last executing test programs: 49.475583413s ago: executing program 0 (id=448): openat$fuse(0xffffffffffffff9c, &(0x7f0000000140), 0x42, 0x0) socket(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000140)) socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x9, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socket$igmp6(0xa, 0x3, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00') socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socket$inet_udplite(0x2, 0x2, 0x88) socket(0x10, 0x80002, 0x0) socket$nl_generic(0x10, 0x3, 0x10) creat(&(0x7f0000000040)='./bus\x00', 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="1f003300d000000008021100000108021100000050505050505000001502", @ANYRES8=r0], 0x3c}}, 0x0) 49.040887706s ago: executing program 0 (id=449): r0 = syz_usb_connect(0x0, 0x3f, &(0x7f0000000540)=ANY=[@ANYBLOB="11010000733336088dee1edb23610000000109022d0101100000000904000003fe03010009cd8d1f0002000000090505020000fcffff09058b1e20"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x0) ppoll(&(0x7f0000001380)=[{r1}], 0x1, &(0x7f00000013c0)={0x0, 0x989680}, 0x0, 0x0) 34.650315981s ago: executing program 0 (id=461): sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000400)={@link_local={0x3}, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x4, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x4, 0x0, 0x12, 0x6, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @loopback, @multicast2}, "00186371ae9b1c03"}}}}}, 0x0) 34.54941191s ago: executing program 0 (id=462): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_open_procfs(0x0, 0x0) socket$packet(0x11, 0x3, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000001e000085000000820000009500"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) fsmount(0xffffffffffffffff, 0x1, 0x6) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) socket(0x10, 0x3, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x0) 18.560531982s ago: executing program 0 (id=468): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="12013f00000000407f04ffff000000000001090224000100000000090400001503000000092140000001220f00090581", @ANYRES16], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00220f000000079b4d"], 0x0}, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000500)={0x2c, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="20010100"], 0x0}) syz_open_dev$hiddev(&(0x7f0000000d40), 0x0, 0x4000) 16.589866052s ago: executing program 1 (id=469): r0 = socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = getpid() r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r3 = dup(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000007, 0x38011, r3, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1) process_vm_readv(r1, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r4 = getpid() process_vm_readv(r4, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xfffffffe, 0x1ff) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000003c0)='projid_map\x00') r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpu.stat\x00', 0x26e1, 0x0) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000a300)) ioctl$SIOCSIFHWADDR(r7, 0x8b19, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000004c0)={'geneve0\x00', 0x0}) sendto$packet(r5, &(0x7f0000000000)="0b05299749150300060047888981fbc1f4d350ec429caa96a13bb1000000000088a8400f", 0x18, 0x20000885, &(0x7f0000000140)={0x11, 0xf6, r8, 0x1, 0x2, 0x6, @broadcast}, 0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newlink={0x3c, 0x10, 0x40d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_IFNAME={0x14, 0x3, 'bridge0\x00'}, @IFLA_MASTER={0x8, 0xa, r9}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 16.159782555s ago: executing program 1 (id=470): r0 = socket$packet(0x11, 0x3, 0x300) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x7, 0x4) r4 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'vlan0\x00', 0x0}) sendto$packet(r0, &(0x7f00000002c0)="05030500d3fc030000004788031c09101128", 0xfce0, 0x4, &(0x7f0000000140)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) 8.839901557s ago: executing program 1 (id=471): r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xd18c9b25, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e03002a000b05d25a806c8c6f94f90424fc601100077a0a000312050282c137153e370e0c1180fc0b0c000300", 0x33fe0}], 0x1}, 0x0) 8.678842277s ago: executing program 1 (id=472): syz_open_dev$sndctrl(0x0, 0x1, 0x100c2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x42, 0x40, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000001a40), 0x1003, r3}, 0x38) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000001d40)={r3, &(0x7f0000001b80), &(0x7f0000001c40)=""/245}, 0x20) 3.718376934s ago: executing program 0 (id=473): r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/xfrm_stat\x00') prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x4e20a000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r4}, 0x10) rt_sigprocmask(0x0, &(0x7f000078b000)={[0xfffffffffffffffd]}, 0x0, 0x8) preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000280)=""/173, 0xad}], 0x1, 0xfffffffc, 0x0) 149.347321ms ago: executing program 1 (id=474): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 0s ago: executing program 1 (id=475): r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000500)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6, 0x24, 0x1a, 0x0, 0x8}}, {{0x9, 0x5, 0x81, 0x3, 0x40}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x20, 0x80, 0x1c, {0x0, 0x0, 0x1000, 0x0, 0xffff, 0x2, 0xffff, 0x7fff}}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000f40)={0x84, &(0x7f0000000b40)={0x0, 0xc, 0x2, "175d"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) kernel console output (not intermixed with test programs): syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 690.783452][ T31] audit: type=1400 audit(690.716:2587): avc: denied { module_request } for pid=6312 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 690.857032][ T31] audit: type=1400 audit(690.796:2588): avc: denied { sys_module } for pid=6312 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 690.857647][ T31] audit: type=1400 audit(690.796:2589): avc: denied { module_request } for pid=6312 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 690.933496][ T31] audit: type=1400 audit(690.866:2590): avc: denied { module_request } for pid=6312 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 691.025812][ T31] audit: type=1400 audit(690.966:2591): avc: denied { sys_module } for pid=6312 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 691.585847][ T6312] veth0_vlan: entered promiscuous mode [ 691.614911][ T6312] veth1_vlan: entered promiscuous mode [ 691.710154][ T6312] veth0_macvtap: entered promiscuous mode [ 691.726141][ T6312] veth1_macvtap: entered promiscuous mode [ 691.810284][ T6312] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 691.810864][ T6312] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 691.811245][ T6312] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 691.811640][ T6312] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 692.178645][ T6671] netlink: 8 bytes leftover after parsing attributes in process `syz.0.350'. [ 695.535393][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 695.535506][ T31] audit: type=1400 audit(695.476:2625): avc: denied { prog_load } for pid=6679 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 695.543247][ T31] audit: type=1400 audit(695.476:2626): avc: denied { bpf } for pid=6679 comm="syz.0.353" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 695.544001][ T31] audit: type=1400 audit(695.476:2627): avc: denied { perfmon } for pid=6679 comm="syz.0.353" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 695.562338][ T31] audit: type=1400 audit(695.496:2628): avc: denied { prog_run } for pid=6679 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 695.592192][ T31] audit: type=1400 audit(695.526:2629): avc: denied { map_create } for pid=6679 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 695.593853][ T31] audit: type=1400 audit(695.536:2630): avc: denied { map_read map_write } for pid=6679 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 699.821156][ T2906] usb 2-1: USB disconnect, device number 7 [ 700.007172][ T31] audit: type=1400 audit(699.946:2631): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 700.013743][ T31] audit: type=1400 audit(699.956:2632): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 700.015497][ T31] audit: type=1400 audit(699.956:2633): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 700.463837][ T31] audit: type=1400 audit(700.396:2634): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 700.619148][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 700.619264][ T31] audit: type=1400 audit(700.556:2637): avc: denied { read } for pid=6691 comm="syz.1.355" name="usbmon0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 700.620458][ T31] audit: type=1400 audit(700.556:2638): avc: denied { open } for pid=6691 comm="syz.1.355" path="/dev/usbmon0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 700.633033][ T31] audit: type=1400 audit(700.566:2639): avc: denied { prog_load } for pid=6691 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 700.633989][ T31] audit: type=1400 audit(700.566:2640): avc: denied { bpf } for pid=6691 comm="syz.1.355" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 700.640541][ T31] audit: type=1400 audit(700.576:2641): avc: denied { perfmon } for pid=6691 comm="syz.1.355" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 700.683724][ T31] audit: type=1400 audit(700.616:2642): avc: denied { prog_run } for pid=6691 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 700.708958][ T31] audit: type=1400 audit(700.646:2643): avc: denied { execmem } for pid=6691 comm="syz.1.355" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 717.691143][ T31] audit: type=1400 audit(717.626:2644): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 717.733359][ T31] audit: type=1400 audit(717.656:2645): avc: denied { read write open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 717.736665][ T31] audit: type=1400 audit(717.656:2646): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 718.101743][ T31] audit: type=1400 audit(718.036:2647): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 718.103226][ T31] audit: type=1400 audit(718.036:2648): avc: denied { open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 718.103849][ T31] audit: type=1400 audit(718.036:2649): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 718.593626][ T31] audit: type=1400 audit(718.526:2650): avc: denied { create } for pid=6697 comm="syz.0.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 718.795545][ T31] audit: type=1400 audit(718.736:2651): avc: denied { write } for pid=6697 comm="syz.0.357" name="tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 718.798694][ T31] audit: type=1400 audit(718.736:2652): avc: denied { open } for pid=6697 comm="syz.0.357" path="/dev/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 718.858614][ T31] audit: type=1400 audit(718.766:2653): avc: denied { ioctl } for pid=6697 comm="syz.0.357" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 724.125368][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 724.125468][ T31] audit: type=1400 audit(724.066:2684): avc: denied { create } for pid=6703 comm="syz.0.358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 724.134910][ T31] audit: type=1400 audit(724.066:2685): avc: denied { connect } for pid=6703 comm="syz.0.358" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 724.163627][ T31] audit: type=1400 audit(724.086:2686): avc: denied { write } for pid=6703 comm="syz.0.358" laddr=fe80::a8aa:aaff:feaa:aaaa lport=60 faddr=ff01::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 726.226237][ T31] audit: type=1400 audit(726.166:2687): avc: denied { map_create } for pid=6709 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 726.228618][ T31] audit: type=1400 audit(726.166:2688): avc: denied { bpf } for pid=6709 comm="syz.1.361" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 726.243373][ T31] audit: type=1400 audit(726.166:2689): avc: denied { map_read map_write } for pid=6709 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 726.292890][ T31] audit: type=1400 audit(726.226:2690): avc: denied { prog_load } for pid=6709 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 726.368537][ T31] audit: type=1400 audit(726.306:2691): avc: denied { perfmon } for pid=6709 comm="syz.1.361" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 726.371271][ T31] audit: type=1400 audit(726.306:2692): avc: denied { prog_run } for pid=6709 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 726.417798][ T31] audit: type=1400 audit(726.356:2693): avc: denied { create } for pid=6709 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 740.099678][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 740.099801][ T31] audit: type=1400 audit(740.036:2695): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.100733][ T31] audit: type=1400 audit(740.036:2696): avc: denied { read write open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.101555][ T31] audit: type=1400 audit(740.036:2697): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 740.195337][ T31] audit: type=1400 audit(740.136:2698): avc: denied { map_create } for pid=6717 comm="syz.1.