last executing test programs: 6m29.612428813s ago: executing program 0 (id=3182): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a3200000000050001000700000014000780080013400000000008001240"], 0x64}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {0x2, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) 6m28.832705734s ago: executing program 0 (id=3183): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r1, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x9, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x36}}, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x7, @ipv4={'\x00', '\xff\xff', @empty}, 0xd}, 0x1c) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NL80211_CMD_SET_INTERFACE(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000e40)=ANY=[], 0x20}, 0x1, 0x0, 0x0, 0x4880}, 0x1) recvmmsg(r2, &(0x7f00000074c0)=[{{0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000740)=""/131, 0x83}], 0x1}, 0x8}, {{0x0, 0x0, 0x0}, 0x8001}], 0x2, 0x160, 0x0) 6m28.163385652s ago: executing program 0 (id=3184): r0 = socket(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x2, @loopback, 0x6}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast1}}}], 0x28}}], 0x1, 0x4046040) 6m27.983208329s ago: executing program 0 (id=3185): sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=@newtfilter={0x30, 0x2c, 0xd2b, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x1, 0x6}, {}, {0xe, 0x1}}, [@filter_kind_options=@f_fw={{0x7}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x893}, 0x20040084) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) 6m27.631924773s ago: executing program 0 (id=3186): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000004a80)={0x73622a85, 0x100, 0x1}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000004c0)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000fc0)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000280)={@flat=@weak_binder={0x77622a85, 0x100a, 0x8000000000}, @ptr={0x70742a85, 0x0, &(0x7f0000000500)=""/171, 0x0, 0x2, 0x1a}}, &(0x7f0000000200)={0x0, 0x1, 0x30}}}], 0x0, 0x0, 0x0}) 6m27.364088424s ago: executing program 0 (id=3187): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() ptrace$ARCH_MAP_VDSO_64(0x1e, r0, 0x5, 0x2003) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) setsockopt$MRT6_DONE(0xffffffffffffffff, 0x29, 0xc9, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[], 0x50) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="c8b52a6f", 0x4) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x45e, 0x101781) mmap(&(0x7f0000249000/0x3000)=nil, 0x3000, 0x3000004, 0x10, r2, 0x88a6000) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0}, 0x68) brk(0x20ffc004) ioctl$USBDEVFS_FREE_STREAMS(r3, 0x802c550a, &(0x7f0000000040)=ANY=[]) 5m41.853540195s ago: executing program 32 (id=3187): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() ptrace$ARCH_MAP_VDSO_64(0x1e, r0, 0x5, 0x2003) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) setsockopt$MRT6_DONE(0xffffffffffffffff, 0x29, 0xc9, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[], 0x50) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="c8b52a6f", 0x4) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x45e, 0x101781) mmap(&(0x7f0000249000/0x3000)=nil, 0x3000, 0x3000004, 0x10, r2, 0x88a6000) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, 0x0}, 0x68) brk(0x20ffc004) ioctl$USBDEVFS_FREE_STREAMS(r3, 0x802c550a, &(0x7f0000000040)=ANY=[]) 4m48.472342337s ago: executing program 1 (id=3238): sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000007880)=[{{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000040)="af0ac9", 0x3}], 0x1}}], 0x1, 0x4000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x8, 0xf, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x94) r0 = syz_open_dev$loop(&(0x7f0000000100), 0x2, 0x2001) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000040), 0xe09) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r1, 0x0, {0x2a00, 0x80010000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xb, 0x1c, "fee8a2ab78fc979fd1e00d96072000001ea89de2b7fb0000e60080b8785d96000100", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "f4bd000000801900", [0x0, 0xffffffff9673e35d]}}) 4m48.312598244s ago: executing program 1 (id=3239): mkdirat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x1c0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x0, &(0x7f0000002100)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff, 0x100) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000004c0)='batadv0\x00', 0x10) socket$nl_route(0x10, 0x3, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r2 = getpid() r3 = syz_pidfd_open(r2, 0x0) setns(r3, 0x24020000) umount2(&(0x7f0000000040)='.\x00', 0x2) close_range(r1, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 4m46.740578598s ago: executing program 1 (id=3242): prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)) 4m45.72368603s ago: executing program 1 (id=3243): r0 = openat$fb0(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000100)={0x400, 0x300, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, {}, {}, {}, {0x1, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}) 4m43.963661592s ago: executing program 1 (id=3244): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) pselect6(0x0, 0x0, 0x0, &(0x7f0000000400)={0x1f, 0x0, 0x800000000000, 0x0, 0x1000000000, 0x0, 0xfffffffffffffffe}, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) 4m41.957495664s ago: executing program 1 (id=3245): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x3d04}, 0x4000054) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80, 0x87}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, {0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xb8}}, 0x0) 3m56.911502765s ago: executing program 33 (id=3245): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x3d04}, 0x4000054) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in=@multicast1=0xe0000002, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80, 0x87}, {0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, {0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xb8}}, 0x0) 1m19.807913627s ago: executing program 3 (id=3400): prlimit64(0x0, 0xe, &(0x7f0000000040)={0xa, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = socket$inet_icmp(0x2, 0x2, 0x1) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) 1m17.191876924s ago: executing program 3 (id=3408): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x24, 0xf, 0x6, 0x3, 0x0, 0x0, {0x2, 0x0, 0x9}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x8040}, 0x10) 1m16.878311987s ago: executing program 3 (id=3409): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800"], 0x48) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x8, 0x3, 0x268, 0x320, 0xa, 0x148, 0x368, 0x60, 0x400, 0x2a8, 0x2a8, 0x400, 0x2a8, 0x7fffffe, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00'}, 0x0, 0xc8, 0x138, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x7}}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f2f7b9f28413d9d8ad470ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc2d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x2c8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = dup(r4) write$UHID_INPUT(r5, &(0x7f0000001040)={0xfc, {"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", 0x1000}}, 0x1006) 1m10.19185402s ago: executing program 3 (id=3410): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x80) fcntl$notify(r0, 0x402, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r1, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) 1m10.012243598s ago: executing program 3 (id=3411): r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 1m9.864306053s ago: executing program 3 (id=3412): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r5, 0x0, 0x33, &(0x7f0000000000)=0x80020000, 0x4) listen(r5, 0x2) close_range(r4, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000300)={'vxcan1\x00'}) 24.784873957s ago: executing program 34 (id=3412): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r5, 0x0, 0x33, &(0x7f0000000000)=0x80020000, 0x4) listen(r5, 0x2) close_range(r4, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000300)={'vxcan1\x00'}) 2.765537457s ago: executing program 2 (id=3480): r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000200)=[{}], 0x1, 0x7f, &(0x7f0000000240), 0x8) close_range(r0, 0xffffffffffffffff, 0x0) 2.360821493s ago: executing program 2 (id=3481): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f00000003c0)=@nl, 0x80, &(0x7f0000001740)=[{&(0x7f0000000440)="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", 0x801}], 0x1, &(0x7f00000017c0)=[{0x10, 0x110, 0xcf5}], 0x10}}], 0x1, 0x20000040) 1.914090442s ago: executing program 2 (id=3482): syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/user\x00') r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x688280, 0x0) fchdir(r0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/211, 0xd3) 1.357583864s ago: executing program 2 (id=3483): open(&(0x7f0000000180)='./bus\x00', 0x8517e, 0x8b) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x90, 0x0, 0xffffffffffffffff, {0xf800000000000002, 0x2, 0xfffffffffffffffe, 0x3, 0x2000000, 0xfffffffc, {0x3d, 0x3, 0x7fffffff, 0x9, 0xfffffffffffffffc, 0xf8, 0x0, 0x0, 0x120, 0x2000, 0x0, 0x0, 0x0, 0x400, 0x1}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0xc8a1, 0xc000, 0x8, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000004"], 0x50) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 729.94249ms ago: executing program 2 (id=3484): r0 = socket(0xa, 0x3, 0xff) setsockopt$inet6_int(r0, 0x29, 0x19, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) prlimit64(0x0, 0x8, &(0x7f0000000100)={0x8, 0x16}, 0x0) shmctl$SHM_LOCK(0x0, 0xb) 0s ago: executing program 2 (id=3485): r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x103902, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc4042, 0x1ff) sendfile(r1, r0, 0x0, 0xfffa83) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) fallocate(r2, 0x20, 0x2000, 0xfeffffff000) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2, 0xe4) fallocate(r3, 0x0, 0xbf5, 0x2000402) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0xc, r3, 