last executing test programs: 6.07959409s ago: executing program 1 (id=3945): r0 = socket$igmp6(0xa, 0x3, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000018c0)={'ip6gretap0\x00', &(0x7f0000001880)=@ethtool_ts_info}) 5.417891386s ago: executing program 1 (id=3946): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bond0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) bind$netlink(r2, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfd, 0x400}, 0xc) getsockname$packet(r2, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x40d, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, r3, 0x1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_MODE={0x5, 0x1, 0x4}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40040}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x44800) sendmsg$nl_route(r0, 0x0, 0x0) 4.667352486s ago: executing program 1 (id=3949): setreuid(0x0, 0xee01) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)={{0x1, 0x0, 0x0, 0x0, 0x0, 0x96, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYRES8], 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0x0, 0x7b8a, 0x3, 0x4707, 0x2, 0x6, 0x9a9, 0x401}) 4.2942589s ago: executing program 0 (id=3950): ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000018c0)={'ip6gretap0\x00', &(0x7f0000001880)=@ethtool_ts_info}) 3.901337306s ago: executing program 1 (id=3951): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000001040)={'lo\x00', {0x2, 0x4e1e, @broadcast}}) 3.560258849s ago: executing program 0 (id=3952): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) close(0xffffffffffffffff) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x81000) 3.223880033s ago: executing program 1 (id=3953): mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000008300), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', 0x0, 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) syz_fuse_handle_req(r0, &(0x7f00000021c0), 0x2000, &(0x7f00000041c0)={&(0x7f00000001c0)={0x50, 0x0, 0x0, {0x7, 0x29, 0x7, 0x2100039, 0x0, 0x0, 0x1, 0x57, 0x0, 0x0, 0x2}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f0000006300)="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", 0x2000, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)={0x78, 0x0, 0xb0d, {0xa05, 0x2e, 0x0, {0x0, 0xa8f, 0x4, 0x2, 0x6, 0x7, 0x3, 0x7, 0xffff, 0xc000, 0x10000, 0x0, 0x0, 0x10, 0x5}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chdir(&(0x7f0000000140)='./file0\x00') 2.748298241s ago: executing program 0 (id=3954): r0 = socket$alg(0x26, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) accept4$alg(r0, 0x0, 0x0, 0x80800) 2.009468251s ago: executing program 0 (id=3955): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x10, 0x803, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2b, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0x7}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd2a, 0x8000002, {0x0, 0x0, 0x0, r3, {0x0, 0x6}, {}, {0x7, 0xa}}, [@filter_kind_options=@f_basic={{0xa}, {0x14, 0x2, [@TCA_BASIC_EMATCHES={0x10, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}, @TCA_EMATCH_TREE_LIST={0x4}]}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x24008004}, 0x0) 1.678054924s ago: executing program 1 (id=3956): io_uring_setup(0x162e, &(0x7f00000002c0)={0x0, 0xd38b, 0x1000, 0x1, 0x348}) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000100)=0xfffe, 0x4) recvmmsg(r1, &(0x7f0000001440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002002, 0x0) write$binfmt_misc(r0, &(0x7f0000000040), 0xffc1) close(0x3) 370.040905ms ago: executing program 0 (id=3957): r0 = io_uring_setup(0x3c4e, &(0x7f0000000bc0)={0x0, 0xcb44, 0x3040, 0x0, 0x26c}) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r0, 0xd, &(0x7f0000000140)={0x7, 0x0, 0x0, 0x0}, 0x20) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r0, 0xe, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], &(0x7f0000000080)=[0x3fffffffffff], 0x1}, 0x20) io_uring_register$IORING_REGISTER_FILES_UPDATE2(r0, 0xe, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x0, 0x1}, 0x20) 0s ago: executing program 0 (id=3958): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x10, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x86}}, {{0x5, 0x0, 0x5, 0x9, 0x0, 0x1, 0x10000000}}, [@jmp={0x5, 0x0, 0x4, 0x9, 0x0, 0xfffffffffffffffc, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x2a}}}, &(0x7f0000000680)='GPL\x00', 0xa, 0x1016, &(0x7f0000001880)=""/4118, 0x41100}, 0x94) kernel console output (not intermixed with test programs): ass=chr_file permissive=1 [ 2177.282827][ T31] audit: type=1400 audit(2177.193:13639): avc: denied { mount } for pid=16289 comm="syz.0.3682" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 2178.504716][ T31] audit: type=1400 audit(2178.423:13640): avc: denied { write } for pid=16294 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2178.510513][ T31] audit: type=1400 audit(2178.433:13641): avc: denied { write open } for pid=16294 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2178.544965][ T31] audit: type=1400 audit(2178.463:13642): avc: denied { search } for pid=16294 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2178.553635][ T31] audit: type=1400 audit(2178.473:13643): avc: denied { search } for pid=16294 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2178.556144][ T31] audit: type=1400 audit(2178.473:13644): avc: denied { search } for pid=16294 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2178.567444][ T31] audit: type=1400 audit(2178.483:13645): avc: denied { search } for pid=16294 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2178.682915][ T31] audit: type=1400 audit(2178.603:13646): avc: denied { search } for pid=16295 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2185.658095][ T31] kauditd_printk_skb: 145 callbacks suppressed [ 2185.658547][ T31] audit: type=1400 audit(2185.573:13792): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2185.678009][ T31] audit: type=1400 audit(2185.593:13793): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2185.741845][ T31] audit: type=1400 audit(2185.623:13794): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2185.918410][ T31] audit: type=1400 audit(2185.833:13795): avc: denied { read write } for pid=16299 comm="syz.1.3683" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2185.941811][ T31] audit: type=1400 audit(2185.843:13796): avc: denied { read write open } for pid=16299 comm="syz.1.3683" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2185.947468][ T31] audit: type=1400 audit(2185.863:13797): avc: denied { mounton } for pid=16299 comm="syz.1.3683" path="/181/file0" dev="tmpfs" ino=963 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2185.958800][ T31] audit: type=1400 audit(2185.873:13798): avc: denied { mount } for pid=16299 comm="syz.1.3683" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2187.010646][ T31] audit: type=1400 audit(2186.913:13799): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2187.011016][ T31] audit: type=1400 audit(2186.913:13800): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2187.027227][ T31] audit: type=1400 audit(2186.943:13801): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2189.243614][T16319] SELinux: Context system_u:object_r:inetd_log_t:s0 is not valid (left unmapped). [ 2192.235912][ T31] kauditd_printk_skb: 85 callbacks suppressed [ 2192.236247][ T31] audit: type=1400 audit(2192.153:13887): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2192.266901][ T31] audit: type=1400 audit(2192.173:13888): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2192.285725][ T31] audit: type=1400 audit(2192.203:13889): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2192.583115][ T31] audit: type=1400 audit(2192.493:13890): avc: denied { unmount } for pid=14002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2192.664805][ T31] audit: type=1400 audit(2192.573:13891): avc: denied { read write } for pid=16327 comm="syz.0.3693" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2192.683200][ T31] audit: type=1400 audit(2192.603:13892): avc: denied { read write open } for pid=16327 comm="syz.0.3693" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2192.906118][ T31] audit: type=1400 audit(2192.823:13893): avc: denied { mounton } for pid=16327 comm="syz.0.3693" path="/138/file0" dev="tmpfs" ino=746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2193.016666][ T31] audit: type=1400 audit(2192.933:13894): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2193.021796][ T31] audit: type=1400 audit(2192.933:13895): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2193.023653][ T31] audit: type=1400 audit(2192.943:13896): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2193.707384][T16331] fuse: Bad value for 'fd' [ 2195.286194][T16338] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3696'. [ 2195.287611][T16338] netlink: 16 bytes leftover after parsing attributes in process `syz.1.3696'. [ 2197.403013][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 2197.403944][ T31] audit: type=1400 audit(2197.303:13944): avc: denied { read write } for pid=16339 comm="syz.1.3698" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2197.433835][ T31] audit: type=1400 audit(2197.333:13945): avc: denied { read write open } for pid=16339 comm="syz.1.3698" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2197.451310][ T31] audit: type=1400 audit(2197.373:13946): avc: denied { mounton } for pid=16339 comm="syz.1.3698" path="/189/file0" dev="tmpfs" ino=1008 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2197.475392][T16340] fuse: Unknown parameter 'group_id00000000000000000000' [ 2197.691060][ T31] audit: type=1400 audit(2197.613:13947): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2197.699130][ T31] audit: type=1400 audit(2197.613:13948): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2197.702439][ T31] audit: type=1400 audit(2197.613:13949): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2197.791437][ T31] audit: type=1400 audit(2197.713:13950): avc: denied { prog_load } for pid=16342 comm="syz.1.