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 740.210342][ T31] audit: type=1400 audit(740.146:2699): avc: denied { read write } for pid=6717 comm="syz.1.362" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 740.211438][ T31] audit: type=1400 audit(740.146:2700): avc: denied { open } for pid=6717 comm="syz.1.362" path="/dev/raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 740.212257][ T31] audit: type=1400 audit(740.146:2701): avc: denied { ioctl } for pid=6717 comm="syz.1.362" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 740.336384][ T31] audit: type=1400 audit(740.276:2702): avc: denied { ioctl } for pid=6717 comm="syz.1.362" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 740.463071][ T4701] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 740.634944][ T4701] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 740.635499][ T4701] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 740.635873][ T4701] usb 2-1: New USB device found, idVendor=056a, idProduct=00d0, bcdDevice= 0.00 [ 740.636180][ T4701] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 740.641989][ T4701] usb 2-1: config 0 descriptor?? [ 741.067343][ T31] audit: type=1400 audit(741.006:2703): avc: denied { map_create } for pid=6717 comm="syz.1.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 741.070411][ T31] audit: type=1400 audit(741.006:2704): avc: denied { map_read map_write } for pid=6717 comm="syz.1.362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 741.123073][ T4701] wacom 0003:056A:00D0.0008: unknown main item tag 0x0 [ 741.126540][ T4701] wacom 0003:056A:00D0.0008: Unknown device_type for 'HID 056a:00d0'. Assuming pen. [ 741.136385][ T4701] wacom 0003:056A:00D0.0008: hidraw0: USB HID v0.00 Device [HID 056a:00d0] on usb-dummy_hcd.1-1/input0 [ 741.139056][ T4701] input: Wacom Bamboo 2FG Pen as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/0003:056A:00D0.0008/input/input4 [ 741.308401][ T10] usb 2-1: USB disconnect, device number 8 [ 742.122868][ T4701] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 742.298877][ T4701] usb 2-1: Using ep0 maxpacket: 32 [ 742.322311][ T4701] usb 2-1: New USB device found, idVendor=fd86, idProduct=2248, bcdDevice=75.5b [ 742.322973][ T4701] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 742.323181][ T4701] usb 2-1: Product: syz [ 742.323327][ T4701] usb 2-1: Manufacturer: syz [ 742.324680][ T4701] usb 2-1: SerialNumber: syz [ 742.373075][ T4701] usb 2-1: config 0 descriptor?? [ 742.377149][ T4701] usb-storage 2-1:0.0: USB Mass Storage device detected [ 742.620521][ T4701] usb 2-1: USB disconnect, device number 9 [ 746.451509][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 746.451566][ T31] audit: type=1400 audit(746.386:2728): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 746.463885][ T31] audit: type=1400 audit(746.406:2729): avc: denied { open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 746.468544][ T31] audit: type=1400 audit(746.406:2730): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 746.958888][ T31] audit: type=1400 audit(746.896:2731): avc: denied { read } for pid=6764 comm="syz.0.365" name="uinput" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 746.975277][ T31] audit: type=1400 audit(746.916:2732): avc: denied { read open } for pid=6764 comm="syz.0.365" path="/dev/uinput" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 746.984492][ T31] audit: type=1400 audit(746.916:2733): avc: denied { prog_load } for pid=6764 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 746.997095][ T31] audit: type=1400 audit(746.936:2734): avc: denied { bpf } for pid=6764 comm="syz.0.365" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 747.003417][ T31] audit: type=1400 audit(746.936:2735): avc: denied { map_create } for pid=6764 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 747.004432][ T31] audit: type=1400 audit(746.946:2736): avc: denied { map_read map_write } for pid=6764 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 747.017585][ T31] audit: type=1400 audit(746.956:2737): avc: denied { perfmon } for pid=6764 comm="syz.0.365" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 756.086437][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 756.086575][ T31] audit: type=1400 audit(756.026:2744): avc: denied { create } for pid=6764 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 756.116854][ T31] audit: type=1400 audit(756.056:2745): avc: denied { prog_load } for pid=6764 comm="syz.0.365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 756.124898][ T31] audit: type=1400 audit(756.066:2746): avc: denied { bpf } for pid=6764 comm="syz.0.365" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 756.128946][ T31] audit: type=1400 audit(756.066:2747): avc: denied { perfmon } for pid=6764 comm="syz.0.365" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 760.608318][ T31] audit: type=1400 audit(760.546:2748): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.613570][ T31] audit: type=1400 audit(760.546:2749): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.614200][ T31] audit: type=1400 audit(760.546:2750): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 760.708172][ T31] audit: type=1400 audit(760.646:2751): avc: denied { read write } for pid=6772 comm="syz.1.366" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.710967][ T31] audit: type=1400 audit(760.646:2752): avc: denied { read write open } for pid=6772 comm="syz.1.366" path="/dev/raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.711517][ T31] audit: type=1400 audit(760.646:2753): avc: denied { ioctl } for pid=6772 comm="syz.1.366" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 760.952992][ T5818] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 761.111496][ T5818] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 761.112821][ T5818] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 761.113238][ T5818] usb 2-1: New USB device found, idVendor=1e7d, idProduct=2cf6, bcdDevice= 0.00 [ 761.113574][ T5818] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 761.119224][ T5818] usb 2-1: config 0 descriptor?? [ 761.371150][ T31] audit: type=1400 audit(761.306:2754): avc: denied { ioctl } for pid=6772 comm="syz.1.366" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 761.593456][ T5818] pyra 0003:1E7D:2CF6.0009: hidraw0: USB HID v0.00 Device [HID 1e7d:2cf6] on usb-dummy_hcd.1-1/input0 [ 761.799572][ T31] audit: type=1400 audit(761.716:2755): avc: denied { ioctl } for pid=6772 comm="syz.1.366" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 762.013545][ T31] audit: type=1400 audit(761.946:2756): avc: denied { prog_load } for pid=6772 comm="syz.1.366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 762.015260][ T31] audit: type=1400 audit(761.946:2757): avc: denied { bpf } for pid=6772 comm="syz.1.366" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 762.016764][ T31] audit: type=1400 audit(761.946:2758): avc: denied { perfmon } for pid=6772 comm="syz.1.366" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 762.043158][ T5818] pyra 0003:1E7D:2CF6.0009: couldn't init struct pyra_device [ 762.043760][ T5818] pyra 0003:1E7D:2CF6.0009: couldn't install mouse [ 762.056621][ T5818] pyra 0003:1E7D:2CF6.0009: probe with driver pyra failed with error -71 [ 762.073776][ T5818] usb 2-1: USB disconnect, device number 10 [ 762.123339][ T31] audit: type=1400 audit(762.046:2759): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 762.124410][ T31] audit: type=1400 audit(762.046:2760): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 762.125131][ T31] audit: type=1400 audit(762.046:2761): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 762.248012][ T31] audit: type=1400 audit(762.186:2762): avc: denied { prog_load } for pid=6792 comm="syz.1.367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 762.255258][ T31] audit: type=1400 audit(762.196:2763): avc: denied { bpf } for pid=6792 comm="syz.1.367" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 768.255300][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 768.255413][ T31] audit: type=1400 audit(768.196:2770): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 768.273843][ T31] audit: type=1400 audit(768.206:2771): avc: denied { open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 768.274881][ T31] audit: type=1400 audit(768.206:2772): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 768.843301][ T31] audit: type=1400 audit(768.766:2773): avc: denied { read write } for pid=6796 comm="syz.0.368" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 768.844369][ T31] audit: type=1400 audit(768.766:2774): avc: denied { open } for pid=6796 comm="syz.0.368" path="/dev/raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 768.851176][ T31] audit: type=1400 audit(768.786:2775): avc: denied { ioctl } for pid=6796 comm="syz.0.368" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 768.976210][ T31] audit: type=1400 audit(768.916:2776): avc: denied { ioctl } for pid=6796 comm="syz.0.368" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 769.113559][ T8] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 769.347533][ T8] usb 1-1: Using ep0 maxpacket: 16 [ 769.376618][ T8] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 769.394807][ T8] usb 1-1: New USB device found, idVendor=045e, idProduct=0721, bcdDevice=90.c4 [ 769.395342][ T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 769.395664][ T8] usb 1-1: Product: syz [ 769.395854][ T8] usb 1-1: Manufacturer: syz [ 769.396053][ T8] usb 1-1: SerialNumber: syz [ 769.426325][ T8] usb 1-1: config 0 descriptor?? [ 771.046588][ T5783] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 771.086825][ T5783] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 771.095206][ T5783] bond0 (unregistering): Released all slaves [ 771.176556][ T5783] hsr_slave_0: left promiscuous mode [ 771.194324][ T5783] hsr_slave_1: left promiscuous mode [ 771.200630][ T5783] veth1_macvtap: left promiscuous mode [ 771.201079][ T5783] veth0_macvtap: left promiscuous mode [ 771.201490][ T5783] veth1_vlan: left promiscuous mode [ 773.187312][ T31] audit: type=1400 audit(773.126:2777): avc: denied { map_create } for pid=6796 comm="syz.0.