0x8, 0x9, 0x90fe, 0xfffffffffe000003}) kernel console output (not intermixed with test programs): tclass=chr_file permissive=1 [ 2071.570664][ T31] audit: type=1400 audit(2071.510:25152): avc: denied { read open } for pid=18824 comm="syz.2.3202" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2071.591693][ T31] audit: type=1400 audit(2071.530:25153): avc: denied { ioctl } for pid=18824 comm="syz.2.3202" path="/dev/ptmx" dev="devtmpfs" ino=603 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2071.592062][ T31] audit: type=1400 audit(2071.530:25154): avc: denied { sys_module } for pid=18824 comm="syz.2.3202" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2071.598700][ T31] audit: type=1400 audit(2071.540:25155): avc: denied { module_request } for pid=18824 comm="syz.2.3202" kmod="tty-ldisc-15" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2076.347878][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 2076.348167][ T31] audit: type=1400 audit(2076.290:25204): avc: denied { accept } for pid=18841 comm="syz.1.3208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2076.559270][ T31] audit: type=1400 audit(2076.500:25205): avc: denied { module_request } for pid=18841 comm="syz.1.3208" kmod="crypto-ecb(cipher_null)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2078.627577][ T31] audit: type=1400 audit(2078.570:25206): avc: denied { read } for pid=18851 comm="syz.2.3210" name="adsp1" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2078.662141][ T31] audit: type=1400 audit(2078.600:25207): avc: denied { read open } for pid=18851 comm="syz.2.3210" path="/dev/adsp1" dev="devtmpfs" ino=734 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2078.717798][ T31] audit: type=1400 audit(2078.660:25208): avc: denied { ioctl } for pid=18851 comm="syz.2.3210" path="/newroot/dev/adsp1" dev="devtmpfs" ino=734 ioctlcmd=0x5002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2079.187337][ T31] audit: type=1400 audit(2079.110:25209): avc: denied { read append } for pid=18857 comm="syz.2.3212" name="nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2079.187785][ T31] audit: type=1400 audit(2079.130:25210): avc: denied { ioctl open } for pid=18857 comm="syz.2.3212" path="/dev/nullb0" dev="devtmpfs" ino=653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2079.231300][ T31] audit: type=1400 audit(2079.170:25211): avc: denied { ioctl } for pid=18857 comm="syz.2.3212" path="/dev/nullb0" dev="devtmpfs" ino=653 ioctlcmd=0x1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2079.873309][ T31] audit: type=1400 audit(2079.810:25212): avc: denied { write } for pid=18858 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2079.885413][ T31] audit: type=1400 audit(2079.830:25213): avc: denied { write open } for pid=18858 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2081.354424][ T31] kauditd_printk_skb: 158 callbacks suppressed [ 2081.354730][ T31] audit: type=1400 audit(2081.300:25372): avc: denied { search } for pid=18858 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2081.363895][ T31] audit: type=1400 audit(2081.310:25373): avc: denied { search } for pid=18858 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2081.364658][ T31] audit: type=1400 audit(2081.310:25374): avc: denied { search } for pid=18858 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2081.367314][ T31] audit: type=1400 audit(2081.310:25375): avc: denied { append } for pid=18858 comm="dhcpcd-run-hook" name="resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=71 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2081.377044][ T31] audit: type=1400 audit(2081.320:25376): avc: denied { append open } for pid=18858 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=71 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2081.425251][ T31] audit: type=1400 audit(2081.370:25377): avc: denied { search } for pid=18858 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2081.426097][ T31] audit: type=1400 audit(2081.370:25378): avc: denied { search } for pid=18858 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2081.426443][ T31] audit: type=1400 audit(2081.370:25379): avc: denied { search } for pid=18858 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2081.428941][ T31] audit: type=1400 audit(2081.370:25380): avc: denied { append } for pid=18858 comm="dhcpcd-run-hook" name="resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=71 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2081.456255][ T31] audit: type=1400 audit(2081.400:25381): avc: denied { append open } for pid=18858 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=71 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2086.385928][ T31] kauditd_printk_skb: 196 callbacks suppressed [ 2086.386337][ T31] audit: type=1400 audit(2086.330:25578): avc: denied { search } for pid=18901 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2086.386561][ T31] audit: type=1400 audit(2086.330:25579): avc: denied { search } for pid=18901 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2086.386821][ T31] audit: type=1400 audit(2086.330:25580): avc: denied { search } for pid=18901 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2086.405064][ T31] audit: type=1400 audit(2086.330:25581): avc: denied { append } for pid=18901 comm="dhcpcd-run-hook" name="resolv.conf.eth3.ipv4ll" dev="tmpfs" ino=72 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2086.405522][ T31] audit: type=1400 audit(2086.330:25582): avc: denied { append open } for pid=18901 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth3.ipv4ll" dev="tmpfs" ino=72 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2086.405735][ T31] audit: type=1400 audit(2086.350:25583): avc: denied { search } for pid=18901 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2086.410685][ T31] audit: type=1400 audit(2086.350:25584): avc: denied { getattr } for pid=18901 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2086.414561][ T31] audit: type=1400 audit(2086.350:25585): avc: denied { search } for pid=18901 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2086.423113][ T31] audit: type=1400 audit(2086.360:25586): avc: denied { getattr } for pid=18901 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2086.425373][ T31] audit: type=1400 audit(2086.370:25587): avc: denied { search } for pid=18901 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2090.527809][T18917] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3222'. [ 2091.393421][ T31] kauditd_printk_skb: 131 callbacks suppressed [ 2091.393701][ T31] audit: type=1400 audit(2091.330:25719): avc: denied { search } for pid=18918 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2091.394928][ T31] audit: type=1400 audit(2091.340:25720): avc: denied { search } for pid=18918 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2091.398056][ T31] audit: type=1400 audit(2091.340:25721): avc: denied { read open } for pid=18918 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2091.401814][ T31] audit: type=1400 audit(2091.340:25722): avc: denied { getattr } for pid=18918 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2091.420564][ T31] audit: type=1400 audit(2091.360:25723): avc: denied { search } for pid=18918 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2091.460690][ T31] audit: type=1400 audit(2091.370:25724): avc: denied { search } for pid=18918 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2091.521416][ T31] audit: type=1400 audit(2091.430:25725): avc: denied { search } for pid=18918 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2091.562955][ T31] audit: type=1400 audit(2091.460:25726): avc: denied { search } for pid=18918 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2091.592964][ T31] audit: type=1400 audit(2091.530:25727): avc: denied { search } for pid=18918 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2091.603219][ T31] audit: type=1400 audit(2091.540:25728): avc: denied { search } for pid=18918 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2096.422256][ T31] kauditd_printk_skb: 278 callbacks suppressed [ 2096.423553][ T31] audit: type=1400 audit(2096.360:26007): avc: denied { create } for pid=18939 comm="syz.1.3226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2096.896829][ T31] audit: type=1400 audit(2096.840:26008): avc: denied { create } for pid=18943 comm="syz.1.3228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2096.912153][ T31] audit: type=1400 audit(2096.850:26009): avc: denied { bind } for pid=18943 comm="syz.1.3228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2096.921152][ T31] audit: type=1400 audit(2096.860:26010): avc: denied { setopt } for pid=18943 comm="syz.1.3228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2096.936216][ T31] audit: type=1400 audit(2096.880:26011): avc: denied { setopt } for pid=18943 comm="syz.1.3228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2097.086325][ T31] audit: type=1400 audit(2097.030:26012): avc: denied { read } for pid=18945 comm="syz.1.3229" name="uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2097.089793][ T31] audit: type=1400 audit(2097.030:26013): avc: denied { read open } for pid=18945 comm="syz.1.3229" path="/dev/uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2097.107179][ T31] audit: type=1400 audit(2097.050:26014): avc: denied { execmem } for pid=18945 comm="syz.1.3229" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2097.280605][ T31] audit: type=1400 audit(2097.220:26015): avc: denied { create } for pid=18947 comm="syz.1.3230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2097.296766][ T31] audit: type=1400 audit(2097.240:26016): avc: denied { create } for pid=18947 comm="syz.1.3230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2097.564153][T18950] af_packet: tpacket_rcv: packet too big, clamped from 52 to 4294967272. macoff=96 [ 2097.750499][T18952] netlink: 20 bytes leftover after parsing attributes in process `syz.1.3232'. [ 2098.409778][T18960] netlink: 40 bytes leftover after parsing attributes in process `syz.1.3236'. [ 2106.644474][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 2106.645687][ T31] audit: type=1400 audit(2106.590:26088): avc: denied { create } for pid=18982 