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2197.797972][ T31] audit: type=1400 audit(2197.713:13951): avc: denied { bpf } for pid=16342 comm="syz.1.3699" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2197.812494][ T31] audit: type=1400 audit(2197.733:13952): avc: denied { perfmon } for pid=16342 comm="syz.1.3699" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2197.836243][ T31] audit: type=1400 audit(2197.753:13953): avc: denied { execmem } for pid=16342 comm="syz.1.3699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2199.477304][T16347] fuse: Bad value for 'fd' [ 2200.935350][T16351] fuse: Unknown parameter 'group_id00000000000000000000' [ 2201.645785][T16353] netlink: 'syz.0.3704': attribute type 7 has an invalid length. [ 2203.068286][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 2203.069255][ T31] audit: type=1400 audit(2202.983:13982): avc: denied { unmount } for pid=14502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2203.217833][ T31] audit: type=1400 audit(2203.133:13983): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2203.233377][ T31] audit: type=1400 audit(2203.153:13984): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2203.239143][ T31] audit: type=1400 audit(2203.153:13985): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2203.278354][ T31] audit: type=1400 audit(2203.193:13986): avc: denied { read write } for pid=16342 comm="syz.1.3699" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2203.319101][ T31] audit: type=1400 audit(2203.233:13987): avc: denied { read write open } for pid=16342 comm="syz.1.3699" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2203.347006][ T31] audit: type=1400 audit(2203.263:13988): avc: denied { ioctl } for pid=16342 comm="syz.1.3699" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2203.428515][ T31] audit: type=1400 audit(2203.343:13989): avc: denied { ioctl } for pid=16342 comm="syz.1.3699" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf03 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2203.450652][ T31] audit: type=1400 audit(2203.363:13990): avc: denied { ioctl } for pid=16342 comm="syz.1.3699" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2203.466539][ T31] audit: type=1400 audit(2203.383:13991): avc: denied { ioctl } for pid=16342 comm="syz.1.3699" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf61 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2204.596790][T10228] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2204.599116][T10228] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2204.646593][T10228] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2204.646985][T10228] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 2205.367817][T16366] fuse: Unknown parameter 'grou00000000000000000000' [ 2206.131066][T16368] fuse: Bad value for 'user_id' [ 2206.166709][T16368] fuse: Bad value for 'user_id' [ 2208.077307][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2208.077650][ T31] audit: type=1400 audit(2207.993:14025): avc: denied { ioctl } for pid=16371 comm="syz.0.3710" path="/dev/ttyS3" dev="devtmpfs" ino=607 ioctlcmd=0x542f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2208.303317][ T31] audit: type=1400 audit(2208.223:14026): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2208.310113][ T31] audit: type=1400 audit(2208.223:14027): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2208.312679][ T31] audit: type=1400 audit(2208.223:14028): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2209.333973][ T31] audit: type=1400 audit(2209.253:14029): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2209.340202][ T31] audit: type=1400 audit(2209.253:14030): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2209.351816][ T31] audit: type=1400 audit(2209.273:14031): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2209.742396][ T31] audit: type=1400 audit(2209.663:14032): avc: denied { read write } for pid=16375 comm="syz.0.3712" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2209.747662][ T31] audit: type=1400 audit(2209.663:14033): avc: denied { read write open } for pid=16375 comm="syz.0.3712" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2209.763117][ T31] audit: type=1400 audit(2209.683:14034): avc: denied { mounton } for pid=16375 comm="syz.0.3712" path="/153/file0" dev="tmpfs" ino=832 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2209.772149][T16376] fuse: Unknown parameter 'group_i00000000000000000000' [ 2210.862306][T16378] fuse: Bad value for 'user_id' [ 2210.862601][T16378] fuse: Bad value for 'user_id' [ 2213.991231][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 2213.991523][ T31] audit: type=1400 audit(2213.903:14067): avc: denied { prog_load } for pid=16381 comm="syz.0.3715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2213.994182][ T31] audit: type=1400 audit(2213.913:14068): avc: denied { bpf } for pid=16381 comm="syz.0.3715" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2216.484843][ T31] audit: type=1400 audit(2216.403:14069): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2216.492498][ T31] audit: type=1400 audit(2216.403:14070): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2216.555732][ T31] audit: type=1400 audit(2216.403:14071): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2217.308005][ T31] audit: type=1400 audit(2217.233:14072): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2217.315219][ T31] audit: type=1400 audit(2217.233:14073): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2217.354444][ T31] audit: type=1400 audit(2217.263:14074): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2217.554792][ T31] audit: type=1400 audit(2217.453:14075): avc: denied { read write } for pid=16386 comm="syz.0.3717" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2217.558812][ T31] audit: type=1400 audit(2217.473:14076): avc: denied { read write open } for pid=16386 comm="syz.0.3717" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2217.572384][T16387] fuse: Unknown parameter 'group_i00000000000000000000' [ 2219.008729][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 2219.009099][ T31] audit: type=1400 audit(2218.913:14098): avc: denied { bpf } for pid=16390 comm="syz.0.3719" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2219.009322][ T31] audit: type=1400 audit(2218.913:14099): avc: denied { perfmon } for pid=16390 comm="syz.0.3719" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2219.009863][ T31] audit: type=1400 audit(2218.913:14100): avc: denied { bpf } for pid=16390 comm="syz.0.3719" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2219.068375][ T31] audit: type=1400 audit(2218.983:14101): avc: denied { perfmon } for pid=16390 comm="syz.0.3719" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2219.122400][ T31] audit: type=1400 audit(2219.043:14102): avc: denied { bpf } for pid=16390 comm="syz.0.3719" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2219.127179][ T31] audit: type=1400 audit(2219.043:14103): avc: denied { perfmon } for pid=16390 comm="syz.0.3719" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2219.142309][ T31] audit: type=1400 audit(2219.053:14104): avc: denied { bpf } for pid=16390 comm="syz.0.3719" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2219.146433][ T31] audit: type=1400 audit(2219.063:14105): avc: denied { prog_run } for pid=16390 comm="syz.0.3719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2220.484440][ T31] audit: type=1400 audit(2219.453:14106): avc: denied { execmem } for pid=16390 comm="syz.0.3719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2229.310890][ T31] audit: type=1400 audit(2229.173:14107): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2229.311641][ T31] audit: type=1400 audit(2229.183:14108): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2229.311926][ T31] audit: type=1400 audit(2229.183:14109): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2229.562566][ T31] audit: type=1400 audit(2229.483:14110): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2229.566274][ T31] audit: type=1400 audit(2229.483:14111): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2229.610358][ T31] audit: type=1400 audit(2229.513:14112): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2229.862169][ T31] audit: type=1400 audit(2229.783:14113): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2229.867055][ T31] audit: type=1400 audit(2229.783:14114): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2229.888768][ T31] audit: type=1400 audit(2229.803:14115): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2230.045665][ T31] audit: type=1400 audit(2229.953:14116): avc: denied { read write } for pid=16398 comm="syz.1.3722" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2230.091370][T16399] fuse: Unknown parameter 'group_i00000000000000000000' [ 2233.484175][T16410] fuse: Unknown parameter 'group_id00000000000000000000' [ 2234.546916][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2234.547273][ T31] audit: type=1400 audit(2234.463:14150): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2234.547538][ T31] audit: type=1400 audit(2234.463:14151): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2234.556829][ T31] audit: type=1400 audit(2234.473:14152): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2234.795153][ T31] audit: type=1400 audit(2234.713:14153): avc: denied { create } for pid=16416 comm="syz.1.3730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2234.807116][ T31] audit: type=1400 audit(2234.723:14154): avc: denied { write } for pid=16416 comm="syz.1.3730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2234.826272][ T31] audit: type=1400 audit(2234.743:14155): avc: denied { module_request } for pid=16416 comm="syz.1.3730" kmod="net-pf-16-proto-16-family-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2235.334117][T16419] SELinux: failed to load policy [ 2235.362743][ T31] audit: type=1400 audit(2235.253:14156): avc: denied { load_policy } for pid=16416 comm="syz.1.3730" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 2235.498767][ T31] audit: type=1400 audit(2235.403:14157): avc: denied { read } for pid=16416 comm="syz.1.3730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2235.680686][ T31] audit: type=1400 audit(2235.593:14158): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2235.683488][ T31] audit: type=1400 audit(2235.593:14159): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2235.825932][T16421] netlink: 'syz.1.3731': attribute type 1 has an invalid length. [ 2236.268788][T16423] fuse: Unknown parameter 'group_id00000000000000000000' [ 2238.315998][T16435] fuse: Unknown parameter 'group_id00000000000000000000' [ 2239.757422][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 2239.757824][ T31] audit: type=1400 audit(2239.673:14222): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2239.814579][ T31] audit: type=1400 audit(2239.723:14223): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2239.824944][ T31] audit: type=1400 audit(2239.743:14224): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2240.347144][ T31] audit: type=1400 audit(2240.263:14225): avc: denied { unmount } for pid=14502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2240.372725][ T31] audit: type=1400 audit(2240.283:14226): avc: denied { create } for pid=16442 comm="syz.1.3741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2240.407111][ T31] audit: type=1400 audit(2240.323:14227): avc: denied { write } for pid=16442 comm="syz.1.3741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2240.416879][ T31] audit: type=1400 audit(2240.333:14228): avc: denied { module_request } for pid=16442 comm="syz.1.3741" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2240.547182][ T31] audit: type=1400 audit(2240.463:14229): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2240.565320][ T31] audit: type=1400 audit(2240.463:14230): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2240.579095][ T31] audit: type=1400 audit(2240.503:14231): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2241.595224][T16443] syz.1.3741 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 2244.786337][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 2244.786802][ T31] audit: type=1400 audit(2244.703:14279): avc: denied { read write open } for pid=16463 comm="syz.0.3746" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2244.807408][ T31] audit: type=1400 audit(2244.723:14280): avc: denied { mounton } for pid=16463 comm="syz.0.3746" path="/169/file0" dev="tmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2244.982127][ T31] audit: type=1400 audit(2244.863:14281): avc: denied { write } for pid=16460 comm="syz.1.3745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2245.583964][ T31] audit: type=1400 audit(2245.493:14282): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2245.641167][ T31] audit: type=1400 audit(2245.523:14283): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2245.641523][ T31] audit: type=1400 audit(2245.533:14284): avc: denied { read } for pid=16460 comm="syz.1.3745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2245.641720][ T31] audit: type=1400 audit(2245.533:14285): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2246.087523][ T31] audit: type=1400 audit(2246.003:14286): avc: denied { prog_load } for pid=16466 comm="syz.0.3747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2246.162119][ T31] audit: type=1400 audit(2246.063:14287): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2246.162532][ T31] audit: type=1400 audit(2246.063:14288): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2249.985862][ T31] kauditd_printk_skb: 69 callbacks suppressed [ 2249.986188][ T31] audit: type=1400 audit(2249.893:14358): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2250.113336][ T31] audit: type=1400 audit(2250.033:14359): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2250.128269][ T31] audit: type=1400 audit(2250.033:14360): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2250.515922][ T31] audit: type=1400 audit(2250.433:14361): avc: denied { create } for pid=16477 comm="syz.1.3751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2250.564701][ T31] audit: type=1400 audit(2250.473:14362): avc: denied { create } for pid=16477 comm="syz.1.3751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2250.569043][ T31] audit: type=1400 audit(2250.473:14363): avc: denied { write } for pid=16477 comm="syz.1.3751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2250.702074][ T31] audit: type=1400 audit(2250.513:14364): avc: denied { module_request } for pid=16477 comm="syz.1.3751" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2250.831444][ T31] audit: type=1400 audit(2250.733:14365): avc: denied { create } for pid=16478 comm="syz.0.3752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2250.855001][ T31] audit: type=1400 audit(2250.773:14366): avc: denied { create } for pid=16478 comm="syz.0.3752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2250.955121][ T31] audit: type=1400 audit(2250.823:14367): avc: denied { write } for pid=16478 comm="syz.0.3752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2255.170288][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2255.183528][ T31] audit: type=1400 audit(2255.083:14401): avc: denied { module_request } for pid=16498 comm="syz.1.3756" kmod="crypto-ecb(cipher_null)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2255.240494][ T31] audit: type=1400 audit(2255.143:14402): avc: denied { accept } for pid=16498 comm="syz.1.3756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2255.240855][ T31] audit: type=1400 audit(2255.153:14403): avc: denied { create } for pid=16498 comm="syz.1.3756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2257.269101][ T31] audit: type=1400 audit(2257.183:14404): avc: denied { unmount } for pid=14502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2257.410680][ T31] audit: type=1400 audit(2257.303:14405): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2257.411125][ T31] audit: type=1400 audit(2257.303:14406): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2257.411312][ T31] audit: type=1400 audit(2257.313:14407): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2257.615500][ T31] audit: type=1400 audit(2257.533:14408): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2257.629211][ T31] audit: type=1400 audit(2257.543:14409): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2257.644877][ T31] audit: type=1400 audit(2257.563:14410): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2257.725977][T16512] fuse: Bad value for 'group_id' [ 2257.727061][T16512] fuse: Bad value for 'group_id' [ 2258.170400][T16517] input: syz1 as /devices/virtual/input/input11 [ 2259.611168][T15718] usb 2-1: new high-speed USB device number 34 using dummy_hcd [ 2259.939660][T15718] usb 2-1: unable to get BOS descriptor or descriptor too short [ 2260.041870][T15718] usb 2-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 2260.042921][T15718] usb 2-1: config 1 has no interface number 1 [ 2260.043781][T15718] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 2260.196543][ T31] kauditd_printk_skb: 76 callbacks suppressed [ 2260.197103][ T31] audit: type=1400 audit(2260.113:14487): avc: denied { ioctl } for pid=16524 comm="syz.1.3761" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2260.216301][ T31] audit: type=1400 audit(2260.133:14488): avc: denied { ioctl } for pid=16524 comm="syz.1.3761" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2260.252486][T15718] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 2260.252894][T15718] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2260.253075][T15718] usb 2-1: Product: syz [ 2260.253310][T15718] usb 2-1: Manufacturer: syz [ 2260.253575][T15718] usb 2-1: SerialNumber: syz [ 2260.264858][ T31] audit: type=1400 audit(2260.183:14489): avc: denied { ioctl } for pid=16524 comm="syz.1.3761" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2260.292389][ T31] audit: type=1400 audit(2260.203:14490): avc: denied { ioctl } for pid=16524 comm="syz.1.3761" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2260.296436][ T31] audit: type=1400 audit(2260.213:14491): avc: denied { ioctl } for pid=16524 comm="syz.1.3761" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2260.360951][ T31] audit: type=1400 audit(2260.273:14492): avc: denied { ioctl } for pid=16524 comm="syz.1.3761" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2260.361320][ T31] audit: type=1400 audit(2260.273:14493): avc: denied { ioctl } for pid=16524 comm="syz.1.3761" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2260.741887][T15718] usb 2-1: found format II with max.bitrate = 26774, frame size=2 [ 2260.743248][T15718] usb 2-1: found format II with max.bitrate = 26774, frame size=2 [ 2260.761154][T15718] usb 2-1: failed to enable PITCH for EP 0x82 [ 2260.900865][T15718] usb 2-1: USB disconnect, device number 34 [ 2261.073418][ T31] audit: type=1400 audit(2260.983:14494): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2261.077084][ T31] audit: type=1400 audit(2261.003:14495): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2261.118156][ T31] audit: type=1400 audit(2261.023:14496): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2261.663179][T16561] fuse: Bad value for 'group_id' [ 2261.663505][T16561] fuse: Bad value for 'group_id' [ 2265.240256][ T31] kauditd_printk_skb: 174 callbacks suppressed [ 2265.240605][ T31] audit: type=1400 audit(2265.153:14671): avc: denied { read } for pid=16564 comm="syz.0.3764" path="socket:[39488]" dev="sockfs" ino=39488 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2265.255606][ T31] audit: type=1400 audit(2265.153:14672): avc: denied { read } for pid=16564 comm="syz.0.3764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2265.307524][ T31] audit: type=1400 audit(2265.223:14673): avc: denied { read } for pid=16564 comm="syz.0.3764" path="socket:[39488]" dev="sockfs" ino=39488 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2265.326563][ T31] audit: type=1400 audit(2265.233:14674): avc: denied { read } for pid=16564 comm="syz.0.3764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2265.345458][ T31] audit: type=1400 audit(2265.253:14675): avc: denied { read } for pid=16564 comm="syz.0.3764" path="socket:[39488]" dev="sockfs" ino=39488 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2265.348969][ T31] audit: type=1400 audit(2265.253:14676): avc: denied { read } for pid=16564 comm="syz.0.3764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2265.539247][ T31] audit: type=1400 audit(2265.453:14677): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2265.540394][ T31] audit: type=1400 audit(2265.453:14678): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2265.570330][ T31] audit: type=1400 audit(2265.473:14679): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2265.761781][ T31] audit: type=1400 audit(2265.673:14680): avc: denied { read write } for pid=16574 comm="syz.0.3768" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2270.390058][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2270.390426][ T31] audit: type=1400 audit(2270.303:14714): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2270.401952][ T31] audit: type=1400 audit(2270.313:14715): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2270.420211][ T31] audit: type=1400 audit(2270.343:14716): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2270.533658][ T31] audit: type=1400 audit(2270.453:14717): avc: denied { create } for pid=16591 comm="syz.0.3771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2270.564405][ T31] audit: type=1400 audit(2270.483:14718): avc: denied { setopt } for pid=16591 comm="syz.0.3771" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2270.659244][ T31] audit: type=1400 audit(2270.573:14719): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2270.681191][ T31] audit: type=1400 audit(2270.593:14720): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2270.681525][ T31] audit: type=1400 audit(2270.593:14721): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2270.851434][ T31] audit: type=1400 audit(2270.763:14722): avc: denied { map_create } for pid=16593 comm="syz.0.3772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2270.855161][ T31] audit: type=1400 audit(2270.773:14723): avc: denied { bpf } for pid=16593 comm="syz.0.3772" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2276.974891][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 2276.975331][ T31] audit: type=1400 audit(2276.893:14782): avc: denied { create } for pid=16600 comm="syz.0.3775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2277.118923][ T31] audit: type=1400 audit(2277.033:14783): avc: denied { create } for pid=16600 comm="syz.0.3775" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2283.796533][ T31] audit: type=1400 audit(2283.713:14784): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2283.810366][ T31] audit: type=1400 audit(2283.723:14785): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2283.810839][ T31] audit: type=1400 audit(2283.723:14786): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2283.948057][ T31] audit: type=1400 audit(2283.863:14787): avc: denied { read } for pid=16604 comm="syz.1.3776" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2283.958711][ T31] audit: type=1400 audit(2283.873:14788): avc: denied { read open } for pid=16604 comm="syz.1.3776" path="/dev/binderfs/binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2283.996526][ T31] audit: type=1400 audit(2283.913:14789): avc: denied { ioctl } for pid=16604 comm="syz.1.3776" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2283.996642][T16605] binder: 16604:16605 ioctl c0306201 0 returned -14 [ 2284.008707][ T31] audit: type=1400 audit(2283.923:14790): avc: denied { ioctl } for pid=16604 comm="syz.1.3776" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2284.021835][T16605] binder: 16604:16605 ioctl c0306201 200001c0 returned -11 [ 2284.128298][ T31] audit: type=1400 audit(2284.043:14791): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2284.138071][ T31] audit: type=1400 audit(2284.053:14792): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2284.157237][ T31] audit: type=1400 audit(2284.053:14793): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2284.965332][T16611] netlink: 220 bytes leftover after parsing attributes in process `syz.1.3779'. [ 2288.982829][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 2288.983157][ T31] audit: type=1400 audit(2288.903:14854): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2288.985856][ T31] audit: type=1400 audit(2288.903:14855): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2288.989065][ T31] audit: type=1400 audit(2288.903:14856): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2289.435466][ T31] audit: type=1400 audit(2289.353:14857): avc: denied { read write } for pid=16620 comm="syz.1.3783" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2289.439968][ T31] audit: type=1400 audit(2289.353:14858): avc: denied { read write open } for pid=16620 comm="syz.1.3783" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2289.488472][ T31] audit: type=1400 audit(2289.403:14859): avc: denied { mounton } for pid=16620 comm="syz.1.3783" path="/227/file0" dev="tmpfs" ino=1211 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2289.553707][ T31] audit: type=1400 audit(2289.473:14860): avc: denied { mount } for pid=16620 comm="syz.1.3783" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2291.253487][ T31] audit: type=1400 audit(2291.153:14861): avc: denied { rename } for pid=16620 comm="syz.1.3783" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 2291.449940][ T31] audit: type=1400 audit(2291.363:14862): avc: denied { unmount } for pid=14002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2291.528862][ T31] audit: type=1400 audit(2291.443:14863): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2294.028807][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 2294.030625][ T31] audit: type=1400 audit(2293.943:14872): avc: denied { prog_load } for pid=16632 comm="syz.0.3786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2294.038273][ T31] audit: type=1400 audit(2293.953:14873): avc: denied { bpf } for pid=16632 comm="syz.0.3786" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2294.061567][ T31] audit: type=1400 audit(2293.973:14874): avc: denied { perfmon } for pid=16632 comm="syz.0.3786" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2294.069237][ T31] audit: type=1400 audit(2293.983:14875): avc: denied { perfmon } for pid=16632 comm="syz.0.3786" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2294.089189][ T31] audit: type=1400 audit(2293.993:14876): avc: denied { perfmon } for pid=16632 comm="syz.0.3786" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2294.092418][ T31] audit: type=1400 audit(2294.003:14877): avc: denied { perfmon } for pid=16632 comm="syz.0.3786" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2294.092537][ T31] audit: type=1400 audit(2294.003:14878): avc: denied { bpf } for pid=16632 comm="syz.0.3786" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2294.123040][ T31] audit: type=1400 audit(2294.023:14879): avc: denied { bpf } for pid=16632 comm="syz.0.3786" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2294.124071][ T31] audit: type=1400 audit(2294.023:14880): avc: denied { prog_run } for pid=16632 comm="syz.0.3786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2294.364652][ T31] audit: type=1400 audit(2294.273:14881): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2297.094601][T16646] fuse: Bad value for 'user_id' [ 2297.094963][T16646] fuse: Bad value for 'user_id' [ 2298.770305][T12925] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 2299.030213][T12925] usb 1-1: Using ep0 maxpacket: 16 [ 2299.093568][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 2299.093900][ T31] audit: type=1400 audit(2298.973:14933): avc: denied { ioctl } for pid=16654 comm="syz.0.3796" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2299.105499][ T31] audit: type=1400 audit(2299.023:14934): avc: denied { ioctl } for pid=16654 comm="syz.0.3796" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2299.118842][ T31] audit: type=1400 audit(2299.023:14935): avc: denied { ioctl } for pid=16654 comm="syz.0.3796" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2299.148519][T12925] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 2299.154211][T12925] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 2299.154514][T12925] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 2299.154724][T12925] usb 1-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 2299.154870][T12925] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2299.158285][ T31] audit: type=1400 audit(2299.033:14936): avc: denied { ioctl } for pid=16654 comm="syz.0.3796" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2299.161190][ T31] audit: type=1400 audit(2299.063:14937): avc: denied { ioctl } for pid=16654 comm="syz.0.3796" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2299.186854][T12925] usb 1-1: config 0 descriptor?? [ 2299.201078][ T31] audit: type=1400 audit(2299.113:14938): avc: denied { ioctl } for pid=16654 comm="syz.0.3796" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2299.214556][ T31] audit: type=1400 audit(2299.133:14939): avc: denied { ioctl } for pid=16654 comm="syz.0.3796" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2299.225300][ T31] audit: type=1400 audit(2299.143:14940): avc: denied { ioctl } for pid=16654 comm="syz.0.3796" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2299.243141][ T31] audit: type=1400 audit(2299.163:14941): avc: denied { ioctl } for pid=16654 comm="syz.0.3796" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2299.253163][ T31] audit: type=1400 audit(2299.173:14942): avc: denied { ioctl } for pid=16654 comm="syz.0.3796" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2299.811522][T12925] microsoft 0003:045E:07DA.0004: unknown main item tag 0x5 [ 2299.812953][T12925] microsoft 0003:045E:07DA.0004: reserved main item tag 0xd [ 2299.824176][T12925] microsoft 0003:045E:07DA.0004: unknown main item tag 0x0 [ 2299.825618][T12925] microsoft 0003:045E:07DA.0004: unknown main item tag 0x6 [ 2299.826854][T12925] microsoft 0003:045E:07DA.0004: unbalanced delimiter at end of report description [ 2299.828215][T12925] microsoft 0003:045E:07DA.0004: parse failed [ 2299.830235][T12925] microsoft 0003:045E:07DA.0004: probe with driver microsoft failed with error -22 [ 2300.060672][T12925] usb 1-1: USB disconnect, device number 21 [ 2300.327971][T16673] fuse: Unknown parameter 'group_id00000000000000000000' [ 2310.115847][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 2310.116258][ T31] audit: type=1400 audit(2310.033:14968): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2310.140798][ T31] audit: type=1400 audit(2310.063:14969): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2310.146336][ T31] audit: type=1400 audit(2310.063:14970): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2310.432461][ T31] audit: type=1400 audit(2310.353:14971): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2310.435773][ T31] audit: type=1400 audit(2310.353:14972): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2310.454346][ T31] audit: type=1400 audit(2310.373:14973): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2310.587136][ T31] audit: type=1400 audit(2310.503:14974): avc: denied { create } for pid=16680 comm="syz.1.3800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2310.609350][ T31] audit: type=1400 audit(2310.523:14975): avc: denied { write } for pid=16680 comm="syz.1.3800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2310.612236][T16681] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3800'. [ 2310.718407][ T31] audit: type=1400 audit(2310.633:14976): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2310.728960][ T31] audit: type=1400 audit(2310.643:14977): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2311.476691][T16685] fuse: Bad value for 'user_id' [ 2311.477012][T16685] fuse: Bad value for 'user_id' [ 2315.421347][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 2315.421798][ T31] audit: type=1400 audit(2315.333:15010): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2315.422098][ T31] audit: type=1400 audit(2315.333:15011): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2315.470378][ T31] audit: type=1400 audit(2315.383:15012): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2315.896982][ T31] audit: type=1400 audit(2315.793:15013): avc: denied { read write } for pid=16693 comm="syz.1.3805" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2315.936954][ T31] audit: type=1400 audit(2315.843:15014): avc: denied { read write open } for pid=16693 comm="syz.1.3805" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2315.996467][ T31] audit: type=1400 audit(2315.913:15015): avc: denied { mounton } for pid=16693 comm="syz.1.3805" path="/238/file0" dev="tmpfs" ino=1269 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2316.025104][T16694] fuse: Unknown parameter 'user_id00000000000000000000' [ 2316.468845][ T31] audit: type=1400 audit(2316.383:15016): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2316.488821][ T31] audit: type=1400 audit(2316.403:15017): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2316.530846][ T31] audit: type=1400 audit(2316.443:15018): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2316.736292][ T31] audit: type=1400 audit(2316.653:15019): avc: denied { prog_load } for pid=16695 comm="syz.1.3806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2317.646128][T16698] fuse: Bad value for 'user_id' [ 2317.646649][T16698] fuse: Bad value for 'user_id' [ 2320.595496][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 2320.595965][ T31] audit: type=1400 audit(2320.503:15050): avc: denied { read } for pid=16725 comm="syz.1.3810" name="pcmC1D0c" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2320.596223][ T31] audit: type=1400 audit(2320.513:15051): avc: denied { read open } for pid=16725 comm="syz.1.3810" path="/dev/snd/pcmC1D0c" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2320.615429][ T31] audit: type=1400 audit(2320.533:15052): avc: denied { ioctl } for pid=16725 comm="syz.1.3810" path="/dev/snd/pcmC1D0c" dev="devtmpfs" ino=729 ioctlcmd=0x4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2320.820412][ T31] audit: type=1400 audit(2320.733:15053): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2320.881250][ T31] audit: type=1400 audit(2320.783:15054): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2320.881741][ T31] audit: type=1400 audit(2320.783:15055): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2321.323488][ T31] audit: type=1400 audit(2321.243:15056): avc: denied { prog_load } for pid=16727 comm="syz.1.3811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2321.361417][ T31] audit: type=1400 audit(2321.273:15057): avc: denied { bpf } for pid=16727 comm="syz.1.3811" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2321.385103][ T31] audit: type=1400 audit(2321.303:15058): avc: denied { perfmon } for pid=16727 comm="syz.1.3811" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2321.434244][ T31] audit: type=1400 audit(2321.343:15059): avc: denied { perfmon } for pid=16727 comm="syz.1.3811" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2322.078381][T16730] netlink: 220 bytes leftover after parsing attributes in process `syz.1.3812'. [ 2322.588791][T16732] fuse: Invalid rootmode [ 2323.892803][T16739] fuse: Bad value for 'fd' [ 2325.414614][T16746] fuse: Invalid rootmode [ 2325.723014][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 2325.723278][ T31] audit: type=1400 audit(2325.643:15121): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2325.731972][ T31] audit: type=1400 audit(2325.643:15122): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2325.735635][ T31] audit: type=1400 audit(2325.653:15123): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2325.950719][ T31] audit: type=1400 audit(2325.863:15124): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2325.951072][ T31] audit: type=1400 audit(2325.863:15125): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2325.951320][ T31] audit: type=1400 audit(2325.863:15126): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2326.214694][ T31] audit: type=1400 audit(2326.133:15127): avc: denied { execmem } for pid=16747 comm="syz.0.3821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2326.412330][ T31] audit: type=1400 audit(2326.323:15128): avc: denied { read write } for pid=16748 comm="syz.1.3822" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2326.415907][ T31] audit: type=1400 audit(2326.323:15129): avc: denied { read write open } for pid=16748 comm="syz.1.3822" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2326.433076][ T31] audit: type=1400 audit(2326.343:15130): avc: denied { mounton } for pid=16748 comm="syz.1.3822" path="/250/file0" dev="tmpfs" ino=1334 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2326.435346][T16750] fuse: Bad value for 'fd' [ 2329.323944][T16758] fuse: Invalid rootmode [ 2329.868729][T16760] fuse: Bad value for 'fd' [ 2330.560689][T15718] usb 2-1: new full-speed USB device number 35 using dummy_hcd [ 2330.732453][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 2330.738800][ T31] audit: type=1400 audit(2330.653:15189): avc: denied { ioctl } for pid=16763 comm="syz.1.3829" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2330.754853][ T31] audit: type=1400 audit(2330.673:15190): avc: denied { ioctl } for pid=16763 comm="syz.1.3829" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2330.826607][ T31] audit: type=1400 audit(2330.743:15191): avc: denied { ioctl } for pid=16763 comm="syz.1.3829" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2330.850194][T15718] usb 2-1: config 8 has an invalid interface number: 223 but max is 0 [ 2330.855057][T15718] usb 2-1: config 8 has no interface number 0 [ 2330.855602][T15718] usb 2-1: config 8 interface 223 altsetting 0 endpoint 0x7 has invalid maxpacket 512, setting to 64 [ 2330.877149][ T31] audit: type=1400 audit(2330.793:15192): avc: denied { ioctl } for pid=16763 comm="syz.1.3829" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2330.896466][ T31] audit: type=1400 audit(2330.813:15193): avc: denied { ioctl } for pid=16763 comm="syz.1.3829" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2330.921454][ T31] audit: type=1400 audit(2330.833:15194): avc: denied { ioctl } for pid=16763 comm="syz.1.3829" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2330.938351][ T31] audit: type=1400 audit(2330.843:15195): avc: denied { ioctl } for pid=16763 comm="syz.1.3829" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2330.950125][ T31] audit: type=1400 audit(2330.863:15196): avc: denied { ioctl } for pid=16763 comm="syz.1.3829" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2330.950621][ T31] audit: type=1400 audit(2330.863:15197): avc: denied { ioctl } for pid=16763 comm="syz.1.3829" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2330.961348][ T31] audit: type=1400 audit(2330.883:15198): avc: denied { ioctl } for pid=16763 comm="syz.1.3829" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2330.971037][T15718] usb 2-1: New USB device found, idVendor=a6da, idProduct=7458, bcdDevice=3e.4d [ 2330.971377][T15718] usb 2-1: New USB device strings: Mfr=5, Product=40, SerialNumber=22 [ 2330.971562][T15718] usb 2-1: Product: syz [ 2330.971748][T15718] usb 2-1: Manufacturer: syz [ 2330.971796][T15718] usb 2-1: SerialNumber: syz [ 2331.415839][T16764] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2331.419197][T16764] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2331.507631][T15718] usb 2-1: USB disconnect, device number 35 [ 2332.642449][T16785] fuse: Unknown parameter '00000000000000000000' [ 2335.823737][ T31] kauditd_printk_skb: 85 callbacks suppressed [ 2335.824058][ T31] audit: type=1400 audit(2335.743:15284): avc: denied { prog_load } for pid=16787 comm="syz.1.3833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2335.858962][ T31] audit: type=1400 audit(2335.773:15285): avc: denied { bpf } for pid=16787 comm="syz.1.3833" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2335.957937][ T31] audit: type=1400 audit(2335.873:15286): avc: denied { perfmon } for pid=16787 comm="syz.1.3833" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2336.050481][ T31] audit: type=1400 audit(2335.953:15287): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2336.053044][ T31] audit: type=1400 audit(2335.973:15288): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2336.056829][ T31] audit: type=1400 audit(2335.973:15289): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2336.563263][ T31] audit: type=1400 audit(2336.483:15290): avc: denied { read write } for pid=16797 comm="syz.0.3837" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2336.570178][ T31] audit: type=1400 audit(2336.483:15291): avc: denied { read write open } for pid=16797 comm="syz.0.3837" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2336.614582][T16798] fuse: Unknown parameter '00000000000000000000' [ 2336.625005][ T31] audit: type=1400 audit(2336.533:15292): avc: denied { mounton } for pid=16797 comm="syz.0.3837" path="/209/file0" dev="tmpfs" ino=1130 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2337.073920][ T31] audit: type=1400 audit(2336.993:15293): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2337.936622][T16803] fuse: Unknown parameter '0x0000000000000003' [ 2338.834999][T16807] netlink: 96 bytes leftover after parsing attributes in process `syz.0.3841'. [ 2340.938014][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 2340.938504][ T31] audit: type=1400 audit(2340.853:15338): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2340.958994][ T31] audit: type=1400 audit(2340.873:15339): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2340.960181][ T31] audit: type=1400 audit(2340.873:15340): avc: denied { read } for pid=16809 comm="syz.1.3843" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2340.960402][ T31] audit: type=1400 audit(2340.873:15341): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2341.176027][ T31] audit: type=1400 audit(2341.083:15342): avc: denied { sys_module } for pid=16809 comm="syz.1.3843" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2341.178063][ T31] audit: type=1400 audit(2341.093:15343): avc: denied { module_request } for pid=16809 comm="syz.1.3843" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2341.358283][ T31] audit: type=1400 audit(2341.273:15344): avc: denied { create } for pid=16819 comm="syz.0.3845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2341.490271][ T31] audit: type=1400 audit(2341.403:15345): avc: denied { bind } for pid=16819 comm="syz.0.3845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2341.515490][ T31] audit: type=1400 audit(2341.433:15346): avc: denied { module_request } for pid=16819 comm="syz.0.3845" kmod="crypto-crct10dif-generic" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2341.978759][ T31] audit: type=1400 audit(2341.893:15347): avc: denied { setopt } for pid=16819 comm="syz.0.3845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2342.775767][T15718] usb 2-1: new high-speed USB device number 36 using dummy_hcd [ 2343.020726][T15718] usb 2-1: Using ep0 maxpacket: 32 [ 2343.124974][T15718] usb 2-1: config 0 has an invalid interface number: 184 but max is 0 [ 2343.127294][T15718] usb 2-1: config 0 has no interface number 0 [ 2343.130361][T15718] usb 2-1: config 0 interface 184 has no altsetting 0 [ 2343.188956][T15718] usb 2-1: New USB device found, idVendor=0424, idProduct=7500, bcdDevice=69.ee [ 2343.191010][T15718] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2343.192046][T15718] usb 2-1: Product: syz [ 2343.192772][T15718] usb 2-1: Manufacturer: syz [ 2343.193536][T15718] usb 2-1: SerialNumber: syz [ 2343.224833][T15718] usb 2-1: config 0 descriptor?? [ 2343.282377][T15718] smsc75xx v1.0.0 [ 2343.506795][T15718] smsc75xx 2-1:0.184 (unnamed net_device) (uninitialized): usbnet_get_endpoints failed: -71 [ 2343.511169][T15718] smsc75xx 2-1:0.184: probe with driver smsc75xx failed with error -71 [ 2343.541391][T15718] usb 2-1: USB disconnect, device number 36 [ 2346.885984][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 2346.886241][ T31] audit: type=1400 audit(2346.803:15416): avc: denied { unmount } for pid=14002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2346.976547][ T31] audit: type=1400 audit(2346.893:15417): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2346.988284][ T31] audit: type=1400 audit(2346.903:15418): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2346.988613][ T31] audit: type=1400 audit(2346.903:15419): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2347.113133][ T31] audit: type=1400 audit(2347.033:15420): avc: denied { execmem } for pid=16855 comm="syz.1.3852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2353.934500][ T31] audit: type=1400 audit(2353.833:15421): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2353.954841][ T31] audit: type=1400 audit(2353.873:15422): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2353.964267][ T31] audit: type=1400 audit(2353.873:15423): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2354.129260][ T31] audit: type=1400 audit(2354.043:15424): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2354.142580][ T31] audit: type=1400 audit(2354.053:15425): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2354.143197][ T31] audit: type=1400 audit(2354.053:15426): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2354.346863][ T31] audit: type=1400 audit(2354.263:15427): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2354.352530][ T31] audit: type=1400 audit(2354.273:15428): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2354.360282][ T31] audit: type=1400 audit(2354.273:15429): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2354.473410][ T31] audit: type=1400 audit(2354.393:15430): avc: denied { create } for pid=16863 comm="syz.0.3855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2356.563381][T16878] fuse: Unknown parameter 'user_id00000000000000000000' [ 2359.189027][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 2359.190781][ T31] audit: type=1400 audit(2359.103:15479): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2359.198585][ T31] audit: type=1400 audit(2359.113:15480): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2359.228788][ T31] audit: type=1400 audit(2359.133:15481): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2359.325711][ T31] audit: type=1400 audit(2359.243:15482): avc: denied { read write } for pid=16893 comm="syz.0.3866" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2359.330417][ T31] audit: type=1400 audit(2359.243:15483): avc: denied { read write open } for pid=16893 comm="syz.0.3866" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2359.356940][ T31] audit: type=1400 audit(2359.273:15484): avc: denied { mounton } for pid=16893 comm="syz.0.3866" path="/230/file0" dev="tmpfs" ino=1242 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2359.384332][ T31] audit: type=1400 audit(2359.303:15485): avc: denied { mount } for pid=16893 comm="syz.0.3866" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2359.567076][ T31] audit: type=1400 audit(2359.483:15486): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2359.572919][ T31] audit: type=1400 audit(2359.493:15487): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2359.582653][ T31] audit: type=1400 audit(2359.493:15488): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2360.463776][T16907] fuse: Unknown parameter '0x0000000000000003' [ 2363.601474][T16921] fuse: Unknown parameter '0x0000000000000003' [ 2364.386169][ T31] kauditd_printk_skb: 78 callbacks suppressed [ 2364.414245][ T31] audit: type=1400 audit(2364.303:15567): avc: denied { create } for pid=16923 comm="syz.0.