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 773.188146][ T31] audit: type=1400 audit(773.126:2778): avc: denied { bpf } for pid=6796 comm="syz.0.368" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 773.188772][ T31] audit: type=1400 audit(773.126:2779): avc: denied { map_read map_write } for pid=6796 comm="syz.0.368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 776.411565][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 776.411667][ T31] audit: type=1400 audit(776.346:2784): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 776.415432][ T31] audit: type=1400 audit(776.356:2785): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 776.416533][ T31] audit: type=1400 audit(776.356:2786): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 776.484965][ T31] audit: type=1400 audit(776.426:2787): avc: denied { prog_load } for pid=6807 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 776.485615][ T31] audit: type=1400 audit(776.426:2788): avc: denied { bpf } for pid=6807 comm="syz.1.369" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 776.494578][ T31] audit: type=1400 audit(776.436:2789): avc: denied { execmem } for pid=6807 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 777.812940][ T31] audit: type=1400 audit(777.746:2790): avc: denied { perfmon } for pid=6807 comm="syz.1.369" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 777.814146][ T31] audit: type=1400 audit(777.746:2791): avc: denied { prog_run } for pid=6807 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 777.820404][ T31] audit: type=1400 audit(777.756:2792): avc: denied { create } for pid=6807 comm="syz.1.369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 777.825056][ T31] audit: type=1400 audit(777.766:2793): avc: denied { ioctl } for pid=6807 comm="syz.1.369" path="socket:[8122]" dev="sockfs" ino=8122 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 777.828990][ T6809] netlink: 8 bytes leftover after parsing attributes in process `syz.1.369'. [ 783.256712][ T10] usb 1-1: USB disconnect, device number 8 [ 783.322035][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 783.322139][ T31] audit: type=1400 audit(783.256:2805): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 783.353551][ T31] audit: type=1400 audit(783.286:2806): avc: denied { open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 783.354658][ T31] audit: type=1400 audit(783.286:2807): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 783.593177][ T31] audit: type=1400 audit(783.516:2808): avc: denied { map_create } for pid=6818 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 783.594161][ T31] audit: type=1400 audit(783.516:2809): avc: denied { perfmon } for pid=6818 comm="syz.0.371" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 783.596813][ T31] audit: type=1400 audit(783.516:2810): avc: denied { map_read map_write } for pid=6818 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 783.597565][ T31] audit: type=1400 audit(783.516:2811): avc: denied { prog_load } for pid=6818 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 783.598175][ T31] audit: type=1400 audit(783.516:2812): avc: denied { bpf } for pid=6818 comm="syz.0.371" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 783.598947][ T31] audit: type=1400 audit(783.516:2813): avc: denied { prog_run } for pid=6818 comm="syz.0.371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 783.623756][ T31] audit: type=1400 audit(783.556:2814): avc: denied { read write } for pid=6818 comm="syz.0.371" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 783.932166][ T10] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 784.203473][ T10] usb 1-1: Using ep0 maxpacket: 16 [ 784.233697][ T10] usb 1-1: config 0 has no interfaces? [ 784.339797][ T10] usb 1-1: New USB device found, idVendor=0525, idProduct=9ea1, bcdDevice= 0.40 [ 784.343821][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 784.344262][ T10] usb 1-1: Product: syz [ 784.348386][ T10] usb 1-1: Manufacturer: syz [ 784.350298][ T10] usb 1-1: SerialNumber: syz [ 784.407823][ T10] usb 1-1: config 0 descriptor?? [ 785.045324][ T10] usb 1-1: USB disconnect, device number 9 [ 791.013978][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 791.014095][ T31] audit: type=1400 audit(790.946:2830): avc: denied { read } for pid=6828 comm="syz.0.372" name="rtc0" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 791.016897][ T31] audit: type=1400 audit(790.946:2831): avc: denied { open } for pid=6828 comm="syz.0.372" path="/dev/rtc0" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 791.083186][ T31] audit: type=1400 audit(791.016:2832): avc: denied { ioctl } for pid=6828 comm="syz.0.372" path="/dev/rtc0" dev="devtmpfs" ino=713 ioctlcmd=0x7003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 803.689392][ T31] audit: type=1400 audit(803.626:2833): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 803.713576][ T31] audit: type=1400 audit(803.646:2834): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 803.733202][ T31] audit: type=1400 audit(803.646:2835): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 803.910249][ T31] audit: type=1400 audit(803.846:2836): avc: denied { map_create } for pid=6836 comm="syz.1.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 803.963153][ T31] audit: type=1400 audit(803.896:2837): avc: denied { execmem } for pid=6836 comm="syz.1.373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 804.559506][ T31] audit: type=1400 audit(804.496:2838): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 804.563266][ T31] audit: type=1400 audit(804.496:2839): avc: denied { open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 804.564428][ T31] audit: type=1400 audit(804.496:2840): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 804.633328][ T31] audit: type=1400 audit(804.566:2841): avc: denied { map_create } for pid=6838 comm="syz.0.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 804.634134][ T31] audit: type=1400 audit(804.566:2842): avc: denied { map_read map_write } for pid=6838 comm="syz.0.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 819.970992][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 819.971047][ T31] audit: type=1400 audit(819.906:2856): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 819.972117][ T31] audit: type=1400 audit(819.906:2857): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 819.974961][ T31] audit: type=1400 audit(819.916:2858): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 820.015308][ T31] audit: type=1400 audit(819.956:2859): avc: denied { map_create } for pid=6848 comm="syz.1.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 820.017767][ T31] audit: type=1400 audit(819.956:2860): avc: denied { map_read map_write } for pid=6848 comm="syz.1.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 820.030320][ T31] audit: type=1400 audit(819.966:2861): avc: denied { prog_load } for pid=6848 comm="syz.1.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 820.031182][ T31] audit: type=1400 audit(819.966:2862): avc: denied { bpf } for pid=6848 comm="syz.1.375" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 820.031844][ T31] audit: type=1400 audit(819.966:2863): avc: denied { perfmon } for pid=6848 comm="syz.1.375" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 820.064579][ T31] audit: type=1400 audit(820.006:2864): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 820.065446][ T31] audit: type=1400 audit(820.006:2865): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 826.481775][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 826.481892][ T31] audit: type=1400 audit(826.416:2889): avc: denied { create } for pid=6854 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 826.524643][ T31] audit: type=1400 audit(826.446:2890): avc: denied { ioctl } for pid=6854 comm="syz.0.378" path="socket:[8138]" dev="sockfs" ino=8138 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 826.554835][ T31] audit: type=1400 audit(826.486:2891): avc: denied { setopt } for pid=6854 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 826.576224][ T31] audit: type=1400 audit(826.516:2892): avc: denied { bind } for pid=6854 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 826.597029][ T31] audit: type=1400 audit(826.536:2893): avc: denied { write } for pid=6854 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 826.599454][ T31] audit: type=1400 audit(826.536:2894): avc: denied { read } for pid=6854 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 826.667417][ T31] audit: type=1400 audit(826.606:2895): avc: denied { create } for pid=6854 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 826.671796][ T31] audit: type=1400 audit(826.606:2896): avc: denied { write } for pid=6854 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 826.673375][ T31] audit: type=1400 audit(826.606:2897): avc: denied { module_request } for pid=6854 comm="syz.0.378" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 826.945000][ T31] audit: type=1400 audit(826.886:2898): avc: denied { read } for pid=6854 comm="syz.0.378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 832.374135][ T31] audit: type=1400 audit(832.316:2899): avc: denied { write } for pid=6883 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.376306][ T31] audit: type=1400 audit(832.316:2900): avc: denied { write open } for pid=6883 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.379476][ T31] audit: type=1400 audit(832.316:2901): avc: denied { getattr } for pid=6883 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.392876][ T31] audit: type=1400 audit(832.326:2902): avc: denied { ioctl } for pid=6883 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 832.411952][ T31] audit: type=1400 audit(832.346:2903): avc: denied { search } for pid=6883 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 832.461146][ T31] audit: type=1400 audit(832.396:2904): avc: denied { search } for pid=6884 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 832.461883][ T31] audit: type=1400 audit(832.396:2905): avc: denied { read } for pid=6884 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 832.463200][ T31] audit: type=1400 audit(832.396:2906): avc: denied { open } for pid=6884 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 832.463903][ T31] audit: type=1400 audit(832.396:2907): avc: denied { getattr } for pid=6884 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 832.513004][ T31] audit: type=1400 audit(832.446:2908): avc: denied { write } for pid=6883 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 838.795011][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 838.795098][ T31] audit: type=1400 audit(838.736:2931): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 838.796915][ T31] audit: type=1400 audit(838.736:2932): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 838.798489][ T31] audit: type=1400 audit(838.736:2933): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 838.871375][ T31] audit: type=1400 audit(838.806:2934): avc: denied { prog_load } for pid=6888 comm="syz.1.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 838.874134][ T31] audit: type=1400 audit(838.816:2935): avc: denied { bpf } for pid=6888 comm="syz.1.379" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 838.880322][ T31] audit: type=1400 audit(838.816:2936): avc: denied { map_create } for pid=6888 comm="syz.1.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 838.890378][ T31] audit: type=1400 audit(838.826:2937): avc: denied { execmem } for pid=6888 comm="syz.1.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 839.861486][ T31] audit: type=1400 audit(839.796:2938): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 839.863006][ T31] audit: type=1400 audit(839.796:2939): avc: denied { open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 839.864945][ T31] audit: type=1400 audit(839.796:2940): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 843.890388][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 843.890491][ T31] audit: type=1400 audit(843.826:2969): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 843.896014][ T31] audit: type=1400 audit(843.826:2970): avc: denied { open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 843.927411][ T31] audit: type=1400 audit(843.846:2971): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 844.353698][ T31] audit: type=1400 audit(844.296:2972): avc: denied { execmem } for pid=6899 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 848.734173][ T31] audit: type=1400 audit(848.676:2973): avc: denied { prog_load } for pid=6899 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 848.756310][ T31] audit: type=1400 audit(848.696:2974): avc: denied { bpf } for pid=6899 comm="syz.0.382" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 848.788982][ T31] audit: type=1400 audit(848.726:2975): avc: denied { map_create } for pid=6899 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 848.813270][ T31] audit: type=1400 audit(848.746:2976): avc: denied { map_read map_write } for pid=6899 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 848.845680][ T31] audit: type=1400 audit(848.786:2977): avc: denied { perfmon } for pid=6899 comm="syz.0.382" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 848.869730][ T31] audit: type=1400 audit(848.806:2978): avc: denied { prog_run } for pid=6899 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 850.353273][ T31] audit: type=1400 audit(850.286:2979): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 850.354470][ T31] audit: type=1400 audit(850.286:2980): avc: denied { open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 850.355214][ T31] audit: type=1400 audit(850.286:2981): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 850.748523][ T31] audit: type=1400 audit(850.676:2982): avc: denied { read } for pid=6902 comm="syz.0.383" name="ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.749806][ T31] audit: type=1400 audit(850.676:2983): avc: denied { open } for pid=6902 comm="syz.0.383" path="/dev/ptmx" dev="devtmpfs" ino=605 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.773603][ T31] audit: type=1400 audit(850.706:2984): avc: denied { ioctl } for pid=6902 comm="syz.0.383" path="/dev/ptmx" dev="devtmpfs" ino=605 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 850.857791][ T31] audit: type=1400 audit(850.796:2985): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 850.858471][ T31] audit: type=1400 audit(850.796:2986): avc: denied { open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 850.858973][ T31] audit: type=1400 audit(850.796:2987): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 851.013031][ T31] audit: type=1400 audit(850.936:2988): avc: denied { create } for pid=6904 comm="syz.0.384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 855.625161][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 855.625269][ T31] audit: type=1400 audit(855.566:2998): avc: denied { map_create } for pid=6906 comm="syz.0.