comm="syz.1.3245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2106.664764][ T31] audit: type=1400 audit(2106.610:26089): avc: denied { create } for pid=18982 comm="syz.1.3245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2106.886521][ T31] audit: type=1400 audit(2106.810:26090): avc: denied { execmem } for pid=18982 comm="syz.1.3245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2107.304566][ T31] audit: type=1400 audit(2107.170:26091): avc: denied { read write } for pid=18971 comm="syz.2.3241" name="dsp" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2107.304913][ T31] audit: type=1400 audit(2107.180:26092): avc: denied { read write open } for pid=18971 comm="syz.2.3241" path="/dev/dsp" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2107.305205][ T31] audit: type=1400 audit(2107.180:26093): avc: denied { read } for pid=18971 comm="syz.2.3241" name="controlC0" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2107.305406][ T31] audit: type=1400 audit(2107.190:26094): avc: denied { read open } for pid=18971 comm="syz.2.3241" path="/dev/snd/controlC0" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2107.305614][ T31] audit: type=1400 audit(2107.190:26095): avc: denied { ioctl } for pid=18971 comm="syz.2.3241" path="/dev/snd/controlC0" dev="devtmpfs" ino=726 ioctlcmd=0x5532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2107.305807][ T31] audit: type=1400 audit(2107.200:26096): avc: denied { append } for pid=18971 comm="syz.2.3241" name="pcmC0D0p" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2107.306000][ T31] audit: type=1400 audit(2107.200:26097): avc: denied { append open } for pid=18971 comm="syz.2.3241" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2113.553058][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 2113.553390][ T31] audit: type=1400 audit(2113.490:26104): avc: denied { allowed } for pid=18988 comm="syz.2.3246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2113.564460][ T31] audit: type=1400 audit(2113.510:26105): avc: denied { create } for pid=18988 comm="syz.2.3246" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2113.566601][ T31] audit: type=1400 audit(2113.510:26106): avc: denied { map } for pid=18988 comm="syz.2.3246" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=41240 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2113.568929][ T31] audit: type=1400 audit(2113.510:26107): avc: denied { read write } for pid=18988 comm="syz.2.3246" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=41240 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2113.571662][ T31] audit: type=1400 audit(2113.510:26108): avc: denied { map } for pid=18988 comm="syz.2.3246" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=41240 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2113.576751][ T31] audit: type=1400 audit(2113.520:26109): avc: denied { read write } for pid=18988 comm="syz.2.3246" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=41240 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2113.594824][ T31] audit: type=1400 audit(2113.540:26110): avc: denied { execute } for pid=18988 comm="syz.2.3246" path="/17/hugetlb.1GB.usage_in_bytes" dev="tmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2113.690425][ T31] audit: type=1400 audit(2113.630:26111): avc: denied { read } for pid=18990 comm="syz.2.3247" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2113.690634][ T31] audit: type=1400 audit(2113.630:26112): avc: denied { read open } for pid=18990 comm="syz.2.3247" path="/dev/snd/seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2113.713560][ T31] audit: type=1400 audit(2113.660:26113): avc: denied { ioctl } for pid=18990 comm="syz.2.3247" path="/dev/snd/seq" dev="devtmpfs" ino=719 ioctlcmd=0x5331 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2120.813536][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 2120.813822][ T31] audit: type=1400 audit(2120.730:26121): avc: denied { write } for pid=19000 comm="syz.2.3252" name="ptype" dev="proc" ino=4026532936 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2120.814196][ T31] audit: type=1400 audit(2120.740:26122): avc: denied { write } for pid=19000 comm="syz.2.3252" path="/proc/56/net/ptype" dev="proc" ino=4026532936 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2127.006885][ T31] audit: type=1400 audit(2126.950:26123): avc: denied { read write } for pid=19004 comm="syz.2.3253" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2127.009442][ T31] audit: type=1400 audit(2126.950:26124): avc: denied { read write open } for pid=19004 comm="syz.2.3253" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2127.018149][ T31] audit: type=1400 audit(2126.960:26125): avc: denied { mounton } for pid=19004 comm="syz.2.3253" path="/24/file0" dev="tmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2127.029306][ T31] audit: type=1400 audit(2126.970:26126): avc: denied { mount } for pid=19004 comm="syz.2.3253" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2128.083639][ T31] audit: type=1400 audit(2128.030:26127): avc: denied { unmount } for pid=18382 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2133.730184][ T31] audit: type=1400 audit(2133.670:26128): avc: denied { create } for pid=19014 comm="syz.2.3256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2133.739119][ T31] audit: type=1400 audit(2133.680:26129): avc: denied { create } for pid=19014 comm="syz.2.3256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2133.745866][ T31] audit: type=1400 audit(2133.690:26130): avc: denied { write } for pid=19014 comm="syz.2.3256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2133.749227][ T31] audit: type=1400 audit(2133.690:26131): avc: denied { read } for pid=19014 comm="syz.2.3256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2133.754600][ T31] audit: type=1400 audit(2133.700:26132): avc: denied { read } for pid=19014 comm="syz.2.3256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2133.767336][ T31] audit: type=1400 audit(2133.710:26133): avc: denied { write } for pid=19014 comm="syz.2.3256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2133.839625][ T31] audit: type=1400 audit(2133.780:26134): avc: denied { read write } for pid=19016 comm="syz.2.3257" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2133.843105][ T31] audit: type=1400 audit(2133.790:26135): avc: denied { read write open } for pid=19016 comm="syz.2.3257" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2133.856431][ T31] audit: type=1400 audit(2133.790:26136): avc: denied { ioctl } for pid=19016 comm="syz.2.3257" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2133.858054][ T31] audit: type=1400 audit(2133.800:26137): avc: denied { ioctl } for pid=19016 comm="syz.2.3257" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2133.863875][T19017] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2133.864947][T19017] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2142.587291][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2142.588497][ T31] audit: type=1400 audit(2142.530:26148): avc: denied { create } for pid=19024 comm="syz.2.3259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2142.598553][ T31] audit: type=1400 audit(2142.540:26149): avc: denied { setopt } for pid=19024 comm="syz.2.3259" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2142.605334][ T31] audit: type=1400 audit(2142.550:26150): avc: denied { setopt } for pid=19024 comm="syz.2.3259" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2143.144576][ T31] audit: type=1400 audit(2143.090:26151): avc: denied { write } for pid=19024 comm="syz.2.3259" name="ipv6_route" dev="proc" ino=4026532981 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2143.150914][ T31] audit: type=1400 audit(2143.090:26152): avc: denied { write } for pid=19024 comm="syz.2.3259" path="/proc/76/net/ipv6_route" dev="proc" ino=4026532981 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2145.244528][ T31] audit: type=1400 audit(2145.180:26153): avc: denied { execmem } for pid=19027 comm="syz.2.3260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2147.523440][ T31] audit: type=1400 audit(2147.460:26154): avc: denied { prog_load } for pid=19027 comm="syz.2.3260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2147.523810][ T31] audit: type=1400 audit(2147.460:26155): avc: denied { bpf } for pid=19027 comm="syz.2.3260" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2147.545458][ T31] audit: type=1400 audit(2147.490:26156): avc: denied { perfmon } for pid=19027 comm="syz.2.3260" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2147.547416][ T31] audit: type=1400 audit(2147.490:26157): avc: denied { perfmon } for pid=19027 comm="syz.2.3260" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2147.597325][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 2147.599789][ T31] audit: type=1400 audit(2147.540:26161): avc: denied { bpf } for pid=19027 comm="syz.2.3260" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2147.618470][ T31] audit: type=1400 audit(2147.560:26162): avc: denied { prog_run } for pid=19027 comm="syz.2.3260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2150.453953][ T31] audit: type=1400 audit(2150.370:26163): avc: denied { execute } for pid=19031 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2150.573143][ T31] audit: type=1400 audit(2150.500:26164): avc: denied { execute_no_trans } for pid=19031 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2150.663569][ T31] audit: type=1400 audit(2150.600:26165): avc: denied { execute } for pid=19031 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2150.852282][ T31] audit: type=1400 audit(2150.790:26166): avc: denied { execmem } for pid=19031 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2151.056131][ T31] audit: type=1400 audit(2151.000:26167): avc: denied { read } for pid=19032 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2151.132994][ T31] audit: type=1400 audit(2151.050:26168): avc: denied { read open } for pid=19032 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2151.196431][ T31] audit: type=1400 audit(2151.140:26169): avc: denied { mounton } for pid=19032 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2151.349506][ T31] audit: type=1400 audit(2151.290:26170): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-nr3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2152.846104][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 2152.846428][ T31] audit: type=1400 audit(2152.790:26174): avc: denied { sys_module } for pid=19032 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2152.876097][ T31] audit: type=1400 audit(2152.820:26175): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="nr3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2153.668734][ T31] audit: type=1400 audit(2153.610:26176): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-rose3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2154.089298][ T31] audit: type=1400 audit(2154.030:26177): avc: denied { sys_module } for pid=19032 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2154.089516][ T31] audit: type=1400 audit(2154.030:26178): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="rose3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2154.340002][ T31] audit: type=1400 audit(2154.280:26179): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-rose3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2154.525894][ T31] audit: type=1400 audit(2154.470:26180): avc: denied { sys_module } for pid=19032 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2154.528359][ T31] audit: type=1400 audit(2154.470:26181): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="rose3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2154.858711][ T31] audit: type=1400 audit(2154.800:26182): avc: denied { read write } for pid=19032 comm="syz-executor" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2154.861031][ T31] audit: type=1400 audit(2154.800:26183): avc: denied { read write open } for pid=19032 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2158.038934][T19032] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2158.054629][T19032] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2158.159693][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 2158.159973][ T31] audit: type=1400 audit(2158.100:26196): avc: denied { create } for pid=19185 comm="syz.2.3262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2158.186668][ T31] audit: type=1400 audit(2158.120:26197): avc: denied { module_request } for pid=19185 comm="syz.2.3262" kmod="net-pf-2-proto-0-type-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2158.235203][ T31] audit: type=1400 audit(2158.180:26198): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2158.380775][ T31] audit: type=1400 audit(2158.320:26199): avc: denied { module_request } for pid=19185 comm="syz.2.3262" kmod="net-pf-2-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2158.588404][ T31] audit: type=1400 audit(2158.530:26200): avc: denied { sys_module } for pid=19032 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2158.588802][ T31] audit: type=1400 audit(2158.530:26201): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2158.849035][ T31] audit: type=1400 audit(2158.790:26202): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2158.915953][ T31] audit: type=1400 audit(2158.860:26203): avc: denied { create } for pid=19218 comm="syz.2.3264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2158.950047][ T31] audit: type=1400 audit(2158.890:26204): avc: denied { mount } for pid=19218 comm="syz.2.3264" name="/" dev="configfs" ino=1084 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 2158.981966][ T31] audit: type=1400 audit(2158.920:26205): avc: denied { map_create } for pid=19218 comm="syz.2.3264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2160.980605][T19032] hsr_slave_0: entered promiscuous mode [ 2160.981973][T19032] hsr_slave_1: entered promiscuous mode [ 2160.994373][T19032] debugfs: 'hsr0' already exists in 'hsr' [ 2160.994617][T19032] Cannot create hsr debugfs directory [ 2161.872217][T19032] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2161.882928][T19032] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2161.894784][T19032] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2161.928042][T19032] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2163.198065][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 2163.198432][ T31] audit: type=1400 audit(2163.140:26259): avc: denied { sys_module } for pid=19032 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2163.207664][ T31] audit: type=1400 audit(2163.150:26260): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2163.684677][ T31] audit: type=1400 audit(2163.630:26261): avc: denied { create } for pid=19368 comm="syz.2.3268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2163.709014][ T31] audit: type=1400 audit(2163.650:26262): avc: denied { create } for pid=19368 comm="syz.2.3268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2163.717423][ T31] audit: type=1400 audit(2163.660:26263): avc: denied { write } for pid=19368 comm="syz.2.3268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2163.721914][ T31] audit: type=1400 audit(2163.660:26264): avc: denied { module_request } for pid=19368 comm="syz.2.3268" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2164.261770][ T31] audit: type=1400 audit(2164.200:26265): avc: denied { ioctl } for pid=19368 comm="syz.2.3268" path="socket:[39913]" dev="sockfs" ino=39913 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2164.278408][ T31] audit: type=1400 audit(2164.220:26266): avc: denied { module_request } for pid=19368 comm="syz.2.3268" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2164.469172][ T31] audit: type=1400 audit(2164.410:26267): avc: denied { read } for pid=19368 comm="syz.2.3268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2164.757730][ T31] audit: type=1400 audit(2164.700:26268): avc: denied { write } for pid=19368 comm="syz.2.3268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2165.082010][T19032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2168.459848][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 2168.460132][ T31] audit: type=1400 audit(2168.400:26283): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2168.966696][ T31] audit: type=1400 audit(2168.910:26284): avc: denied { sys_module } for pid=19032 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2168.978209][ T31] audit: type=1400 audit(2168.920:26285): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2169.525746][ T31] audit: type=1400 audit(2169.470:26286): avc: denied { create } for pid=19391 comm="syz.2.3273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2169.553476][ T31] audit: type=1400 audit(2169.500:26287): avc: denied { read } for pid=19391 comm="syz.2.3273" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2170.061811][ T31] audit: type=1400 audit(2170.000:26288): avc: denied { read } for pid=19391 comm="syz.2.3273" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2170.711123][ T31] audit: type=1400 audit(2170.650:26289): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2170.853493][ T31] audit: type=1400 audit(2170.800:26290): avc: denied { read } for pid=19396 comm="syz.2.3275" name="sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2170.857966][ T31] audit: type=1400 audit(2170.800:26291): avc: denied { read open } for pid=19396 comm="syz.2.3275" path="/dev/sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2170.871183][ T31] audit: type=1400 audit(2170.810:26292): avc: denied { allowed } for pid=19396 comm="syz.2.3275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2173.519165][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 2173.520349][ T31] audit: type=1400 audit(2173.460:26308): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2173.809009][ T31] audit: type=1400 audit(2173.750:26309): avc: denied { sys_module } for pid=19032 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2173.824781][ T31] audit: type=1400 audit(2173.770:26310): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2174.094484][ T31] audit: type=1400 audit(2174.040:26311): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2174.388713][ T31] audit: type=1400 audit(2174.330:26312): avc: denied { sys_module } for pid=19032 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2174.390453][ T31] audit: type=1400 audit(2174.330:26313): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2174.821844][ T31] audit: type=1400 audit(2174.760:26314): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2175.130917][ T31] audit: type=1400 audit(2175.070:26315): avc: denied { sys_module } for pid=19032 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2175.137785][ T31] audit: type=1400 audit(2175.080:26316): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2175.415451][ T31] audit: type=1400 audit(2175.360:26317): avc: denied { module_request } for pid=19032 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2177.159764][T19032] veth0_vlan: entered promiscuous mode [ 2177.241653][T19032] veth1_vlan: entered promiscuous mode [ 2177.484451][T19032] veth0_macvtap: entered promiscuous mode [ 2177.517813][T19032] veth1_macvtap: entered promiscuous mode [ 2177.719670][ T8323] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2177.720833][ T8323] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2177.724954][ T8323] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2177.725268][ T8323] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2178.777942][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 2178.778899][ T31] audit: type=1400 audit(2178.720:26350): avc: denied { module_request } for pid=19426 comm="syz.3.3276" kmod="net-pf-2-proto-132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2178.973524][ T31] audit: type=1400 audit(2178.920:26351): avc: denied { prog_load } for pid=19426 comm="syz.3.3276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2178.976097][ T31] audit: type=1400 audit(2178.920:26352): avc: denied { bpf } for pid=19426 comm="syz.3.3276" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2178.978442][ T31] audit: type=1400 audit(2178.920:26353): avc: denied { perfmon } for pid=19426 comm="syz.3.3276" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2178.982129][ T31] audit: type=1400 audit(2178.920:26354): avc: denied { perfmon } for