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2364.439046][ T31] audit: type=1400 audit(2364.353:15568): avc: denied { write } for pid=16923 comm="syz.0.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2364.494936][ T31] audit: type=1400 audit(2364.413:15569): avc: denied { create } for pid=16923 comm="syz.0.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2364.514372][ T31] audit: type=1400 audit(2364.433:15570): avc: denied { write } for pid=16923 comm="syz.0.3877" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2364.518423][ T31] audit: type=1400 audit(2364.433:15571): avc: denied { read write } for pid=16922 comm="syz.1.3878" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2364.581168][ T31] audit: type=1400 audit(2364.463:15572): avc: denied { read write open } for pid=16922 comm="syz.1.3878" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2364.581599][ T31] audit: type=1400 audit(2364.473:15573): avc: denied { ioctl } for pid=16922 comm="syz.1.3878" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2364.582027][ T31] audit: type=1400 audit(2364.473:15574): avc: denied { ioctl } for pid=16922 comm="syz.1.3878" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2364.597047][ T31] audit: type=1400 audit(2364.503:15575): avc: denied { ioctl } for pid=16922 comm="syz.1.3878" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2364.648698][ T31] audit: type=1400 audit(2364.563:15576): avc: denied { ioctl } for pid=16922 comm="syz.1.3878" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2364.824714][T15701] usb 2-1: new high-speed USB device number 37 using dummy_hcd [ 2365.250620][T15701] usb 2-1: config index 0 descriptor too short (expected 56612, got 36) [ 2365.251027][T15701] usb 2-1: config 58 has too many interfaces: 117, using maximum allowed: 32 [ 2365.251280][T15701] usb 2-1: config 58 has an invalid descriptor of length 0, skipping remainder of the config [ 2365.251440][T15701] usb 2-1: config 58 has 0 interfaces, different from the descriptor's value: 117 [ 2365.806579][T15701] usb 2-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 2365.806884][T15701] usb 2-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 2365.807120][T15701] usb 2-1: Manufacturer: syz [ 2366.983150][T15701] usb 2-1: USB disconnect, device number 37 [ 2370.132590][ T31] kauditd_printk_skb: 58 callbacks suppressed [ 2370.132952][ T31] audit: type=1400 audit(2370.053:15635): avc: denied { module_request } for pid=16942 comm="syz.1.3881" kmod="fs-udf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2370.359421][ T31] audit: type=1400 audit(2370.273:15636): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2370.376231][ T31] audit: type=1400 audit(2370.293:15637): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2370.392658][ T31] audit: type=1400 audit(2370.313:15638): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2370.648532][ T31] audit: type=1400 audit(2370.563:15639): avc: denied { create } for pid=16942 comm="syz.1.3881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2370.745720][ T31] audit: type=1400 audit(2370.603:15640): avc: denied { write } for pid=16942 comm="syz.1.3881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2370.746236][ T31] audit: type=1400 audit(2370.623:15641): avc: denied { module_request } for pid=16942 comm="syz.1.3881" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2370.776836][ T31] audit: type=1400 audit(2370.693:15642): avc: denied { read write } for pid=16947 comm="syz.0.3882" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2370.808837][ T31] audit: type=1400 audit(2370.723:15643): avc: denied { read write open } for pid=16947 comm="syz.0.3882" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2370.868901][ T31] audit: type=1400 audit(2370.763:15644): avc: denied { mounton } for pid=16947 comm="syz.0.3882" path="/236/file0" dev="tmpfs" ino=1274 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2375.587176][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 2375.587547][ T31] audit: type=1400 audit(2375.493:15704): avc: denied { create } for pid=16960 comm="syz.1.3885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2375.627519][ T31] audit: type=1400 audit(2375.503:15705): avc: denied { create } for pid=16960 comm="syz.1.3885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2375.675169][ T31] audit: type=1400 audit(2375.593:15706): avc: denied { write } for pid=16960 comm="syz.1.3885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2375.683196][ T31] audit: type=1400 audit(2375.603:15707): avc: denied { module_request } for pid=16960 comm="syz.1.3885" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2376.110357][ T31] audit: type=1400 audit(2376.013:15708): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2376.110764][ T31] audit: type=1400 audit(2376.013:15709): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2376.111095][ T31] audit: type=1400 audit(2376.013:15710): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2376.182150][ T31] audit: type=1400 audit(2376.103:15711): avc: denied { prog_load } for pid=16960 comm="syz.1.3885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2376.275828][ T31] audit: type=1400 audit(2376.193:15712): avc: denied { bpf } for pid=16960 comm="syz.1.3885" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2376.284589][ T31] audit: type=1400 audit(2376.193:15713): avc: denied { perfmon } for pid=16960 comm="syz.1.3885" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2377.383721][T16970] syzkaller0: entered promiscuous mode [ 2377.384013][T16970] syzkaller0: entered allmulticast mode [ 2380.686823][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 2380.687193][ T31] audit: type=1400 audit(2380.603:15759): avc: denied { create } for pid=16971 comm="syz.1.3887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2380.725217][ T31] audit: type=1400 audit(2380.643:15760): avc: denied { bind } for pid=16971 comm="syz.1.3887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2380.727365][ T31] audit: type=1400 audit(2380.643:15761): avc: denied { name_bind } for pid=16971 comm="syz.1.3887" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 2380.771102][ T31] audit: type=1400 audit(2380.683:15762): avc: denied { node_bind } for pid=16971 comm="syz.1.3887" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 2380.830956][ T31] audit: type=1400 audit(2380.743:15763): avc: denied { create } for pid=16971 comm="syz.1.3887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2380.877859][ T31] audit: type=1400 audit(2380.793:15764): avc: denied { bind } for pid=16971 comm="syz.1.3887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2380.878290][ T31] audit: type=1400 audit(2380.793:15765): avc: denied { name_bind } for pid=16971 comm="syz.1.3887" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 2380.878517][ T31] audit: type=1400 audit(2380.793:15766): avc: denied { node_bind } for pid=16971 comm="syz.1.3887" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 2381.063911][ T31] audit: type=1400 audit(2380.983:15767): avc: denied { read write } for pid=16983 comm="syz.0.3889" name="sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2381.105871][ T31] audit: type=1400 audit(2381.013:15768): avc: denied { read open } for pid=16983 comm="syz.0.3889" path="/dev/sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2385.971718][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 2385.972428][ T31] audit: type=1400 audit(2385.883:15800): avc: denied { module_request } for pid=16998 comm="syz.0.3891" kmod="fs-btrfs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2386.881203][ T31] audit: type=1400 audit(2386.423:15801): avc: denied { prog_load } for pid=16998 comm="syz.0.3891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2386.882735][ T31] audit: type=1400 audit(2386.433:15802): avc: denied { bpf } for pid=16998 comm="syz.0.3891" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2386.883924][ T31] audit: type=1400 audit(2386.443:15803): avc: denied { perfmon } for pid=16998 comm="syz.0.3891" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2386.898007][ T31] audit: type=1400 audit(2386.453:15804): avc: denied { perfmon } for pid=16998 comm="syz.0.3891" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2386.898258][ T31] audit: type=1400 audit(2386.463:15805): avc: denied { perfmon } for pid=16998 comm="syz.0.3891" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2386.898468][ T31] audit: type=1400 audit(2386.493:15806): avc: denied { perfmon } for pid=16998 comm="syz.0.3891" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2386.898668][ T31] audit: type=1400 audit(2386.533:15807): avc: denied { perfmon } for pid=16998 comm="syz.0.3891" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2386.898869][ T31] audit: type=1400 audit(2386.563:15808): avc: denied { bpf } for pid=16998 comm="syz.0.3891" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2386.899076][ T31] audit: type=1400 audit(2386.603:15809): avc: denied { bpf } for pid=16998 comm="syz.0.3891" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2393.165980][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 2393.171672][ T31] audit: type=1400 audit(2393.083:15815): avc: denied { read write } for pid=17003 comm="syz.1.3893" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2393.262481][ T31] audit: type=1400 audit(2393.183:15816): avc: denied { read open } for pid=17003 comm="syz.1.3893" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2394.467487][ T31] audit: type=1400 audit(2394.383:15817): avc: denied { execute } for pid=17003 comm="syz.1.3893" path="/283/cpu.stat" dev="tmpfs" ino=1507 