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 855.654653][ T31] audit: type=1400 audit(855.596:2999): avc: denied { map_read map_write } for pid=6906 comm="syz.0.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 855.663312][ T31] audit: type=1400 audit(855.596:3000): avc: denied { prog_load } for pid=6906 comm="syz.0.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 855.693182][ T31] audit: type=1400 audit(855.626:3001): avc: denied { bpf } for pid=6906 comm="syz.0.385" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 855.736583][ T31] audit: type=1400 audit(855.676:3002): avc: denied { perfmon } for pid=6906 comm="syz.0.385" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 855.756344][ T31] audit: type=1400 audit(855.696:3003): avc: denied { prog_run } for pid=6906 comm="syz.0.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 855.776288][ T31] audit: type=1400 audit(855.716:3004): avc: denied { create } for pid=6906 comm="syz.0.385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 855.836145][ T31] audit: type=1400 audit(855.776:3005): avc: denied { ioctl } for pid=6906 comm="syz.0.385" path="socket:[6792]" dev="sockfs" ino=6792 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 855.865220][ T6909] vcan0: entered allmulticast mode [ 855.866801][ T31] audit: type=1400 audit(855.806:3006): avc: denied { setopt } for pid=6906 comm="syz.0.385" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 856.941582][ T31] audit: type=1400 audit(856.876:3007): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 857.433433][ T4701] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 857.610008][ T4701] usb 2-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 857.610609][ T4701] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 857.610972][ T4701] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 857.611296][ T4701] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 857.625544][ T4701] usb 2-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 857.626027][ T4701] usb 2-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 857.626321][ T4701] usb 2-1: Manufacturer: syz [ 857.630804][ T4701] usb 2-1: config 0 descriptor?? [ 858.125371][ T4701] usbhid 2-1:0.0: can't add hid device: -71 [ 858.126089][ T4701] usbhid 2-1:0.0: probe with driver usbhid failed with error -71 [ 858.137906][ T4701] usb 2-1: USB disconnect, device number 11 [ 869.434571][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 869.434752][ T31] audit: type=1400 audit(869.376:3031): avc: denied { read write } for pid=6312 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 869.436674][ T31] audit: type=1400 audit(869.376:3032): avc: denied { open } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 869.439483][ T31] audit: type=1400 audit(869.376:3033): avc: denied { ioctl } for pid=6312 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 869.521281][ T31] audit: type=1400 audit(869.456:3034): avc: denied { read write } for pid=6931 comm="syz.0.389" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 869.526011][ T31] audit: type=1400 audit(869.466:3035): avc: denied { open } for pid=6931 comm="syz.0.389" path="/dev/raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 869.526965][ T31] audit: type=1400 audit(869.466:3036): avc: denied { ioctl } for pid=6931 comm="syz.0.389" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 869.636726][ T31] audit: type=1400 audit(869.576:3037): avc: denied { ioctl } for pid=6931 comm="syz.0.389" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 869.763493][ T8] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 869.938254][ T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 869.938937][ T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 869.939376][ T8] usb 1-1: New USB device found, idVendor=0419, idProduct=0600, bcdDevice= 0.00 [ 869.939720][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 869.946711][ T8] usb 1-1: config 0 descriptor?? [ 870.420833][ T31] audit: type=1400 audit(870.346:3038): avc: denied { map_create } for pid=6931 comm="syz.0.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 870.423677][ T31] audit: type=1400 audit(870.356:3039): avc: denied { map_read map_write } for pid=6931 comm="syz.0.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 870.435405][ T31] audit: type=1400 audit(870.376:3040): avc: denied { prog_load } for pid=6931 comm="syz.0.389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 870.475370][ T8] samsung 0003:0419:0600.000A: unknown main item tag 0x0 [ 870.477194][ T8] samsung 0003:0419:0600.000A: unknown main item tag 0x0 [ 870.477530][ T8] samsung 0003:0419:0600.000A: unknown main item tag 0x0 [ 870.477778][ T8] samsung 0003:0419:0600.000A: unknown main item tag 0x0 [ 870.478005][ T8] samsung 0003:0419:0600.000A: unknown main item tag 0x0 [ 870.495926][ T8] samsung 0003:0419:0600.000A: hidraw0: USB HID v0.00 Device [HID 0419:0600] on usb-dummy_hcd.0-1/input0 [ 870.677569][ T8] usb 1-1: USB disconnect, device number 10 [ 881.814336][ T6964] netlink: 'syz.0.391': attribute type 4 has an invalid length. [ 881.893476][ T6964] netlink: 'syz.0.391': attribute type 4 has an invalid length. [ 886.550427][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 886.550525][ T31] audit: type=1400 audit(886.486:3072): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 886.558916][ T31] audit: type=1400 audit(886.496:3073): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 886.560778][ T31] audit: type=1400 audit(886.496:3074): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 886.848697][ T31] audit: type=1400 audit(886.786:3075): avc: denied { name_bind } for pid=6965 comm="syz.1.393" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 886.850017][ T31] audit: type=1400 audit(886.786:3076): avc: denied { node_bind } for pid=6965 comm="syz.1.393" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 899.356868][ T31] audit: type=1400 audit(899.296:3077): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 899.358488][ T31] audit: type=1400 audit(899.296:3078): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 899.360143][ T31] audit: type=1400 audit(899.296:3079): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 899.450871][ T31] audit: type=1400 audit(899.386:3080): avc: denied { execmem } for pid=6967 comm="syz.1.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 901.347003][ T31] audit: type=1400 audit(901.286:3081): avc: denied { prog_load } for pid=6967 comm="syz.1.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 901.347940][ T31] audit: type=1400 audit(901.286:3082): avc: denied { bpf } for pid=6967 comm="syz.1.394" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 901.365579][ T31] audit: type=1400 audit(901.306:3083): avc: denied { perfmon } for pid=6967 comm="syz.1.394" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 901.368277][ T31] audit: type=1400 audit(901.306:3084): avc: denied { prog_run } for pid=6967 comm="syz.1.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 901.404923][ T6970] vlan2: entered promiscuous mode [ 902.451805][ T31] audit: type=1400 audit(902.386:3085): avc: denied { execute } for pid=6975 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 902.469951][ T31] audit: type=1400 audit(902.406:3086): avc: denied { execute_no_trans } for pid=6975 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 904.495328][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 904.495393][ T31] audit: type=1400 audit(904.436:3099): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="netdev-rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 904.741472][ T31] audit: type=1400 audit(904.676:3100): avc: denied { sys_module } for pid=6976 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 904.742041][ T31] audit: type=1400 audit(904.676:3101): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 905.193031][ T31] audit: type=1400 audit(905.126:3102): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="netdev-rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 905.484732][ T31] audit: type=1400 audit(905.426:3103): avc: denied { sys_module } for pid=6976 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 905.486861][ T31] audit: type=1400 audit(905.426:3104): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="rose0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 906.003497][ T31] audit: type=1400 audit(905.926:3105): avc: denied { read write } for pid=6976 comm="syz-executor" name="tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 906.013072][ T31] audit: type=1400 audit(905.946:3106): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 906.013670][ T31] audit: type=1400 audit(905.946:3107): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 906.112999][ T31] audit: type=1400 audit(906.046:3108): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 909.764034][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 909.764171][ T31] audit: type=1400 audit(909.696:3113): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 910.226611][ T31] audit: type=1400 audit(910.166:3114): avc: denied { sys_module } for pid=6976 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 910.227850][ T31] audit: type=1400 audit(910.166:3115): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 910.669157][ T31] audit: type=1400 audit(910.606:3116): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 911.121443][ T31] audit: type=1400 audit(911.056:3117): avc: denied { sys_module } for pid=6976 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 911.122401][ T31] audit: type=1400 audit(911.056:3118): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 911.775735][ T6976] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 911.795665][ T6976] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 911.907705][ T31] audit: type=1400 audit(911.846:3119): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 912.203094][ T31] audit: type=1400 audit(912.136:3120): avc: denied { sys_module } for pid=6976 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 912.215082][ T31] audit: type=1400 audit(912.156:3121): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 912.426593][ T31] audit: type=1400 audit(912.366:3122): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 913.546941][ T6976] hsr_slave_0: entered promiscuous mode [ 913.554535][ T6976] hsr_slave_1: entered promiscuous mode [ 913.556194][ T6976] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 913.556545][ T6976] Cannot create hsr debugfs directory [ 913.964938][ T6976] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 914.065052][ T6976] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 914.115439][ T6976] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 914.186223][ T6976] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 914.417275][ T6976] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 914.428099][ T6976] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 914.439718][ T6976] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 914.455382][ T6976] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 914.787988][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 914.788059][ T31] audit: type=1400 audit(914.726:3147): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 914.913198][ T31] audit: type=1400 audit(914.846:3148): avc: denied { sys_module } for pid=6976 