pid=19426 comm="syz.3.3276" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2178.984969][ T31] audit: type=1400 audit(2178.930:26355): avc: denied { perfmon } for pid=19426 comm="syz.3.3276" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2178.989737][ T31] audit: type=1400 audit(2178.930:26356): avc: denied { perfmon } for pid=19426 comm="syz.3.3276" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2179.003478][ T31] audit: type=1400 audit(2178.940:26357): avc: denied { perfmon } for pid=19426 comm="syz.3.3276" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2179.003828][ T31] audit: type=1400 audit(2178.940:26358): avc: denied { bpf } for pid=19426 comm="syz.3.3276" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2179.003932][ T31] audit: type=1400 audit(2178.940:26359): avc: denied { bpf } for pid=19426 comm="syz.3.3276" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2181.149111][T19431] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3276'. [ 2185.713346][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 2185.713521][ T31] audit: type=1400 audit(2185.630:26396): avc: denied { execmem } for pid=19456 comm="syz.2.3284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2188.358685][ T31] audit: type=1400 audit(2188.300:26397): avc: denied { create } for pid=19456 comm="syz.2.3284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2188.427371][ T31] audit: type=1400 audit(2188.360:26398): avc: denied { create } for pid=19456 comm="syz.2.3284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2188.549635][ T31] audit: type=1400 audit(2188.490:26399): avc: denied { ioctl } for pid=19456 comm="syz.2.3284" path="socket:[41768]" dev="sockfs" ino=41768 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2188.593170][ T31] audit: type=1400 audit(2188.530:26400): avc: denied { ioctl } for pid=19456 comm="syz.2.3284" path="socket:[41768]" dev="sockfs" ino=41768 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2188.685391][ T31] audit: type=1400 audit(2188.630:26401): avc: denied { ioctl } for pid=19456 comm="syz.2.3284" path="socket:[42061]" dev="sockfs" ino=42061 ioctlcmd=0x89f2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2189.245255][T19466] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3285'. [ 2189.513471][ T31] audit: type=1400 audit(2189.450:26402): avc: denied { create } for pid=19467 comm="syz.2.3286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2189.516852][ T31] audit: type=1400 audit(2189.460:26403): avc: denied { write } for pid=19467 comm="syz.2.3286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2189.747969][ T31] audit: type=1400 audit(2189.690:26404): avc: denied { prog_load } for pid=19469 comm="syz.2.3287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2189.751829][ T31] audit: type=1400 audit(2189.690:26405): avc: denied { bpf } for pid=19469 comm="syz.2.3287" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2189.781599][T19470] bridge_slave_0: entered promiscuous mode [ 2189.782129][T19470] bridge_slave_0: entered allmulticast mode [ 2191.030262][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 2191.030851][ T31] audit: type=1400 audit(2190.970:26414): avc: denied { write } for pid=19474 comm="syz.3.3289" name="psched" dev="proc" ino=4026532789 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2191.045854][ T31] audit: type=1400 audit(2190.990:26415): avc: denied { write } for pid=19474 comm="syz.3.3289" path="/proc/8/net/psched" dev="proc" ino=4026532789 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 2191.059335][ T31] audit: type=1400 audit(2191.000:26416): avc: denied { read write } for pid=19474 comm="syz.3.3289" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2191.061974][ T31] audit: type=1400 audit(2191.000:26417): avc: denied { read write open } for pid=19474 comm="syz.3.3289" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2191.090164][ T31] audit: type=1400 audit(2191.030:26418): avc: denied { read write } for pid=19474 comm="syz.3.3289" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2191.108260][ T31] audit: type=1400 audit(2191.050:26419): avc: denied { read write open } for pid=19474 comm="syz.3.3289" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2191.129392][ T31] audit: type=1400 audit(2191.070:26420): avc: denied { read write } for pid=19474 comm="syz.3.3289" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2191.132281][ T31] audit: type=1400 audit(2191.070:26421): avc: denied { read write open } for pid=19474 comm="syz.3.3289" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2191.246098][ T31] audit: type=1400 audit(2191.190:26422): avc: denied { prog_load } for pid=19476 comm="syz.3.3290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2191.248509][ T31] audit: type=1400 audit(2191.190:26423): avc: denied { bpf } for pid=19476 comm="syz.3.3290" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2198.572830][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 2198.573034][ T31] audit: type=1400 audit(2198.500:26435): avc: denied { create } for pid=19490 comm="syz.2.3295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2198.637937][ T31] audit: type=1400 audit(2198.580:26436): avc: denied { write } for pid=19490 comm="syz.2.3295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2198.650848][ T31] audit: type=1400 audit(2198.590:26437): avc: denied { write } for pid=19490 comm="syz.2.3295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2199.001566][ T31] audit: type=1400 audit(2198.940:26438): avc: denied { execmem } for pid=19492 comm="syz.2.3296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2201.588895][ T31] audit: type=1400 audit(2201.530:26439): avc: denied { create } for pid=19492 comm="syz.2.3296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2201.600575][ T31] audit: type=1400 audit(2201.540:26440): avc: denied { write } for pid=19492 comm="syz.2.3296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 2201.950212][ T31] audit: type=1400 audit(2201.890:26441): avc: denied { create } for pid=19495 comm="syz.2.3297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2201.966743][ T31] audit: type=1400 audit(2201.910:26442): avc: denied { create } for pid=19495 comm="syz.2.3297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2201.969461][ T31] audit: type=1400 audit(2201.910:26443): avc: denied { write } for pid=19495 comm="syz.2.3297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2201.996316][ T31] audit: type=1400 audit(2201.940:26444): avc: denied { read } for pid=19495 comm="syz.2.3297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2203.687875][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 2203.688731][ T31] audit: type=1400 audit(2203.630:26452): avc: denied { prog_load } for pid=19505 comm="syz.3.3301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2203.702757][ T31] audit: type=1400 audit(2203.640:26453): avc: denied { bpf } for pid=19505 comm="syz.3.3301" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2203.718314][ T31] audit: type=1400 audit(2203.660:26454): avc: denied { prog_load } for pid=19505 comm="syz.3.3301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2203.721966][ T31] audit: type=1400 audit(2203.660:26455): avc: denied { bpf } for pid=19505 comm="syz.3.3301" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2203.737097][ T31] audit: type=1400 audit(2203.680:26456): avc: denied { bpf } for pid=19505 comm="syz.3.3301" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2203.756885][ T31] audit: type=1400 audit(2203.700:26457): avc: denied { execmem } for pid=19505 comm="syz.3.3301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2203.849896][ T31] audit: type=1400 audit(2203.780:26458): avc: denied { create } for pid=19497 comm="syz.2.3298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2203.850182][ T31] audit: type=1400 audit(2203.790:26459): avc: denied { create } for pid=19497 comm="syz.2.3298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2203.850396][ T31] audit: type=1400 audit(2203.790:26460): avc: denied { write } for pid=19497 comm="syz.2.3298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2203.861083][ T31] audit: type=1400 audit(2203.800:26461): avc: denied { module_request } for pid=19497 comm="syz.2.3298" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2208.869519][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 2208.869826][ T31] audit: type=1400 audit(2208.810:26474): avc: denied { create } for pid=19516 comm="syz.2.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2208.879960][ T31] audit: type=1400 audit(2208.820:26475): avc: denied { create } for pid=19516 comm="syz.2.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2208.887227][ T31] audit: type=1400 audit(2208.830:26476): avc: denied { create } for pid=19516 comm="syz.2.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2208.896833][ T31] audit: type=1400 audit(2208.840:26477): avc: denied { setopt } for pid=19516 comm="syz.2.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2208.904620][ T31] audit: type=1400 audit(2208.850:26478): avc: denied { setopt } for pid=19516 comm="syz.2.