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2394.576531][ T31] audit: type=1400 audit(2394.493:15818): avc: denied { ioctl } for pid=17003 comm="syz.1.3893" path="/dev/dsp" dev="devtmpfs" ino=724 ioctlcmd=0x5009 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2395.274835][ T31] audit: type=1400 audit(2395.193:15819): avc: denied { ioctl } for pid=17003 comm="syz.1.3893" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=39933 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2397.140583][ T31] audit: type=1400 audit(2397.053:15820): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2397.141070][ T31] audit: type=1400 audit(2397.053:15821): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2397.160896][ T31] audit: type=1400 audit(2397.073:15822): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2397.564338][ T31] audit: type=1400 audit(2397.483:15823): avc: denied { read } for pid=17016 comm="syz.0.3894" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 2397.567085][ T31] audit: type=1400 audit(2397.483:15824): avc: denied { read open } for pid=17016 comm="syz.0.3894" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 2398.279289][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2398.280168][ T31] audit: type=1400 audit(2398.193:15835): avc: denied { read } for pid=17024 comm="syz.0.3896" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2398.293554][ T31] audit: type=1400 audit(2398.213:15836): avc: denied { read open } for pid=17024 comm="syz.0.3896" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2398.308354][ T31] audit: type=1400 audit(2398.223:15837): avc: denied { ioctl } for pid=17024 comm="syz.0.3896" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2400.271411][ T31] audit: type=1400 audit(2400.153:15838): avc: denied { ioctl } for pid=17024 comm="syz.0.3896" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2400.401115][ T31] audit: type=1400 audit(2400.323:15839): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2400.412228][ T31] audit: type=1400 audit(2400.333:15840): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2400.438201][ T31] audit: type=1400 audit(2400.353:15841): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2400.545319][ T31] audit: type=1400 audit(2400.463:15842): avc: denied { read write } for pid=17027 comm="syz.0.3897" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2400.548413][ T31] audit: type=1400 audit(2400.463:15843): avc: denied { read write open } for pid=17027 comm="syz.0.3897" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2400.559155][ T31] audit: type=1400 audit(2400.473:15844): avc: denied { mounton } for pid=17027 comm="syz.0.3897" path="/245/file0" dev="tmpfs" ino=1320 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2403.313966][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 2403.320660][ T31] audit: type=1400 audit(2403.233:15850): avc: denied { create } for pid=17033 comm="syz.0.3898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2403.340387][ T31] audit: type=1400 audit(2403.253:15851): avc: denied { create } for pid=17033 comm="syz.0.3898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2403.348259][ T31] audit: type=1400 audit(2403.263:15852): avc: denied { write } for pid=17033 comm="syz.0.3898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2403.354152][ T31] audit: type=1400 audit(2403.273:15853): avc: denied { nlmsg_write } for pid=17033 comm="syz.0.3898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2403.361865][T17034] netlink: 80 bytes leftover after parsing attributes in process `syz.0.3898'. [ 2403.381271][ T31] audit: type=1400 audit(2403.303:15854): avc: denied { execmem } for pid=17033 comm="syz.0.3898" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2404.307725][ T31] audit: type=1400 audit(2404.223:15855): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2404.336664][ T31] audit: type=1400 audit(2404.243:15856): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2404.341443][ T31] audit: type=1400 audit(2404.263:15857): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2404.507986][ T31] audit: type=1400 audit(2404.423:15858): avc: denied { prog_load } for pid=17035 comm="syz.1.3899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2404.517374][ T31] audit: type=1400 audit(2404.433:15859): avc: denied { bpf } for pid=17035 comm="syz.1.3899" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2406.087142][T17040] netlink: 'syz.0.3898': attribute type 1 has an invalid length. [ 2406.088838][T17040] netlink: 'syz.0.3898': attribute type 2 has an invalid length. [ 2410.916806][ T31] kauditd_printk_skb: 37 callbacks suppressed [ 2410.917212][ T31] audit: type=1400 audit(2410.833:15897): avc: denied { create } for pid=17037 comm="syz.1.3900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2410.928103][T17043] netlink: 'syz.1.3900': attribute type 1 has an invalid length. [ 2410.928512][T17043] netlink: 'syz.1.3900': attribute type 2 has an invalid length. [ 2410.928925][ T31] audit: type=1400 audit(2410.843:15898): avc: denied { write } for pid=17037 comm="syz.1.3900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2410.936559][ T31] audit: type=1400 audit(2410.853:15899): avc: denied { create } for pid=17037 comm="syz.1.3900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2410.944783][ T31] audit: type=1400 audit(2410.863:15900): avc: denied { create } for pid=17037 comm="syz.1.3900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2410.996007][ T31] audit: type=1400 audit(2410.913:15901): avc: denied { write } for pid=17037 comm="syz.1.3900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2411.016244][ T31] audit: type=1400 audit(2410.933:15902): avc: denied { bind } for pid=17037 comm="syz.1.3900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2411.021378][ T31] audit: type=1400 audit(2410.933:15903): avc: denied { setopt } for pid=17037 comm="syz.1.3900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2411.363979][ T31] audit: type=1400 audit(2411.283:15904): avc: denied { accept } for pid=17037 comm="syz.1.3900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2411.368777][ T31] audit: type=1400 audit(2411.283:15905): avc: denied { read } for pid=17037 comm="syz.1.3900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2416.845773][ T31] audit: type=1400 audit(2416.763:15906): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2416.852586][ T31] audit: type=1400 audit(2416.773:15907): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2416.878429][ T31] audit: type=1400 audit(2416.793:15908): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2417.058021][ T31] audit: type=1400 audit(2416.973:15909): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2417.065969][ T31] audit: type=1400 audit(2416.983:15910): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2417.078151][ T31] audit: type=1400 audit(2416.993:15911): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2417.347675][ T31] audit: type=1400 audit(2417.263:15912): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2417.357567][ T31] audit: type=1400 audit(2417.273:15913): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2417.371566][ T31] audit: type=1400 audit(2417.293:15914): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2417.467485][ T31] audit: type=1400 audit(2417.383:15915): avc: denied { module_request } for pid=17048 comm="syz.0.3903" kmod="net-pf-28" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2418.400786][T17056] Illegal XDP return value 3752409296 on prog (id 101) dev N/A, expect packet loss! [ 2422.007103][ T31] kauditd_printk_skb: 93 callbacks suppressed [ 2422.007978][ T31] audit: type=1400 audit(2421.923:16009): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2422.032477][ T31] audit: type=1400 audit(2421.943:16010): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2422.080703][ T31] audit: type=1400 audit(2421.983:16011): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2422.415178][ T31] audit: type=1400 audit(2422.333:16012): avc: denied { bpf } for pid=17069 comm="syz.0.3913" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2422.605102][ T31] audit: type=1400 audit(2422.513:16013): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2422.608784][ T31] audit: type=1400 audit(2422.513:16014): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2422.632085][ T31] audit: type=1400 audit(2422.523:16015): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2422.912902][ T31] audit: type=1400 audit(2422.813:16016): avc: denied { prog_load } for pid=17071 comm="syz.0.3914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2422.913270][ T31] audit: type=1400 audit(2422.813:16017): avc: denied { bpf } for pid=17071 comm="syz.0.3914" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2423.230241][ T31] audit: type=1400 audit(2423.143:16018): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2423.952463][T17077] veth0_to_bridge: entered promiscuous mode [ 2423.955176][T17077] A link change request failed with some changes committed already. Interface veth0_to_bridge may have been left with an inconsistent configuration, please check. [ 2427.088977][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 2427.092763][ T31] audit: type=1400 audit(2427.003:16043): avc: denied { unmount } for pid=14002 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2427.314851][ T31] audit: type=1400 audit(2427.233:16044): avc: denied { unmount } for pid=14502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2427.435458][ T31] audit: type=1400 audit(2427.353:16045): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2427.437544][ T31] audit: type=1400 audit(2427.353:16046): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2427.460165][ T31] audit: type=1400 audit(2427.373:16047): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2427.527818][ T31] audit: type=1400 audit(2427.433:16048): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2427.541557][ T31] audit: type=1400 audit(2427.453:16049): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2427.541660][ T31] audit: type=1400 audit(2427.453:16050): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2427.863502][ T31] audit: type=1400 audit(2427.783:16051): avc: denied { create } for pid=17090 comm="syz.0.3921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2427.892079][ T31] audit: type=1400 audit(2427.813:16052): avc: denied { allowed } for pid=17090 comm="syz.0.3921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2428.496669][T17100] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3921'. [ 2432.265427][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 2432.265951][ T31] audit: type=1400 audit(2432.163:16116): avc: denied { create } for pid=17120 comm="syz.1.3932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2432.287180][ T31] audit: type=1400 audit(2432.203:16117): avc: denied { setopt } for pid=17120 comm="syz.1.3932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2432.338840][ T31] audit: type=1400 audit(2432.253:16118): avc: denied { bind } for pid=17120 comm="syz.1.3932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2432.384966][ T31] audit: type=1400 audit(2432.303:16119): avc: denied { write } for pid=17120 