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 914.913842][ T31] audit: type=1400 audit(914.856:3149): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 915.045147][ T31] audit: type=1400 audit(914.976:3150): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 915.181385][ T31] audit: type=1400 audit(915.116:3151): avc: denied { sys_module } for pid=6976 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 915.184578][ T31] audit: type=1400 audit(915.126:3152): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 915.398102][ T6976] 8021q: adding VLAN 0 to HW filter on device bond0 [ 915.416648][ T31] audit: type=1400 audit(915.356:3153): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 915.496387][ T31] audit: type=1400 audit(915.436:3154): avc: denied { sys_module } for pid=6976 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 915.496943][ T31] audit: type=1400 audit(915.436:3155): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 915.574912][ T31] audit: type=1400 audit(915.516:3156): avc: denied { module_request } for pid=6976 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 919.009644][ T6976] veth0_vlan: entered promiscuous mode [ 919.059283][ T6976] veth1_vlan: entered promiscuous mode [ 919.200153][ T6976] veth0_macvtap: entered promiscuous mode [ 919.225390][ T6976] veth1_macvtap: entered promiscuous mode [ 919.364821][ T6976] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.365435][ T6976] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.365828][ T6976] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.366245][ T6976] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.846177][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 919.846309][ T31] audit: type=1400 audit(919.776:3223): avc: denied { read } for pid=7340 comm="syz.0.395" name="usbmon0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 919.847791][ T31] audit: type=1400 audit(919.776:3224): avc: denied { open } for pid=7340 comm="syz.0.395" path="/dev/usbmon0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 919.853954][ T31] audit: type=1400 audit(919.786:3225): avc: denied { map } for pid=7340 comm="syz.0.395" path="/dev/usbmon0" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 919.915703][ T31] audit: type=1400 audit(919.856:3226): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 919.916871][ T31] audit: type=1400 audit(919.856:3227): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 919.917619][ T31] audit: type=1400 audit(919.856:3228): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 920.235494][ T31] audit: type=1400 audit(920.166:3229): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 920.244199][ T31] audit: type=1400 audit(920.176:3230): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 920.245201][ T31] audit: type=1400 audit(920.176:3231): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 920.464182][ T31] audit: type=1400 audit(920.406:3232): avc: denied { execute } for pid=7344 comm="syz.0.399" path="/2/cpuacct.usage_percpu_user" dev="tmpfs" ino=27 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 923.983143][ T5818] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 924.173156][ T5818] usb 1-1: Using ep0 maxpacket: 8 [ 924.179366][ T5818] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 924.256027][ T5818] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 924.256376][ T5818] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 924.256604][ T5818] usb 1-1: Product: syz [ 924.256714][ T5818] usb 1-1: Manufacturer: syz [ 924.256825][ T5818] usb 1-1: SerialNumber: syz [ 925.534536][ T5818] cdc_ncm 1-1:1.0: failed to get mac address [ 925.536210][ T5818] cdc_ncm 1-1:1.0: bind() failure [ 925.555523][ T5818] cdc_ncm 1-1:1.1: probe with driver cdc_ncm failed with error -71 [ 925.557520][ T5818] cdc_mbim 1-1:1.1: probe with driver cdc_mbim failed with error -71 [ 925.559055][ T5818] usbtest 1-1:1.1: probe with driver usbtest failed with error -71 [ 925.570049][ T5818] usb 1-1: USB disconnect, device number 11 [ 925.619251][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 925.619402][ T31] audit: type=1400 audit(925.556:3255): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 925.620802][ T31] audit: type=1400 audit(925.556:3256): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 925.621711][ T31] audit: type=1400 audit(925.556:3257): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 925.807222][ T31] audit: type=1326 audit(925.746:3258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 925.813547][ T31] audit: type=1326 audit(925.746:3259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 925.819430][ T31] audit: type=1326 audit(925.756:3260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=390 compat=0 ip=0x132da0 code=0x7ffc0000 [ 925.825454][ T31] audit: type=1326 audit(925.756:3261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 925.843684][ T31] audit: type=1326 audit(925.776:3262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7367 comm="syz.0.403" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 926.034016][ T31] audit: type=1400 audit(925.966:3263): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 926.040106][ T31] audit: type=1400 audit(925.966:3264): avc: denied { read write open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 936.188845][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 936.188936][ T31] audit: type=1400 audit(936.126:3278): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 936.204348][ T31] audit: type=1400 audit(936.136:3279): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 936.230426][ T31] audit: type=1400 audit(936.136:3280): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 936.457988][ T31] audit: type=1400 audit(936.396:3281): avc: denied { read } for pid=7375 comm="syz.1.406" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 936.459020][ T31] audit: type=1400 audit(936.396:3282): avc: denied { open } for pid=7375 comm="syz.1.406" path="net:[4026532655]" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 936.461312][ T31] audit: type=1400 audit(936.396:3283): avc: denied { create } for pid=7375 comm="syz.1.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 936.485697][ T31] audit: type=1400 audit(936.426:3284): avc: denied { write } for pid=7375 comm="syz.1.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 936.487696][ T31] audit: type=1400 audit(936.426:3285): avc: denied { module_request } for pid=7375 comm="syz.1.406" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 937.011132][ T31] audit: type=1400 audit(936.946:3286): avc: denied { ioctl } for pid=7375 comm="syz.1.406" path="socket:[6938]" dev="sockfs" ino=6938 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 937.012177][ T31] audit: type=1400 audit(936.946:3287): avc: denied { read } for pid=7375 comm="syz.1.406" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 941.193032][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 941.193150][ T31] audit: type=1400 audit(941.126:3307): avc: denied { read write } for pid=5895 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 941.194291][ T31] audit: type=1400 audit(941.126:3308): avc: denied { open } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 941.195006][ T31] audit: type=1400 audit(941.126:3309): avc: denied { ioctl } for pid=5895 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 941.267576][ T31] audit: type=1400 audit(941.206:3310): avc: denied { map_create } for pid=7390 comm="syz.1.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 941.281824][ T31] audit: type=1400 audit(941.216:3311): avc: denied { create } for pid=7390 comm="syz.1.411" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 941.287057][ T31] audit: type=1400 audit(941.226:3312): avc: denied { map } for pid=7390 comm="syz.1.411" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8674 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 941.293825][ T31] audit: type=1400 audit(941.236:3313): avc: denied { read write } for pid=7390 comm="syz.1.411" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8674 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 941.883817][ T31] audit: type=1400 audit(941.816:3314): avc: denied { create } for pid=7390 comm="syz.1.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 944.896424][ T31] audit: type=1400 audit(944.836:3315): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 944.897493][ T31] audit: type=1400 audit(944.836:3316): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 946.193421][ T3068] usb 1-1: new high-speed USB device number 12 using dummy_hcd [ 946.353304][ T3068] usb 1-1: Using ep0 maxpacket: 8 [ 946.358847][ T3068] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x9 has invalid wMaxPacketSize 0 [ 946.365911][ T3068] usb 1-1: New USB device found, idVendor=1b80, idProduct=d700, bcdDevice=d0.46 [ 946.366703][ T3068] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 946.367230][ T3068] usb 1-1: Product: syz [ 946.367506][ T3068] usb 1-1: Manufacturer: syz [ 946.367746][ T3068] usb 1-1: SerialNumber: syz [ 946.374692][ T3068] usb 1-1: config 0 descriptor?? [ 946.394853][ T3068] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 946.595615][ T2906] usb 1-1: USB disconnect, device number 12 [ 946.641066][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 946.641123][ T31] audit: type=1400 audit(946.576:3340): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 946.653466][ T31] audit: type=1400 audit(946.576:3341): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 946.655891][ T31] audit: type=1400 audit(946.596:3342): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 946.775400][ T31] audit: type=1400 audit(946.716:3343): avc: denied { read write } for pid=7411 comm="syz.0.415" name="vhost-net" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 946.784305][ T31] audit: type=1400 audit(946.726:3344): avc: denied { open } for pid=7411 comm="syz.0.415" path="/dev/vhost-net" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 946.813982][ T31] audit: type=1400 audit(946.756:3345): avc: denied { ioctl } for pid=7411 comm="syz.0.415" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 946.924753][ T31] audit: type=1400 audit(946.866:3346): avc: denied { ioctl } for pid=7411 comm="syz.0.415" path="/dev/raw-gadget" dev="devtmpfs" ino=707 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 947.053510][ T3791] usb 1-1: new high-speed USB device number 13 using dummy_hcd [ 947.236606][ T3791] usb 1-1: config 0 has an invalid interface number: 224 but max is 0 [ 947.237152][ T3791] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 947.237533][ T3791] usb 1-1: config 0 has no interface number 0 [ 947.237878][ T3791] usb 1-1: config 0 interface 224 altsetting 0 has an endpoint descriptor with address 0x75, changing to 0x5 [ 947.238361][ T3791] usb 1-1: config 0 interface 224 altsetting 0 endpoint 0x5 has invalid maxpacket 1023, setting to 64 [ 947.238835][ T3791] usb 1-1: config 0 interface 224 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 947.239298][ T3791] usb 1-1: config 0 interface 224 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 947.239765][ T3791] usb 1-1: config 0 interface 224 altsetting 0 has 3 endpoint descriptors, different from the interface descriptor's value: 5 [ 947.286559][ T3791] usb 1-1: New USB device found, idVendor=06cd, idProduct=012a, bcdDevice=69.e2 [ 947.287095][ T3791] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 947.287414][ T3791] usb 1-1: Product: syz [ 947.287619][ T3791] usb 1-1: Manufacturer: syz [ 947.287833][ T3791] usb 1-1: SerialNumber: syz [ 947.293940][ T3791] usb 1-1: config 0 descriptor?? [ 947.305051][ T3791] keyspan 1-1:0.224: Keyspan 4 port adapter converter detected [ 947.306451][ T3791] keyspan 1-1:0.224: found no endpoint descriptor for endpoint 87 [ 947.306906][ T3791] keyspan 1-1:0.224: found no endpoint descriptor for endpoint 7 [ 947.308760][ T3791] keyspan 1-1:0.224: found no endpoint descriptor for endpoint 81 [ 947.309407][ T3791] keyspan 1-1:0.224: unsupported endpoint type 0 [ 947.325502][ T3791] usb 1-1: Keyspan 4 port adapter converter now attached to ttyUSB0 [ 947.327422][ T3791] keyspan 1-1:0.224: found no endpoint descriptor for endpoint 82 [ 947.327820][ T3791] keyspan 1-1:0.224: found no endpoint descriptor for endpoint 2 [ 947.332924][ T3791] usb 1-1: Keyspan 4 port adapter converter now attached to ttyUSB1 [ 947.334667][ T3791] keyspan 1-1:0.224: found no endpoint descriptor for endpoint 