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2208.950004][ T31] audit: type=1400 audit(2208.890:26479): avc: denied { setopt } for pid=19516 comm="syz.2.3303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2209.207107][ T31] audit: type=1400 audit(2209.150:26480): avc: denied { name_bind } for pid=19518 comm="syz.2.3304" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2209.219559][ T31] audit: type=1400 audit(2209.160:26481): avc: denied { node_bind } for pid=19518 comm="syz.2.3304" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2209.476023][ T31] audit: type=1400 audit(2209.410:26482): avc: denied { read } for pid=19520 comm="syz.2.3305" name="mice" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2209.478587][ T31] audit: type=1400 audit(2209.420:26483): avc: denied { read open } for pid=19520 comm="syz.2.3305" path="/dev/input/mice" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2210.308841][T19527] binder_alloc: 19526: binder_alloc_buf, no vma [ 2210.572379][T19529] lo: entered allmulticast mode [ 2210.654614][T19528] lo: left allmulticast mode [ 2215.420886][ T31] kauditd_printk_skb: 46 callbacks suppressed [ 2215.421236][ T31] audit: type=1400 audit(2215.360:26530): avc: denied { create } for pid=19554 comm="syz.3.3316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2215.433730][ T31] audit: type=1400 audit(2215.370:26531): avc: denied { write } for pid=19554 comm="syz.3.3316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2215.443292][ T31] audit: type=1400 audit(2215.380:26532): avc: denied { write } for pid=19554 comm="syz.3.3316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2215.603025][ T31] audit: type=1400 audit(2215.540:26533): avc: denied { read } for pid=19556 comm="syz.3.3317" name="controlC0" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2215.607028][ T31] audit: type=1400 audit(2215.540:26534): avc: denied { read open } for pid=19556 comm="syz.3.3317" path="/dev/snd/controlC0" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2215.623824][ T31] audit: type=1400 audit(2215.570:26535): avc: denied { append } for pid=19556 comm="syz.3.3317" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2215.628945][ T31] audit: type=1400 audit(2215.570:26536): avc: denied { append open } for pid=19556 comm="syz.3.3317" path="/dev/snd/seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2215.650428][ T31] audit: type=1400 audit(2215.590:26537): avc: denied { read write } for pid=19556 comm="syz.3.3317" name="comedi4" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2215.664689][ T31] audit: type=1400 audit(2215.600:26538): avc: denied { read write open } for pid=19556 comm="syz.3.3317" path="/dev/comedi4" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2215.674218][ T31] audit: type=1400 audit(2215.600:26539): avc: denied { read } for pid=19556 comm="syz.3.3317" name="sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2216.339331][T19559] binder: 19558:19559 ioctl c0306201 20000080 returned -14 [ 2220.880991][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 2220.881342][ T31] audit: type=1400 audit(2220.815:26547): avc: denied { prog_load } for pid=19560 comm="syz.3.3319" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2220.881605][ T31] audit: type=1400 audit(2220.815:26548): avc: denied { bpf } for pid=19560 comm="syz.3.3319" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2220.881801][ T31] audit: type=1400 audit(2220.815:26549): avc: denied { perfmon } for pid=19560 comm="syz.3.3319" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2220.881993][ T31] audit: type=1400 audit(2220.815:26550): avc: denied { perfmon } for pid=19560 comm="syz.3.3319" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2220.882180][ T31] audit: type=1400 audit(2220.815:26551): avc: denied { perfmon } for pid=19560 comm="syz.3.3319" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2220.951327][ T31] audit: type=1400 audit(2220.875:26552): avc: denied { perfmon } for pid=19560 comm="syz.3.3319" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2220.951714][ T31] audit: type=1400 audit(2220.875:26553): avc: denied { perfmon } for pid=19560 comm="syz.3.3319" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2220.993382][ T31] audit: type=1400 audit(2220.935:26554): avc: denied { bpf } for pid=19560 comm="syz.3.3319" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2224.347477][ T31] audit: type=1400 audit(2224.287:26555): avc: denied { create } for pid=19564 comm="syz.2.3320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2224.363778][ T31] audit: type=1400 audit(2224.307:26556): avc: denied { create } for pid=19564 comm="syz.2.3320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2226.976957][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2226.978034][ T31] audit: type=1400 audit(2226.918:26567): avc: denied { prog_load } for pid=19569 comm="syz.2.3321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2226.985392][ T31] audit: type=1400 audit(2226.928:26568): avc: denied { bpf } for pid=19569 comm="syz.2.3321" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2228.099239][ T31] audit: type=1400 audit(2228.049:26569): avc: denied { create } for pid=19572 comm="syz.3.3322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2228.117263][ T31] audit: type=1400 audit(2228.059:26570): avc: denied { name_bind } for pid=19572 comm="syz.3.3322" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2228.117648][ T31] audit: type=1400 audit(2228.059:26571): avc: denied { node_bind } for pid=19572 comm="syz.3.3322" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2228.131743][ T31] audit: type=1400 audit(2228.079:26572): avc: denied { create } for pid=19572 comm="syz.3.3322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2228.149355][ T31] audit: type=1400 audit(2228.089:26573): avc: denied { create } for pid=19572 comm="syz.3.3322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2228.149705][ T31] audit: type=1400 audit(2228.089:26574): avc: denied { write } for pid=19572 comm="syz.3.3322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2228.149899][ T31] audit: type=1400 audit(2228.089:26575): avc: denied { read } for pid=19572 comm="syz.3.3322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2228.150007][ T31] audit: type=1400 audit(2228.099:26576): avc: denied { read } for pid=19572 comm="syz.3.3322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2231.798422][T18703] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2231.841583][T18703] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2231.895663][T18703] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2231.962236][T18703] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2232.018101][T19587] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3325'. [ 2232.203952][ T31] kauditd_printk_skb: 19 callbacks suppressed [ 2232.204274][ T31] audit: type=1400 audit(2232.141:26596): avc: denied { create } for pid=19594 comm="syz.2.3326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2232.218246][ T31] audit: type=1400 audit(2232.161:26597): avc: denied { bind } for pid=19594 comm="syz.2.3326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2232.328583][T18703] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2232.339173][T18703] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2232.343411][T18703] bond0 (unregistering): Released all slaves [ 2232.400428][T19601] bond0: (slave bond_slave_0): Releasing backup interface [ 2232.433151][T19601] bond0: (slave bond_slave_1): Releasing backup interface [ 2232.490649][ T31] audit: type=1400 audit(2232.431:26598): avc: denied { create } for pid=19594 comm="syz.2.3326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2232.491003][ T31] audit: type=1400 audit(2232.431:26599): avc: denied { create } for pid=19594 comm="syz.2.3326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2232.491321][ T31] audit: type=1400 audit(2232.431:26600): avc: denied { write } for pid=19594 comm="syz.2.3326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2232.510085][T18703] hsr_slave_0: left promiscuous mode [ 2232.511455][T18703] hsr_slave_1: left promiscuous mode [ 2232.522394][ T31] audit: type=1400 audit(2232.461:26601): avc: denied { module_request } for pid=19594 comm="syz.2.3326" kmod="net-pf-16-proto-16-family-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2232.527845][T18703] veth1_macvtap: left promiscuous mode [ 2232.532039][T18703] veth0_macvtap: left promiscuous mode [ 2232.532657][T18703] veth1_vlan: left promiscuous mode [ 2232.533101][T18703] veth0_vlan: left promiscuous mode [ 2232.992791][ T31] audit: type=1400 audit(2232.931:26602): avc: denied { ioctl } for pid=19594 comm="syz.2.3326" path="socket:[41969]" dev="sockfs" ino=41969 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2232.999553][ T31] audit: type=1400 audit(2232.941:26603): avc: denied { module_request } for pid=19594 comm="syz.2.3326" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2233.050364][ T31] audit: type=1400 audit(2232.991:26604): avc: denied { read } for pid=19594 comm="syz.2.3326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2233.228724][ T31] audit: type=1400 audit(2233.171:26605): avc: denied { sys_module } for pid=19594 comm="syz.2.3326" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2235.577768][T19623] netlink: 'syz.2.3330': attribute type 30 has an invalid length. [ 2236.299041][T19628] netlink: 20 bytes leftover after parsing attributes in process `syz.2.3332'. [ 2237.216462][ T31] kauditd_printk_skb: 218 callbacks suppressed [ 2237.216939][ T31] audit: type=1400 audit(2237.163:26824): avc: denied { prog_load } for pid=19632 comm="syz.2.3334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2237.226942][ T31] audit: type=1400 audit(2237.173:26825): avc: denied { bpf } for pid=19632 comm="syz.2.3334" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2237.237986][ T31] audit: type=1400 audit(2237.183:26826): avc: denied { perfmon } for pid=19632 comm="syz.2.3334" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2237.248168][ T31] audit: type=1400 audit(2237.193:26827): avc: denied { ioctl } for pid=19632 comm="syz.2.3334" path="socket:[43025]" dev="sockfs" ino=43025 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2237.254960][ T31] audit: type=1400 audit(2237.203:26828): avc: denied { module_request } for pid=19632 comm="syz.2.3334" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2237.275710][ T31] audit: type=1400 audit(2237.223:26829): avc: denied { write } for pid=19635 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2237.288084][ T31] audit: type=1400 audit(2237.223:26830): avc: denied { write open } for pid=19635 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2237.709735][ T31] audit: type=1400 audit(2237.654:26831): avc: denied { sys_module } for pid=19632 comm="syz.2.3334" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2237.723148][ T31] audit: type=1400 audit(2237.664:26832): avc: denied { module_request } for pid=19632 comm="syz.2.3334" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2237.757906][ T31] audit: type=1400 audit(2237.704:26833): avc: denied { write } for pid=19632 comm="syz.2.3334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2242.220515][ T31] kauditd_printk_skb: 222 