097][ T9177] [<813cf478>] (comedi_device_attach) from [<813cb0d8>] (do_devconfig_ioctl+0x100/0x220) [ 1043.009496][ T9177] r10:00000003 r9:40946400 r8:85679800 r7:200000c0 r6:b5403587 r5:84166300 [ 1043.009812][ T9177] r4:200000c0 [ 1043.009973][ T9177] [<813cafd8>] (do_devconfig_ioctl) from [<813cc0a4>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 1043.010389][ T9177] r8:85679800 r7:200000c0 r6:200000c0 r5:84166300 r4:84b913c0 [ 1043.010649][ T9177] [<813cbac8>] (comedi_unlocked_ioctl) from [<8057da6c>] (sys_ioctl+0x130/0xba0) [ 1043.011009][ T9177] r10:85679800 r9:00000003 r8:84b913c0 r7:200000c0 r6:84b913c1 r5:00000000 [ 1043.011313][ T9177] r4:40946400 [ 1043.011464][ T9177] [<8057d93c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1043.011814][ T9177] Exception stack(0xea8c1fa8 to 0xea8c1ff0) [ 1043.012054][ T9177] 1fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 1043.012388][ T9177] 1fc0: 00000000 00000000 00316310 00000036 00300000 00000000 00006364 76fa60bc [ 1043.012702][ T9177] 1fe0: 76fa5ec0 76fa5eb0 0001929c 00132320 [ 1043.013118][ T9177] r10:00000036 r9:85679800 r8:8020029c r7:00000036 r6:00316310 r5:00000000 [ 1043.013537][ T9177] r4:00000000 [ 1043.013928][ T9177] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 1043.014667][ T9177] ---[ end trace 0000000000000000 ]--- [ 1043.015443][ T9177] Kernel panic - not syncing: Fatal exception [ 1043.017801][ T9177] Rebooting in 86400 seconds.. VM DIAGNOSIS: 09:44:27 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=00000000 R02=82ae8f58 R03=81a75ea4 R04=82ae9f58 R05=ebb11ccc R06=807a2e5c R07=0000034f R08=82ae9f5c R09=807a2664 R10=82ae9f60 R11=ebb11d8c R12=ebb11ca8 R13=ebb11d38 R14=8029007c R15=8022ae44 PSR=600f0013 -ZC- A S svc32 s00=72697628 s01=316f6974 d00=316f697472697628 s02=63282031 s03=64656d6f d01=64656d6f63282031 s04=7375205d s05=64696862 d02=646968627375205d s06=312d3120 s07=302e303a d03=302e303a312d3120 s08=7270203a s09=2065626f d04=2065626f7270203a s10=68746977 s11=69726420 d05=6972642068746977 s12=20726576 s13=68627375 d06=6862737520726576 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=3ffff29e R01=bffff29e R02=3ffff29e R03=80000193 R04=ea8c1ab4 R05=0000002b R06=dddd93d5 R07=00000000 R08=00000000 R09=00000000 R10=82827198 R11=ea8c1a5c R12=00000000 R13=ea8c1a48 R14=0000000c R15=802e6000 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000