83 [ 947.335047][ T3791] keyspan 1-1:0.224: found no endpoint descriptor for endpoint 3 [ 947.339704][ T3791] usb 1-1: Keyspan 4 port adapter converter now attached to ttyUSB2 [ 947.341438][ T3791] keyspan 1-1:0.224: found no endpoint descriptor for endpoint 84 [ 947.353467][ T3791] keyspan 1-1:0.224: found no endpoint descriptor for endpoint 4 [ 947.356336][ T3791] usb 1-1: Keyspan 4 port adapter converter now attached to ttyUSB3 [ 947.516581][ T3791] usb 1-1: USB disconnect, device number 13 [ 947.537080][ T3791] keyspan_4 ttyUSB0: Keyspan 4 port adapter converter now disconnected from ttyUSB0 [ 947.553339][ T3791] keyspan_4 ttyUSB1: Keyspan 4 port adapter converter now disconnected from ttyUSB1 [ 947.563677][ T3791] keyspan_4 ttyUSB2: Keyspan 4 port adapter converter now disconnected from ttyUSB2 [ 947.584258][ T3791] keyspan_4 ttyUSB3: Keyspan 4 port adapter converter now disconnected from ttyUSB3 [ 947.585443][ T3791] keyspan 1-1:0.224: device disconnected [ 947.641260][ T31] audit: type=1400 audit(947.576:3347): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 947.653938][ T31] audit: type=1400 audit(947.586:3348): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 947.654793][ T31] audit: type=1400 audit(947.586:3349): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 971.845219][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 971.845331][ T31] audit: type=1400 audit(971.786:3358): avc: denied { execute } for pid=7457 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 971.850114][ T31] audit: type=1400 audit(971.786:3359): avc: denied { execute_no_trans } for pid=7457 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 971.926552][ T31] audit: type=1400 audit(971.866:3360): avc: denied { execmem } for pid=7457 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 971.958519][ T31] audit: type=1400 audit(971.896:3361): avc: denied { mounton } for pid=7458 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 971.960917][ T31] audit: type=1400 audit(971.896:3362): avc: denied { mount } for pid=7458 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 971.967831][ T31] audit: type=1400 audit(971.906:3363): avc: denied { read } for pid=7458 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 971.969296][ T31] audit: type=1400 audit(971.906:3364): avc: denied { open } for pid=7458 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 971.975373][ T31] audit: type=1400 audit(971.916:3365): avc: denied { mounton } for pid=7458 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 972.023086][ T31] audit: type=1400 audit(971.946:3366): avc: denied { module_request } for pid=7458 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 972.188098][ T31] audit: type=1400 audit(972.126:3367): avc: denied { sys_module } for pid=7458 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 976.511766][ T7458] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 976.528879][ T7458] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 976.951236][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 976.951292][ T31] audit: type=1400 audit(976.886:3395): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 976.963560][ T31] audit: type=1400 audit(976.906:3396): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 976.965060][ T31] audit: type=1400 audit(976.906:3397): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 977.071714][ T31] audit: type=1400 audit(977.006:3398): avc: denied { module_request } for pid=7458 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 977.165586][ T31] audit: type=1400 audit(977.096:3399): avc: denied { append } for pid=7638 comm="syz.0.418" name="seq" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 977.166662][ T31] audit: type=1400 audit(977.096:3400): avc: denied { open } for pid=7638 comm="syz.0.418" path="/dev/snd/seq" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 977.175219][ T31] audit: type=1400 audit(977.116:3401): avc: denied { ioctl } for pid=7638 comm="syz.0.418" path="/dev/snd/seq" dev="devtmpfs" ino=727 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 977.253376][ T31] audit: type=1400 audit(977.186:3402): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 977.258468][ T31] audit: type=1400 audit(977.196:3403): avc: denied { read write open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 977.259783][ T31] audit: type=1400 audit(977.196:3404): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 978.030876][ T7458] hsr_slave_0: entered promiscuous mode [ 978.034997][ T7458] hsr_slave_1: entered promiscuous mode [ 978.036418][ T7458] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 978.036690][ T7458] Cannot create hsr debugfs directory [ 978.460633][ T7458] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.526689][ T7458] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.640700][ T7458] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.735170][ T7458] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 978.910938][ T7458] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 978.916933][ T7458] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 978.922098][ T7458] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 978.928522][ T7458] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 980.090386][ T7784] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 980.099889][ T7784] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 980.107595][ T7784] bond0 (unregistering): Released all slaves [ 980.213673][ T7784] hsr_slave_0: left promiscuous mode [ 980.218434][ T7784] hsr_slave_1: left promiscuous mode [ 980.227305][ T7784] veth1_macvtap: left promiscuous mode [ 980.227858][ T7784] veth0_macvtap: left promiscuous mode [ 980.228301][ T7784] veth1_vlan: left promiscuous mode [ 980.228631][ T7784] veth0_vlan: left promiscuous mode [ 980.670180][ T7784] vcan0 (unregistering): left allmulticast mode [ 980.738023][ T7458] 8021q: adding VLAN 0 to HW filter on device bond0 [ 982.239498][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 982.239594][ T31] audit: type=1400 audit(982.176:3455): avc: denied { module_request } for pid=7458 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 982.445958][ T31] audit: type=1400 audit(982.386:3456): avc: denied { sys_module } for pid=7458 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 982.446860][ T31] audit: type=1400 audit(982.386:3457): avc: denied { module_request } for pid=7458 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 982.612110][ T31] audit: type=1400 audit(982.546:3458): avc: denied { module_request } for pid=7458 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 982.761689][ T31] audit: type=1400 audit(982.696:3459): avc: denied { sys_module } for pid=7458 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 982.773776][ T31] audit: type=1400 audit(982.706:3460): avc: denied { module_request } for pid=7458 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 982.996291][ T31] audit: type=1400 audit(982.936:3461): avc: denied { module_request } for pid=7458 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 983.171748][ T31] audit: type=1400 audit(983.106:3462): avc: denied { sys_module } for pid=7458 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 983.179174][ T31] audit: type=1400 audit(983.106:3463): avc: denied { module_request } for pid=7458 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 983.319187][ T31] audit: type=1400 audit(983.256:3464): avc: denied { module_request } for pid=7458 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 986.828695][ T7458] veth0_vlan: entered promiscuous mode [ 986.889847][ T7458] veth1_vlan: entered promiscuous mode [ 987.006629][ T7458] veth0_macvtap: entered promiscuous mode [ 987.019625][ T7458] veth1_macvtap: entered promiscuous mode [ 987.099962][ T7458] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 987.101432][ T7458] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 987.101842][ T7458] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 987.102189][ T7458] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 987.245641][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 987.245780][ T31] audit: type=1400 audit(987.186:3491): avc: denied { mount } for pid=7458 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 987.248406][ T31] audit: type=1400 audit(987.186:3492): avc: denied { mounton } for pid=7458 comm="syz-executor" path="/syzkaller.gAOyYl/syz-tmp/newroot/selinux" dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 987.266338][ T31] audit: type=1400 audit(987.206:3493): avc: denied { unmount } for pid=7458 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 987.270179][ T31] audit: type=1400 audit(987.206:3494): avc: denied { mounton } for pid=7458 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 987.279542][ T31] audit: type=1400 audit(987.206:3495): avc: denied { mount } for pid=7458 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 987.341011][ T31] audit: type=1400 audit(987.276:3496): avc: denied { read write } for pid=7458 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 987.364627][ T31] audit: type=1400 audit(987.306:3497): avc: denied { open } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 987.365989][ T31] audit: type=1400 audit(987.306:3498): avc: denied { ioctl } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 987.586766][ T31] audit: type=1400 audit(987.526:3499): avc: denied { read write } for pid=7458 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 987.587841][ T31] audit: type=1400 audit(987.526:3500): avc: denied { open } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 988.983093][ T3791] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 989.139172][ T3791] usb 2-1: New USB device found, idVendor=17e9, idProduct=8b4e, bcdDevice=9c.08 [ 989.139568][ T3791] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 989.144888][ T3791] usb 2-1: config 0 descriptor?? [ 990.660722][ T3791] [drm] vendor descriptor length:b9 data:00 00 00 00 00 00 00 00 00 00 00 [ 990.661853][ T3791] [drm:udl_init] *ERROR* Unrecognized vendor firmware descriptor [ 990.667974][ T3791] [drm:udl_init] *ERROR* Selecting channel failed [ 990.698341][ T3791] [drm] Initialized udl 0.0.1 for 2-1:0.0 on minor 3 [ 990.699073][ T3791] [drm] Initialized udl on minor 3 [ 990.713790][ T3791] udl 2-1:0.0: [drm] *ERROR* Read EDID byte 0 failed err ffffffb9 [ 990.715150][ T3791] udl 2-1:0.0: [drm] Cannot find any crtc or sizes [ 990.724546][ T3791] usb 2-1: USB disconnect, device number 12 [ 992.265372][ T31] kauditd_printk_skb: 72 callbacks suppressed [ 992.265435][ T31] audit: type=1400 audit(992.206:3573): avc: denied { sys_module } for pid=7868 comm="syz.0.430" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 992.268513][ T31] audit: type=1400 audit(992.206:3574): avc: denied { module_request } for pid=7868 comm="syz.0.430" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 992.429551][ T31] audit: type=1400 audit(992.366:3575): avc: denied { write } for pid=7868 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 992.435586][ T31] audit: type=1400 audit(992.376:3576): avc: denied { create } for pid=7868 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 992.441562][ T31] audit: type=1400 audit(992.376:3577): avc: denied { module_request } for pid=7868 comm="syz.0.430" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 992.596753][ T31] audit: type=1400 audit(992.536:3578): avc: denied { read } for pid=7868 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 992.604016][ T31] audit: type=1400 audit(992.546:3579): avc: denied { create } for pid=7868 comm="syz.0.430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 992.609058][ T31] audit: type=1400 audit(992.546:3580): avc: denied { ioctl } for pid=7868 comm="syz.0.430" path="socket:[9052]" dev="sockfs" ino=9052 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 992.610122][ T31] audit: type=1400 audit(992.546:3581): avc: denied { module_request } for pid=7868 comm="syz.0.430" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 992.780896][ T31] audit: type=1400 audit(992.716:3582): avc: denied { sys_module } for pid=7868 comm="syz.0.430" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 994.156285][ T7888] *** NOT YET: opcode c3 *** [ 996.324491][ T7893] netlink: 9 bytes leftover after parsing attributes in process `syz.0.437'. [ 996.325261][ T7893] 0·: renamed from veth1_vlan (while UP) [ 996.330531][ T7893] 0·: entered allmulticast mode [ 996.332068][ T7893] A link change request failed with some changes committed already. Interface c0· may have been left with an inconsistent configuration, please check. [ 996.338868][ T7893] netlink: 'syz.0.437': attribute type 10 has an invalid length. [ 996.339263][ T7893] netlink: 40 bytes leftover after parsing attributes in process `syz.0.437'. [ 996.339764][ T7893] veth0_vlan: entered allmulticast mode [ 996.341687][ T7893] A link change request failed with some changes committed already. Interface veth0_vlan may have been left with an inconsistent configuration, please check. [ 996.509017][ T7897] capability: warning: `syz.0.439' uses deprecated v2 capabilities in a way that may be insecure [ 996.599409][ T7899] netlink: 32 bytes leftover after parsing attributes in process `syz.0.440'. [ 997.278262][ T31] kauditd_printk_skb: 77 callbacks suppressed [ 997.278365][ T31] audit: type=1400 audit(997.216:3660): avc: denied { execmem } for pid=7909 comm="syz.1.