callbacks suppressed [ 2242.220847][ T31] audit: type=1400 audit(2242.166:27056): avc: denied { read open } for pid=19656 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2242.237004][ T31] audit: type=1400 audit(2242.186:27057): avc: denied { getattr } for pid=19656 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2242.258590][ T31] audit: type=1400 audit(2242.206:27058): avc: denied { search } for pid=19656 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2242.262225][ T31] audit: type=1400 audit(2242.216:27059): avc: denied { search } for pid=19656 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2242.280359][ T31] audit: type=1400 audit(2242.226:27060): avc: denied { search } for pid=19656 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2242.282492][ T31] audit: type=1400 audit(2242.226:27061): avc: denied { search } for pid=19656 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2242.286600][ T31] audit: type=1400 audit(2242.236:27062): avc: denied { search } for pid=19656 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2242.288807][ T31] audit: type=1400 audit(2242.236:27063): avc: denied { search } for pid=19656 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2242.292309][ T31] audit: type=1400 audit(2242.246:27064): avc: denied { search } for pid=19656 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2242.298706][ T31] audit: type=1400 audit(2242.246:27065): avc: denied { read open } for pid=19656 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2247.330454][ T31] kauditd_printk_skb: 409 callbacks suppressed [ 2247.331674][ T31] audit: type=1400 audit(2247.289:27475): avc: denied { search } for pid=19670 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2247.336110][ T31] audit: type=1400 audit(2247.289:27476): avc: denied { read } for pid=19670 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2247.344038][ T31] audit: type=1400 audit(2247.299:27477): avc: denied { read open } for pid=19670 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2247.350580][ T31] audit: type=1400 audit(2247.309:27478): avc: denied { search } for pid=19670 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2247.352718][ T31] audit: type=1400 audit(2247.309:27479): avc: denied { search } for pid=19670 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2247.354540][ T31] audit: type=1400 audit(2247.309:27480): avc: denied { search } for pid=19670 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2247.361209][ T31] audit: type=1400 audit(2247.319:27481): avc: denied { read } for pid=19670 comm="cmp" name="resolv.conf.eth8.link" dev="tmpfs" ino=78 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2247.366627][ T31] audit: type=1400 audit(2247.319:27482): avc: denied { read open } for pid=19670 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth8.link" dev="tmpfs" ino=78 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2247.372426][ T31] audit: type=1400 audit(2247.329:27483): avc: denied { getattr } for pid=19670 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2247.381994][ T31] audit: type=1400 audit(2247.339:27484): avc: denied { getattr } for pid=19670 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth8.link" dev="tmpfs" ino=78 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2252.372409][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 2252.373035][ T31] audit: type=1400 audit(2252.321:27545): avc: denied { create } for pid=19696 comm="syz.2.3346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2252.378906][ T31] audit: type=1400 audit(2252.331:27546): avc: denied { write } for pid=19696 comm="syz.2.3346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2252.382906][ T31] audit: type=1400 audit(2252.331:27547): avc: denied { nlmsg_write } for pid=19696 comm="syz.2.3346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2252.385636][T19697] netlink: 64 bytes leftover after parsing attributes in process `syz.2.3346'. [ 2252.496155][ T31] audit: type=1400 audit(2252.451:27548): avc: denied { create } for pid=19698 comm="syz.2.3347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2252.507862][ T31] audit: type=1400 audit(2252.461:27549): avc: denied { write } for pid=19698 comm="syz.2.3347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2252.516668][T19699] netlink: 128 bytes leftover after parsing attributes in process `syz.2.3347'. [ 2252.518087][T19699] netlink: 20 bytes leftover after parsing attributes in process `syz.2.3347'. [ 2252.705071][ T31] audit: type=1400 audit(2252.651:27550): avc: denied { prog_load } for pid=19700 comm="syz.2.3348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2252.709715][ T31] audit: type=1400 audit(2252.661:27551): avc: denied { bpf } for pid=19700 comm="syz.2.3348" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2252.736006][ T31] audit: type=1400 audit(2252.671:27552): avc: denied { execmem } for pid=19700 comm="syz.2.3348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2253.866218][ T31] audit: type=1400 audit(2253.822:27553): avc: denied { create } for pid=19700 comm="syz.2.3348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2253.873267][ T31] audit: type=1400 audit(2253.822:27554): avc: denied { write } for pid=19700 comm="syz.2.3348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2254.184898][T19704] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2254.188810][T19704] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2254.851768][T19712] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3352'. [ 2255.161770][T19712] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3352'. [ 2255.376313][T19720] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=19720 comm=syz.3.3355 [ 2257.584320][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2257.584689][ T31] audit: type=1400 audit(2257.544:27588): avc: denied { execmem } for pid=19739 comm="syz.2.3361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2257.745930][ T31] audit: type=1400 audit(2257.704:27589): avc: denied { map_create } for pid=19744 comm="syz.2.3362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2257.750082][ T31] audit: type=1400 audit(2257.704:27590): avc: denied { map_read map_write } for pid=19744 comm="syz.2.3362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2257.764987][ T31] audit: type=1400 audit(2257.724:27591): avc: denied { map_create } for pid=19744 comm="syz.2.3362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2257.774059][ T31] audit: type=1400 audit(2257.724:27592): avc: denied { map_read map_write } for pid=19744 comm="syz.2.3362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2257.783589][ T31] audit: type=1400 audit(2257.734:27593): avc: denied { prog_load } for pid=19744 comm="syz.2.3362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2257.793548][ T31] audit: type=1400 audit(2257.754:27594): avc: denied { bpf } for pid=19744 comm="syz.2.3362" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2257.801451][ T31] audit: type=1400 audit(2257.754:27595): avc: denied { perfmon } for pid=19744 comm="syz.2.3362" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2257.810702][ T31] audit: type=1400 audit(2257.764:27596): avc: denied { perfmon } for pid=19744 comm="syz.2.3362" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2257.817863][ T31] audit: type=1400 audit(2257.774:27597): avc: denied { perfmon } for pid=19744 comm="syz.2.3362" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2261.726763][T19757] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3366'. [ 2262.592168][ T31] kauditd_printk_skb: 101 callbacks suppressed [ 2262.592482][ T31] audit: type=1400 audit(2262.546:27699): avc: denied { read open } for pid=19754 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2262.599051][ T31] audit: type=1400 audit(2262.556:27700): avc: denied { getattr } for pid=19754 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2262.750854][ T31] audit: type=1400 audit(2262.706:27701): avc: denied { search } for pid=19754 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2262.751254][ T31] audit: type=1400 audit(2262.706:27702): avc: denied { search } for pid=19754 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2262.751560][ T31] audit: type=1400 audit(2262.706:27703): avc: denied { search } for pid=19754 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2262.751783][ T31] audit: type=1400 audit(2262.716:27704): avc: denied { search } for pid=19754 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2262.764254][ T31] audit: type=1400 audit(2262.726:27705): avc: denied { search } for pid=19754 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2262.768072][ T31] audit: type=1400 audit(2262.726:27706): avc: denied { search } for pid=19754 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2262.770979][ T31] audit: type=1400 audit(2262.726:27707): avc: denied { search } for pid=19754 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2262.792860][ T31] audit: type=1400 audit(2262.756:27708): avc: denied { read open } for pid=19754 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2263.490089][T19761] veth0_vlan: entered allmulticast mode [ 2267.710272][ T31] kauditd_printk_skb: 130 callbacks suppressed [ 2267.710639][ T31] audit: type=1400 audit(2267.679:27839): avc: denied { write } for pid=19766 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2267.750651][ T31] audit: type=1400 audit(2267.719:27840): avc: denied { write open } for pid=19766 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2267.861257][ T31] audit: type=1400 audit(2267.829:27841): avc: denied { search } for pid=19766 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2267.862228][ T31] audit: type=1400 audit(2267.829:27842): avc: denied { search } for pid=19766 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2267.862786][ T31] audit: type=1400 audit(2267.829:27843): avc: denied { search } for pid=19766 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2267.863198][ T31] audit: type=1400 audit(2267.829:27844): avc: denied { search } for pid=19766 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2268.341602][ T31] audit: type=1400 audit(2268.309:27845): avc: denied { search } for pid=19767 