comm="syz.1.3932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2432.395843][ T31] audit: type=1400 audit(2432.313:16120): avc: denied { write } for pid=17120 comm="syz.1.3932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2432.618699][ T31] audit: type=1400 audit(2432.533:16121): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2432.622722][ T31] audit: type=1400 audit(2432.543:16122): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2432.635617][ T31] audit: type=1400 audit(2432.553:16123): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2432.718277][ T31] audit: type=1400 audit(2432.633:16124): avc: denied { module_request } for pid=17116 comm="syz.0.3931" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2432.906840][ T31] audit: type=1400 audit(2432.823:16125): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2435.775736][T17158] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3937'. [ 2437.313944][ T31] kauditd_printk_skb: 84 callbacks suppressed [ 2437.314309][ T31] audit: type=1400 audit(2437.203:16210): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2437.314575][ T31] audit: type=1400 audit(2437.223:16211): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2437.314794][ T31] audit: type=1400 audit(2437.223:16212): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2437.620952][ T31] audit: type=1400 audit(2437.543:16213): avc: denied { map_create } for pid=17164 comm="syz.1.3941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2437.626118][ T31] audit: type=1400 audit(2437.543:16214): avc: denied { perfmon } for pid=17164 comm="syz.1.3941" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2437.644664][ T31] audit: type=1400 audit(2437.563:16215): avc: denied { map_read map_write } for pid=17164 comm="syz.1.3941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2437.687302][ T31] audit: type=1400 audit(2437.603:16216): avc: denied { prog_load } for pid=17164 comm="syz.1.3941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2437.700699][ T31] audit: type=1400 audit(2437.603:16217): avc: denied { bpf } for pid=17164 comm="syz.1.3941" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2437.702636][ T31] audit: type=1400 audit(2437.613:16218): avc: denied { perfmon } for pid=17164 comm="syz.1.3941" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2437.705198][ T31] audit: type=1400 audit(2437.613:16219): avc: denied { perfmon } for pid=17164 comm="syz.1.3941" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2443.350721][ T31] kauditd_printk_skb: 49 callbacks suppressed [ 2443.351064][ T31] audit: type=1400 audit(2443.263:16269): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2443.380206][ T31] audit: type=1400 audit(2443.273:16270): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2443.380465][ T31] audit: type=1400 audit(2443.273:16271): avc: denied { ioctl } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2443.771196][ T31] audit: type=1400 audit(2443.673:16272): avc: denied { create } for pid=17182 comm="syz.1.3945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2443.822365][ T31] audit: type=1400 audit(2443.723:16273): avc: denied { ioctl } for pid=17182 comm="syz.1.3945" path="socket:[41167]" dev="sockfs" ino=41167 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2443.903637][ T31] audit: type=1400 audit(2443.823:16274): avc: denied { read write } for pid=14502 comm="syz-executor" name="loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2443.910408][ T31] audit: type=1400 audit(2443.823:16275): avc: denied { read write open } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2443.933233][ T31] audit: type=1400 audit(2443.853:16276): avc: denied { ioctl } for pid=14502 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=633 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2444.004126][ T31] audit: type=1400 audit(2443.923:16277): avc: denied { read write } for pid=14002 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2444.006673][ T31] audit: type=1400 audit(2443.923:16278): avc: denied { read write open } for pid=14002 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2444.507542][T17187] 8021q: adding VLAN 0 to HW filter on device bond1 [ 2448.445920][ T31] kauditd_printk_skb: 40 callbacks suppressed [ 2448.446625][ T31] audit: type=1400 audit(2448.363:16319): avc: denied { sys_module } for pid=17239 comm="syz.0.3955" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2448.453955][ T31] audit: type=1400 audit(2448.373:16320): avc: denied { module_request } for pid=17239 comm="syz.0.3955" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2449.188172][ T31] audit: type=1400 audit(2449.093:16321): avc: denied { allowed } for pid=17247 comm="syz.0.3957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2449.221857][ T31] audit: type=1400 audit(2449.133:16322): avc: denied { create } for pid=17247 comm="syz.0.3957" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2449.525123][ T31] audit: type=1400 audit(2449.443:16323): avc: denied { map_create } for pid=17249 comm="syz.0.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2449.564016][ T31] audit: type=1400 audit(2449.463:16324): avc: denied { map_read map_write } for pid=17249 comm="syz.0.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2449.582891][ T31] audit: type=1400 audit(2449.493:16325): avc: denied { prog_load } for pid=17249 comm="syz.0.3958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2449.597948][ T31] audit: type=1400 audit(2449.503:16326): avc: denied { bpf } for pid=17249 comm="syz.0.3958" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2449.602847][ T31] audit: type=1400 audit(2449.503:16327): avc: denied { perfmon } for pid=17249 comm="syz.0.3958" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2449.604765][ T31] audit: type=1400 audit(2449.513:16328): avc: denied { perfmon } for pid=17249 comm="syz.0.3958" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2449.643487][T17250] ------------[ cut here ]------------ [ ** replaying previous printk message ** [ 2449.644066][T17250] WARNING: CPU: 0 PID: 17250 at kernel/bpf/verifier.c:2722 reg_bounds_sanity_check+0x390/0x45c [ 2449.646467][T17250] verifier bug: REG INVARIANTS VIOLATION (false_reg1): range bounds violation u64=[0x10000008, 0x10000008] s64=[0x10000008, 0x10000008] u32=[0x10000008, 0x10000000] s32=[0x10000008, 0x10000008] var_off=(0x10000008, 0x0)(1) [ 2449.647090][T17250] Modules linked in: [ 2449.647950][T17250] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2449.648486][T17250] CPU: 0 UID: 0 PID: 17250 Comm: syz.0.3958 Not tainted syzkaller #0 PREEMPT [ 2449.649240][T17250] Hardware name: ARM-Versatile Express [ 2449.654286][T17250] Call trace: [ 2449.655542][T17250] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2449.658267][T17250] r7:00000000 r6:8281f77c r5:00000000 r4:82260ae8 [ 2449.660824][T17250] [<80201b08>] (show_stack) from [<8021fbe4>] (dump_stack_lvl+0x54/0x7c) [ 2449.666757][T17250] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 2449.669481][T17250] r5:00000000 r4:82a77d18 [ 2449.670836][T17250] [<8021fc0c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 2449.673155][T17250] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 2449.676880][T17250] r7:803d43cc [ 2449.678136][T17250] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 2449.683152][T17250] r3:8280c684 r2:00000001 r1:82247504 r0:8224ef80 [ 2449.685465][T17250] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 2449.688148][T17250] [<80254a44>] (__warn) from [<80254db4>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 2449.693856][T17250] r8:00000009 r7:822673e8 r6:dfa19984 r5:83946c00 r4:00000000 [ 2449.697358][T17250] [<80254bd0>] (warn_slowpath_fmt) from [<803d43cc>] (reg_bounds_sanity_check+0x390/0x45c) [ 2449.701432][T17250] r10:85aa8000 r9:10000008 r8:00000000 r7:10000008 r6:10000008 r5:82267d44 [ 2449.706051][T17250] r4:854b9c38 [ 2449.707265][T17250] [<803d403c>] (reg_bounds_sanity_check) from [<803e28d0>] (reg_set_min_max+0x1e8/0x26c) [ 2449.712153][T17250] r10:00000000 r9:85aadc18 r8:00000050 r7:85aa8000 r6:85aadba0 r5:854bec38 [ 2449.716920][T17250] r4:854b9c38 [ 2449.717988][T17250] [<803e26e8>] (reg_set_min_max) from [<803ec9b8>] (check_cond_jmp_op+0x560/0x1718) [ 2449.722628][T17250] r10:85aadba0 r9:854be800 r8:00000050 r7:84dd1a00 r6:84dd1900 r5:85aa8000 [ 2449.725006][T17250] r4:df847070 r3:854b9c38 [ 2449.727147][T17250] [<803ec458>] (check_cond_jmp_op) from [<803f6e30>] (do_check_common+0x2008/0x311c) [ 2449.731632][T17250] r10:0000000e r9:85aad000 r8:df847040 r7:00000008 r6:df847000 r5:85aa8360 [ 2449.735958][T17250] r4:85aa8000 [ 2449.736838][T17250] [<803f4e28>] (do_check_common) from [<803fb700>] (bpf_check+0x28c8/0x3038) [ 2449.738829][T17250] r10:00000000 r9:85aa87b8 r8:85aa8000 r7:00000001 r6:85aad000 r5:00000010 [ 2449.744404][T17250] r4:00000a7b [ 2449.745400][T17250] [<803f8e38>] (bpf_check) from [<803cdbac>] (bpf_prog_load+0x68c/0xc20) [ 2449.748054][T17250] r10:83946c00 r9:869a3330 r8:00000094 r7:dfa19d90 r6:00000000 r5:00000000 [ 2449.751069][T17250] r4:dfa19ec0 [ 2449.752134][T17250] [<803cd520>] (bpf_prog_load) from [<803cf1e8>] (__sys_bpf+0x42c/0x20f0) [ 2449.756668][T17250] r10:b5403587 r9:20000180 r8:00000000 r7:00000000 r6:00000005 r5:dfa19e90 [ 2449.760733][T17250] r4:00000094 [ 2449.761892][T17250] [<803cedbc>] (__sys_bpf) from [<803d144c>] (sys_bpf+0x2c/0x48) [ 2449.766167][T17250] r10:00000182 r9:83946c00 r8:8020029c r7:00000182 r6:00306308 r5:00000000 [ 2449.768731][T17250] r4:00000000 [ 2449.771362][T17250] [<803d1420>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2449.773823][T17250] Exception stack(0xdfa19fa8 to 0xdfa19ff0) [ 2449.777675][T17250] 9fa0: 00000000 00000000 00000005 20000180 00000094 00000000 [ 2449.780946][T17250] 9fc0: 00000000 00000000 00306308 00000182 002f0000 00000000 00006364 76f490bc [ 2449.784644][T17250] 9fe0: 76f48ec0 76f48eb0 0001948c 001322a0 [ 2449.799081][T17250] Rebooting in 86400 seconds.. VM DIAGNOSIS: 15:29:50 Registers: info registers vcpu 0 CPU#0 R00=84a56040 R01=00000039 R02=eaf9d000 R03=00000000 R04=82abb0fd R05=84a56040 R06=80a79bdc R07=82abb12f R08=82826ef8 R09=00000000 R10=00001ac2 R11=dfa1965c R12=00000002 R13=dfa19650 R14=829590c4 R15=80a79c34 PSR=80070093 N--- A S svc32 s00=696d7265 s01=76697373 d00=76697373696d7265 s02=74786574 s03=6f6f723d d01=6f6f723d74786574 s04=79733a74 s05=6d646173 d02=6d64617379733a74 s06=733a725f s07=64617379 d03=64617379733a725f s08=20745f6d s09=6e6f6374 d04=6e6f637420745f6d s10=74786574 s11=6f6f723d d05=6f6f723d74786574 s12=79733a74 s13=6d646173 d06=6d64617379733a74 s14=733a725f s15=64617379 d07=64617379733a725f s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=0000001c R01=ddde6800 R02=5b721000 R03=812ecb14 R04=830a0500 R05=830a1d00 R06=81d0ec64 R07=0000001c R08=df805f68 R09=84b4d400 R10=82959194 R11=df805f64 R12=df805f68 R13=df805f58 R14=802ee140 R15=812ecb20 PSR=a0000193 N-C- A S svc32 s00=7974696c s01=65702032 d00=657020327974696c s02=73202038 s03=746e6f63 d01=746e6f6373202038 s04=3d747865 s05=746f6f72 d02=746f6f723d747865 s06=7379733a s07=5f6d6461 d03=5f6d64617379733a s08=79733a72 s09=6d646173 d04=6d64617379733a72 s10=7420745f s11=746e6f63 d05=746e6f637420745f s12=3d747865 s13=746f6f72 d06=746f6f723d747865 s14=7379733a s15=5f6d6461 d07=5f6d64617379733a s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000