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 997.344705][ T31] audit: type=1400 audit(997.286:3661): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 997.362979][ T31] audit: type=1400 audit(997.296:3662): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 997.363661][ T31] audit: type=1400 audit(997.296:3663): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 997.467965][ T31] audit: type=1400 audit(997.406:3664): avc: denied { create } for pid=7913 comm="syz.0.445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 997.470776][ T31] audit: type=1400 audit(997.406:3665): avc: denied { create } for pid=7913 comm="syz.0.445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 997.478016][ T31] audit: type=1400 audit(997.416:3666): avc: denied { read write } for pid=7913 comm="syz.0.445" name="nullb0" dev="devtmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 997.484241][ T31] audit: type=1400 audit(997.426:3667): avc: denied { read write open } for pid=7913 comm="syz.0.445" path="/dev/nullb0" dev="devtmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 997.529112][ T31] audit: type=1400 audit(997.466:3668): avc: denied { read } for pid=7913 comm="syz.0.445" name="hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 997.530113][ T31] audit: type=1400 audit(997.466:3669): avc: denied { open } for pid=7913 comm="syz.0.445" path="/dev/hwrng" dev="devtmpfs" ino=82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 998.582914][ T3068] usb 1-1: new high-speed USB device number 14 using dummy_hcd [ 998.732980][ T3068] usb 1-1: Using ep0 maxpacket: 8 [ 998.757826][ T3068] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 998.758603][ T3068] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 998.759334][ T3068] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 998.759812][ T3068] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 998.760330][ T3068] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 998.761239][ T3068] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 998.761700][ T3068] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 999.029817][ T3068] usb 1-1: usb_control_msg returned -32 [ 999.030237][ T3068] usbtmc 1-1:16.0: can't read capabilities [ 1001.476136][ T7951] syz.1.455 uses obsolete (PF_INET,SOCK_PACKET) [ 1001.499662][ T7951] ICMPv6: Received fragmented ndisc packet. Carefully consider disabling suppress_frag_ndisc. [ 1001.927257][ T7961] netlink: 4 bytes leftover after parsing attributes in process `syz.1.458'. [ 1002.522455][ T31] kauditd_printk_skb: 111 callbacks suppressed [ 1002.539929][ T31] audit: type=1400 audit(1002.456:3781): avc: denied { create } for pid=7968 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1002.666689][ T31] audit: type=1400 audit(1002.606:3782): avc: denied { prog_load } for pid=7968 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1002.667424][ T31] audit: type=1400 audit(1002.606:3783): avc: denied { bpf } for pid=7968 comm="syz.1.460" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1002.667993][ T31] audit: type=1400 audit(1002.606:3784): avc: denied { perfmon } for pid=7968 comm="syz.1.460" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1002.796810][ T31] audit: type=1400 audit(1002.736:3785): avc: denied { prog_load } for pid=7968 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1002.827960][ T31] audit: type=1400 audit(1002.746:3786): avc: denied { map_create } for pid=7968 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1002.834475][ T31] audit: type=1400 audit(1002.746:3787): avc: denied { map_read map_write } for pid=7968 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1003.406878][ T31] audit: type=1400 audit(1003.346:3788): avc: denied { execmem } for pid=7968 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1009.507333][ T31] audit: type=1400 audit(1009.446:3789): avc: denied { ioctl } for pid=7968 comm="syz.1.460" path="socket:[9143]" dev="sockfs" ino=9143 ioctlcmd=0x8940 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1009.515301][ T31] audit: type=1400 audit(1009.446:3790): avc: denied { module_request } for pid=7968 comm="syz.1.460" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1012.622124][ T5818] usb 1-1: USB disconnect, device number 14 [ 1012.673513][ T31] audit: type=1400 audit(1012.606:3791): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1012.674611][ T31] audit: type=1400 audit(1012.606:3792): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1012.675461][ T31] audit: type=1400 audit(1012.606:3793): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1012.763631][ T31] audit: type=1400 audit(1012.696:3794): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1012.764780][ T31] audit: type=1400 audit(1012.706:3795): avc: denied { open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1012.765535][ T31] audit: type=1400 audit(1012.706:3796): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1012.850332][ T31] audit: type=1400 audit(1012.786:3797): avc: denied { prog_load } for pid=7984 comm="syz.0.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1012.851442][ T31] audit: type=1400 audit(1012.786:3798): avc: denied { bpf } for pid=7984 comm="syz.0.462" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1015.358784][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 1015.358947][ T31] audit: type=1400 audit(1015.296:3803): avc: denied { map_create } for pid=7984 comm="syz.0.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1015.360101][ T31] audit: type=1400 audit(1015.296:3804): avc: denied { map_read map_write } for pid=7984 comm="syz.0.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1015.365385][ T31] audit: type=1400 audit(1015.306:3805): avc: denied { prog_load } for pid=7984 comm="syz.0.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1015.366189][ T31] audit: type=1400 audit(1015.306:3806): avc: denied { bpf } for pid=7984 comm="syz.0.462" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1015.366970][ T31] audit: type=1400 audit(1015.306:3807): avc: denied { perfmon } for pid=7984 comm="syz.0.462" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1015.368167][ T31] audit: type=1400 audit(1015.306:3808): avc: denied { prog_run } for pid=7984 comm="syz.0.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1015.393116][ T31] audit: type=1400 audit(1015.316:3809): avc: denied { mounton } for pid=7984 comm="syz.0.462" path="/39/file0" dev="tmpfs" ino=215 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1015.394292][ T31] audit: type=1400 audit(1015.336:3810): avc: denied { mount } for pid=7984 comm="syz.0.462" name="/" dev="configfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1015.397815][ T31] audit: type=1400 audit(1015.336:3811): avc: denied { setattr } for pid=7984 comm="syz.0.462" name="/" dev="configfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1021.190888][ T31] audit: type=1400 audit(1021.126:3812): avc: denied { read write } for pid=7458 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1021.191664][ T31] audit: type=1400 audit(1021.126:3813): avc: denied { open } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1021.192327][ T31] audit: type=1400 audit(1021.126:3814): avc: denied { ioctl } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1021.650486][ T31] audit: type=1400 audit(1021.586:3815): avc: denied { read write } for pid=7458 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1021.651588][ T31] audit: type=1400 audit(1021.586:3816): avc: denied { open } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1021.673572][ T31] audit: type=1400 audit(1021.586:3817): avc: denied { ioctl } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1021.898241][ T31] audit: type=1400 audit(1021.836:3818): avc: denied { map_create } for pid=7990 comm="syz.1.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1021.900367][ T31] audit: type=1400 audit(1021.836:3819): avc: denied { map_read map_write } for pid=7990 comm="syz.1.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1021.933324][ T31] audit: type=1400 audit(1021.866:3820): avc: denied { prog_load } for pid=7990 comm="syz.1.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1021.938648][ T31] audit: type=1400 audit(1021.866:3821): avc: denied { bpf } for pid=7990 comm="syz.1.464" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1026.765438][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 1026.765554][ T31] audit: type=1400 audit(1026.706:3827): avc: denied { read write } for pid=7458 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1026.767537][ T31] audit: type=1400 audit(1026.706:3828): avc: denied { open } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1026.769339][ T31] audit: type=1400 audit(1026.706:3829): avc: denied { ioctl } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1027.025694][ T31] audit: type=1400 audit(1026.966:3830): avc: denied { create } for pid=7995 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1027.038771][ T31] audit: type=1400 audit(1026.976:3831): avc: denied { write } for pid=7995 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1027.044774][ T31] audit: type=1400 audit(1026.986:3832): avc: denied { module_request } for pid=7995 comm="syz.1.466" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1027.187255][ T31] audit: type=1400 audit(1027.126:3833): avc: denied { read } for pid=7995 comm="syz.1.466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1027.193634][ T31] audit: type=1400 audit(1027.136:3834): avc: denied { ioctl } for pid=7995 comm="syz.1.466" path="socket:[9159]" dev="sockfs" ino=9159 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1027.206418][ T31] audit: type=1400 audit(1027.146:3835): avc: denied { module_request } for pid=7995 comm="syz.1.466" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1027.436242][ T31] audit: type=1400 audit(1027.376:3836): avc: denied { sys_module } for pid=7995 comm="syz.1.466" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1029.123612][ T4701] usb 1-1: new high-speed USB device number 15 using dummy_hcd [ 1029.299787][ T4701] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1029.300437][ T4701] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1029.301025][ T4701] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1029.303171][ T4701] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1029.314052][ T4701] usb 1-1: config 0 descriptor?? [ 1029.759617][ T4701] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1029.760571][ T4701] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1029.763136][ T4701] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1029.763656][ T4701] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1029.764996][ T4701] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1029.765406][ T4701] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1029.765825][ T4701] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1029.766220][ T4701] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1029.766651][ T4701] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1029.767066][ T4701] plantronics 0003:047F:FFFF.000B: unknown main item tag 0x0 [ 1029.768085][ T4701] plantronics 0003:047F:FFFF.000B: No inputs registered, leaving [ 1029.781351][ T4701] plantronics 0003:047F:FFFF.000B: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1033.266211][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 1033.266339][ T31] audit: type=1400 audit(1033.206:3872): avc: denied { setopt } for pid=8020 comm="syz.1.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1033.273406][ T31] audit: type=1400 audit(1033.206:3873): avc: denied { create } for pid=8020 comm="syz.1.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1033.286150][ T31] audit: type=1400 audit(1033.226:3874): avc: denied { ioctl } for pid=8020 comm="syz.1.470" path="socket:[9197]" dev="sockfs" ino=9197 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1033.293649][ T31] audit: type=1400 audit(1033.226:3875): avc: denied { write } for pid=8020 comm="syz.1.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1038.461781][ T31] audit: type=1400 audit(1038.396:3876): avc: denied { read write } for pid=7458 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1038.473519][ T31] audit: type=1400 audit(1038.396:3877): avc: denied { open } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1038.474506][ T31] audit: type=1400 audit(1038.396:3878): avc: denied { ioctl } for pid=7458 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1038.562870][ T31] audit: type=1400 audit(1038.496:3879): avc: denied { prog_load } for pid=8025 comm="syz.1.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1038.564847][ T31] audit: type=1400 audit(1038.506:3880): avc: denied { bpf } for pid=8025 comm="syz.1.471" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1038.565875][ T31] audit: type=1400 audit(1038.506:3881): avc: denied { perfmon } for pid=8025 comm="syz.1.471" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1038.571009][ T31] audit: type=1400 audit(1038.506:3882): avc: denied { prog_run } for pid=8025 comm="syz.1.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1038.577846][ T31] audit: type=1400 audit(1038.516:3883): avc: denied { create } for pid=8025 comm="syz.1.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1038.584228][ T31] audit: type=1400 audit(1038.526:3884): avc: denied { write } for pid=8025 comm="syz.1.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1038.618785][ T31] audit: type=1400 audit(1038.556:3885): avc: denied { read write } for pid=7458 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1043.509829][ T5818] usb 1-1: USB disconnect, device number 15 [ 1043.610964][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 1043.611016][ T31] audit: type=1400 audit(1043.546:3889): avc: denied { read write } for pid=6976 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1043.643731][ T31] audit: type=1400 audit(1043.576:3890): avc: denied { read write open } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1043.644704][ T31] audit: type=1400 audit(1043.576:3891): avc: denied { ioctl } for pid=6976 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1043.877255][ T31] audit: type=1400 audit(1043.816:3892): avc: denied { write } for pid=8040 comm="syz.0.473" name="xfrm_stat" dev="proc" ino=4026532892 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1043.878255][ T31] audit: type=1400 audit(1043.816:3893): avc: denied { write } for pid=8040 comm="syz.0.473" path="/proc/98/net/xfrm_stat" dev="proc" ino=4026532892 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1043.928162][ T31] audit: type=1400 audit(1043.866:3894): avc: denied { execmem } for pid=8040 comm="syz.0.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1044.556992][ T31] audit: type=1400 audit(1044.496:3895): avc: denied { map_create } for pid=8027 comm="syz.1.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1044.557883][ T31] audit: type=1400 audit(1044.496:3896): avc: denied { bpf } for pid=8027 comm="syz.1.472" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1044.558650][ T31] audit: type=1400 audit(1044.496:3897): avc: denied { map_read map_write } for pid=8027 comm="syz.1.472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1047.176114][ T31] audit: type=1400 audit(1047.116:3898): avc: denied { read write } for pid=7458 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1047.654013][ T8] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 1047.803712][ T8] usb 2-1: Using ep0 maxpacket: 8 [ 1047.815185][ T8] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1047.854103][ T8] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1047.854696][ T8] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1047.855265][ T8] usb 2-1: Product: syz [ 1047.855553][ T8] usb 2-1: Manufacturer: syz [ 1047.855958][ T8] usb 2-1: SerialNumber: syz [ 1048.987397][ T8] cdc_ncm 2-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 1048.988137][ T8] cdc_ncm 2-1:1.0: setting tx_max = 16384 [ 1049.424761][ T8] cdc_ncm 2-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.1-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 1049.436320][ T8] usb 2-1: USB disconnect, device number 13 [ 1049.437363][ T8] cdc_ncm 2-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.1-1, CDC NCM (NO ZLP) [ 1049.585580][ T8] ------------[ cut here ]------------ [ 1049.585961][ T8] WARNING: CPU: 0 PID: 8 at lib/debugobjects.c:514 debug_print_object+0xc4/0xd8 [ 1049.586237][ T8] ODEBUG: free active (active state 0) object: 8551ffcc object type: work_struct hint: usbnet_deferred_kevent+0x0/0x388 [ 1049.587679][ T8] Modules linked in: [ 1049.588198][ T8] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1049.588675][ T8] CPU: 0 UID: 0 PID: 8 Comm: kworker/0:0 Not tainted 6.11.0-syzkaller #0 [ 1049.588860][ T8] Hardware name: ARM-Versatile Express [ 1049.589086][ T8] Workqueue: usb_hub_wq hub_event [ 1049.589276][ T8] Call trace: [ 1049.589650][ T8] [<819839d8>] (dump_backtrace) from [<81983ad4>] (show_stack+0x18/0x1c) [ 1049.589905][ T8] r7:00000000 r6:826228c4 r5:00000000 r4:82035550 [ 1049.590034][ T8] [<81983abc>] (show_stack) from [<819a1a38>] (dump_stack_lvl+0x54/0x7c) [ 1049.590584][ T8] [<819a19e4>] (dump_stack_lvl) from [<819a1a78>] (dump_stack+0x18/0x1c) [ 1049.590756][ T8] r5:00000000 r4:8286ed18 [ 1049.590908][ T8] [<819a1a60>] (dump_stack) from [<8198457c>] (panic+0x120/0x370) [ 1049.591468][ T8] [<8198445c>] (panic) from [<802421cc>] (get_taint+0x0/0x1c) [ 1049.591780][ T8] r3:8260c5c4 r2:00000001 r1:8201dd08 r0:82025ad4 [ 1049.592023][ T8] r7:80847c08 [ 1049.592187][ T8] [<80242158>] (check_panic_on_warn) from [<8024232c>] (__warn+0x80/0x188) [ 1049.592871][ T8] [<802422ac>] (__warn) from [<8024261c>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 1049.593287][ T8] r8:00000009 r7:8208497c r6:df839a8c r5:82e35400 r4:00000000 [ 1049.593648][ T8] [<80242438>] (warn_slowpath_fmt) from [<80847c08>] (debug_print_object+0xc4/0xd8) [ 1049.594034][ T8] r10:00000005 r9:8551f800 r8:81a01c24 r7:820aef70 r6:828db0c4 r5:df839b34 [ 1049.594360][ T8] r4:8260cda4 [ 1049.594548][ T8] [<80847b44>] (debug_print_object) from [<80849498>] (debug_check_no_obj_freed+0x254/0x2a0) [ 1049.594969][ T8] r8:85520000 r7:8551ffcc r6:00000100 r5:00000003 r4:00000000 [ 1049.595264][ T8] [<80849244>] (debug_check_no_obj_freed) from [<804bef54>] (kfree+0x198/0x338) [ 1049.595674][ T8] r10:8277acbc r9:8562f880 r8:8551f800 r7:80463c7c r6:82c023c0 r5:ddeb8760 [ 1049.596143][ T8] r4:8551f800 [ 1049.596339][ T8] [<804bedbc>] (kfree) from [<80463c7c>] (kvfree+0x2c/0x30) [ 1049.596730][ T8] r10:8277acbc r9:8562f880 r8:8551f800 r7:00000000 r6:854af340 r5:84c97580 [ 1049.597094][ T8] r4:8551f800 [ 1049.597509][ T8] [<80463c50>] (kvfree) from [<814e7108>] (netdev_release+0x2c/0x34) [ 1049.597902][ T8] r5:84c97580 r4:8551f800 [ 1049.598136][ T8] [<814e70dc>] (netdev_release) from [<80a91dd8>] (device_release+0x38/0xa8) [ 1049.598568][ T8] r5:84c97580 r4:8551fbc0 [ 1049.598806][ T8] [<80a91da0>] (device_release) from [<8195d828>] (kobject_put+0xa0/0x1f4) [ 1049.599183][ T8] r5:81b4ba0c r4:8551fbc0 [ 1049.599394][ T8] [<8195d788>] (kobject_put) from [<80a92004>] (put_device+0x18/0x1c) [ 1049.600309][ T8] r7:8562fc00 r6:00000000 r5:8551f800 r4:00000000 [ 1049.600841][ T8] [<80a91fec>] (put_device) from [<8149b218>] (free_netdev+0x134/0x1ac) [ 1049.601438][ T8] [<8149b0e4>] (free_netdev) from [<80d75578>] (usbnet_disconnect+0xac/0xf0) [ 1049.601979][ T8] r6:8551ff94 r5:8551fe80 r4:00000000 [ 1049.602261][ T8] [<80d754cc>] (usbnet_disconnect) from [<80ddd434>] (usb_unbind_interface+0x84/0x2c4) [ 1049.602983][ T8] r8:00000044 r7:8562fc30 r6:8277acbc r5:00000000 r4:8562fc00 [ 1049.603607][ T8] [<80ddd3b0>] (usb_unbind_interface) from [<80a99edc>] (device_remove+0x64/0x6c) [ 1049.604082][ T8] r10:00000000 r9:8562f880 r8:00000044 r7:8562fc74 r6:8277acbc r5:00000000 [ 1049.604661][ T8] r4:8562fc30 [ 1049.604942][ T8] [<80a99e78>] (device_remove) from [<80a9b3f4>] (device_release_driver_internal+0x18c/0x200) [ 1049.605447][ T8] r5:00000000 r4:8562fc30 [ 1049.605820][ T8] [<80a9b268>] (device_release_driver_internal) from [<80a9b480>] (device_release_driver+0x18/0x1c) [ 1049.606306][ T8] r9:8562f880 r8:82f5ad40 r7:82f5ad38 r6:82f5ad0c r5:8562fc30 r4:82f5ad30 [ 1049.606677][ T8] [<80a9b468>] (device_release_driver) from [<80a99560>] (bus_remove_device+0xcc/0x120) [ 1049.607164][ T8] [<80a99494>] (bus_remove_device) from [<80a93670>] (device_del+0x148/0x38c) [ 1049.607580][ T8] r9:8562f880 r8:82e35400 r7:04208060 r6:00000000 r5:8562fc30 r4:8562fc74 [ 1049.607925][ T8] [<80a93528>] (device_del) from [<80ddae50>] (usb_disable_device+0xdc/0x1f0) [ 1049.608316][ T8] r10:00000000 r9:00000000 r8:8562fc00 r7:8562f800 r6:84c77408 r5:00000001 [ 1049.608790][ T8] r4:00000038 [ 1049.608996][ T8] [<80ddad74>] (usb_disable_device) from [<80dcfcb4>] (usb_disconnect+0xec/0x29c) [ 1049.609693][ T8] r10:00000001 r9:84f59c00 r8:8562f8c4 r7:82fa5000 r6:8562f880 r5:8562f800 [ 1049.610066][ T8] r4:60000113 [ 1049.610271][ T8] [<80dcfbc8>] (usb_disconnect) from [<80dd2964>] (hub_event+0xe78/0x194c) [ 1049.610702][ T8] r10:00000001 r9:00000100 r8:83477100 r7:8562f800 r6:82fa4800 r5:82fa5210 [ 1049.611102][ T8] r4:00000001 [ 1049.611305][ T8] [<80dd1aec>] (hub_event) from [<80265f98>] (process_one_work+0x1b4/0x4f4) [ 1049.611810][ T8] r10:82e6e805 r9:82e35400 r8:00800000 r7:dddcff40 r6:82e6e800 r5:83477100 [ 1049.612393][ T8] r4:82cb5080 [ 1049.612945][ T8] [<80265de4>] (process_one_work) from [<80266b7c>] (worker_thread+0x1ec/0x3bc) [ 1049.613641][ T8] r10:82e35400 r9:82cb50ac r8:61c88647 r7:dddcff60 r6:82604d40 r5:dddcff40 [ 1049.614003][ T8] r4:82cb5080 [ 1049.614206][ T8] [<80266990>] (worker_thread) from [<8026fb98>] (kthread+0x104/0x134) [ 1049.614610][ T8] r10:00000000 r9:df819e48 r8:82cb48c0 r7:82cb5080 r6:80266990 r5:82e35400 [ 1049.615006][ T8] r4:82cb4180 [ 1049.615208][ T8] [<8026fa94>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1049.615591][ T8] Exception stack(0xdf839fb0 to 0xdf839ff8) [ 1049.615908][ T8] 9fa0: 00000000 00000000 00000000 00000000 [ 1049.616335][ T8] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1049.616777][ T8] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1049.617117][ T8] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026fa94 r4:82cb4180 [ 1049.619096][ T8] Rebooting in 86400 seconds.. VM DIAGNOSIS: 13:28:33 Registers: info registers vcpu 0 CPU#0 R00=827549d0 R01=0cad0cac R02=00000002 R03=eae11030 R04=83eafc40 R05=20000193 R06=60000193 R07=00000001 R08=8287146c R09=0000005e R10=00000001 R11=df8397f0 R12=df8397b4 R13=df8397cc R14=819ae814 R15=809db8f0 PSR=80000193 N--- A S svc32 s00=00000000 s01=405034ac d00=405034ac00000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=ffffffff s13=7fefffff d06=7fefffffffffffff s14=00000000 s15=405034ac d07=405034ac00000000 s16=00000003 s17=7ecb9af0 d08=7ecb9af000000003 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 80000010 info registers vcpu 1 CPU#1 R00=00000001 R01=00000003 R02=e01fdd74 R03=802a5375 R04=00000000 R05=8080648c R06=00000000 R07=844b7840 R08=00000001 R09=00000000 R10=000000db R11=e01fde0c R12=e01fdd88 R13=e01fdda8 R14=80808cec R15=80808b18 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005327e9 s17=0053a335 d08=0053a335005327e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=03ffffff s33=00108803 d16=0010880303ffffff s34=90030008 s35=0f800210 d17=0f80021090030008 s36=020f8003 s37=80031380 d18=80031380020f8003 s38=78080013 s39=06138803 d19=0613880378080013 s40=00000804 s41=138c0300 d20=138c030000000804 s42=03020400 s43=08001390 d21=0800139003020400 s44=13980300 s45=03000800 d22=0300080013980300 s46=020013a0 s47=13a20302 d23=13a20302020013a0 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=caee2db9 s53=780988f1 d26=780988f1caee2db9 s54=6f3d922a s55=501d03e7 d27=501d03e76f3d922a s56=f07136c3 s57=df5464a5 d28=df5464a5f07136c3 s58=80d8e0d2 s59=195ae10d d29=195ae10d80d8e0d2 s60=a6408540 s61=1da9e1be d30=1da9e1bea6408540 s62=00363ced s63=674f7a0a d31=674f7a0a00363ced FPSCR: 00000000