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2268.342513][ T31] audit: type=1400 audit(2268.309:27846): avc: denied { search } for pid=19767 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2268.342960][ T31] audit: type=1400 audit(2268.309:27847): avc: denied { search } for pid=19767 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2268.345563][ T31] audit: type=1400 audit(2268.309:27848): avc: denied { read open } for pid=19767 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2272.721580][ T31] kauditd_printk_skb: 437 callbacks suppressed [ 2272.721844][ T31] audit: type=1400 audit(2272.681:28286): avc: denied { search } for pid=19772 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2272.992311][ T31] audit: type=1400 audit(2272.951:28287): avc: denied { write } for pid=19778 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2272.995564][ T31] audit: type=1400 audit(2272.951:28288): avc: denied { write open } for pid=19778 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2273.047304][ T31] audit: type=1400 audit(2273.011:28289): avc: denied { search } for pid=19778 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2273.049787][ T31] audit: type=1400 audit(2273.011:28290): avc: denied { search } for pid=19778 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2273.059654][ T31] audit: type=1400 audit(2273.011:28291): avc: denied { search } for pid=19778 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2273.061553][ T31] audit: type=1400 audit(2273.011:28292): avc: denied { search } for pid=19778 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2273.254647][ T31] audit: type=1400 audit(2273.211:28293): avc: denied { search } for pid=19779 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2273.255014][ T31] audit: type=1400 audit(2273.211:28294): avc: denied { search } for pid=19779 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2273.255288][ T31] audit: type=1400 audit(2273.211:28295): avc: denied { search } for pid=19779 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2277.728488][ T31] kauditd_printk_skb: 231 callbacks suppressed [ 2277.728782][ T31] audit: type=1400 audit(2277.694:28527): avc: denied { write } for pid=19787 comm="syz.3.3371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2277.894516][ T31] audit: type=1400 audit(2277.864:28528): avc: denied { sys_module } for pid=19787 comm="syz.3.3371" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2277.897172][ T31] audit: type=1400 audit(2277.864:28529): avc: denied { module_request } for pid=19787 comm="syz.3.3371" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2282.945455][ T31] audit: type=1400 audit(2282.916:28530): avc: denied { write } for pid=19802 comm="syz.3.3373" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2282.951272][ T31] audit: type=1400 audit(2282.926:28531): avc: denied { write open } for pid=19802 comm="syz.3.3373" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2282.958621][ T31] audit: type=1400 audit(2282.926:28532): avc: denied { ioctl } for pid=19802 comm="syz.3.3373" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2282.990492][ T31] audit: type=1400 audit(2282.966:28533): avc: denied { create } for pid=19802 comm="syz.3.3373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2282.997727][ T31] audit: type=1400 audit(2282.966:28534): avc: denied { create } for pid=19802 comm="syz.3.3373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2283.012562][ T31] audit: type=1400 audit(2282.986:28535): avc: denied { ioctl } for pid=19802 comm="syz.3.3373" path="socket:[43250]" dev="sockfs" ino=43250 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2283.028597][ T31] audit: type=1400 audit(2282.996:28536): avc: denied { ioctl } for pid=19802 comm="syz.3.3373" path="socket:[43249]" dev="sockfs" ino=43249 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2283.260928][ T31] audit: type=1400 audit(2283.236:28537): avc: denied { execmem } for pid=19812 comm="syz.3.3374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2283.865283][ T31] audit: type=1400 audit(2283.837:28538): avc: denied { create } for pid=19814 comm="syz.2.3375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 2283.870664][ T31] audit: type=1400 audit(2283.847:28539): avc: denied { module_request } for pid=19814 comm="syz.2.3375" kmod="net-pf-42" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2291.112630][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 2291.112970][ T31] audit: type=1400 audit(2291.080:28564): avc: denied { execmem } for pid=19832 comm="syz.3.3381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2292.667294][T19838] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3383'. [ 2292.675646][T19838] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=19838 comm=syz.2.3383 [ 2292.908544][ T31] audit: type=1400 audit(2292.881:28565): avc: denied { read } for pid=19841 comm="syz.2.3384" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2292.915303][ T31] audit: type=1400 audit(2292.881:28566): avc: denied { read open } for pid=19841 comm="syz.2.3384" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2292.940980][ T31] audit: type=1400 audit(2292.911:28567): avc: denied { ioctl } for pid=19841 comm="syz.2.3384" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2292.948974][ T31] audit: type=1400 audit(2292.921:28568): avc: denied { set_context_mgr } for pid=19841 comm="syz.2.3384" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 2292.959452][ T31] audit: type=1400 audit(2292.931:28569): avc: denied { read } for pid=19841 comm="syz.2.3384" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2292.965940][ T31] audit: type=1400 audit(2292.931:28570): avc: denied { read open } for pid=19841 comm="syz.2.3384" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2293.057049][ T31] audit: type=1400 audit(2293.031:28571): avc: denied { ioctl } for pid=19841 comm="syz.2.3384" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2293.582556][ T31] audit: type=1400 audit(2293.552:28572): avc: denied { read } for pid=19841 comm="syz.2.3384" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2293.589380][ T31] audit: type=1400 audit(2293.562:28573): avc: denied { read open } for pid=19841 comm="syz.2.3384" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 2297.689493][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 2297.689813][ T31] audit: type=1400 audit(2297.664:28590): avc: denied { prog_load } for pid=19848 comm="syz.2.3386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2297.715929][ T31] audit: type=1400 audit(2297.694:28591): avc: denied { bpf } for pid=19848 comm="syz.2.3386" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2297.720139][ T31] audit: type=1400 audit(2297.694:28592): avc: denied { perfmon } for pid=19848 comm="syz.2.3386" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2300.406946][ T31] audit: type=1400 audit(2300.385:28593): avc: denied { create } for pid=19852 comm="syz.3.3387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2300.415807][ T31] audit: type=1400 audit(2300.395:28594): avc: denied { bind } for pid=19852 comm="syz.3.3387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2300.426909][ T31] audit: type=1400 audit(2300.405:28595): avc: denied { setopt } for pid=19852 comm="syz.3.3387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2300.429689][ T31] audit: type=1400 audit(2300.405:28596): avc: denied { accept } for pid=19852 comm="syz.3.3387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2300.444735][ T31] audit: type=1400 audit(2300.425:28597): avc: denied { accept } for pid=19852 comm="syz.3.3387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2300.448511][ T31] audit: type=1400 audit(2300.425:28598): avc: denied { write } for pid=19852 comm="syz.3.3387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2300.550049][ T31] audit: type=1400 audit(2300.525:28599): avc: denied { create } for pid=19854 comm="syz.3.3388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2301.351783][T19864] pim6reg1: entered promiscuous mode [ 2301.352829][T19864] pim6reg1: entered allmulticast mode [ 2302.996689][ T31] kauditd_printk_skb: 32 callbacks suppressed [ 2303.009915][ T31] audit: type=1400 audit(2302.976:28632): avc: denied { create } for pid=19881 comm="syz.3.3397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2303.122832][ T31] audit: type=1400 audit(2303.106:28633): avc: denied { create } for pid=19881 comm="syz.3.3397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2303.128335][ T31] audit: type=1400 audit(2303.106:28634): avc: denied { write } for pid=19881 comm="syz.3.3397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2303.140735][ T31] audit: type=1400 audit(2303.126:28635): avc: denied { module_request } for pid=19881 comm="syz.3.3397" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2303.545694][ T31] audit: type=1400 audit(2303.527:28636): avc: denied { write } for pid=19881 comm="syz.3.3397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2304.016284][ T31] audit: type=1400 audit(2303.997:28637): avc: denied { read } for pid=19881 comm="syz.3.3397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2304.588918][ T31] audit: type=1400 audit(2304.567:28638): avc: denied { create } for pid=19885 comm="syz.3.3398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2304.758968][ T31] audit: type=1400 audit(2304.727:28639): avc: denied { write } for pid=19885 comm="syz.3.3398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2304.759386][ T31] audit: type=1400 audit(2304.727:28640): avc: denied { module_request } for pid=19885 comm="syz.3.3398" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2305.127800][ T31] audit: type=1400 audit(2305.107:28641): avc: denied { map_create } for pid=19885 comm="syz.3.3398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2308.079887][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 2308.080159][ T31] audit: type=1400 audit(2308.069:28654): avc: denied { create } for pid=19898 comm="syz.2.3403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2308.099932][ T31] audit: type=1400 audit(2308.089:28655): avc: denied { getopt } for pid=19898 comm="syz.2.3403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2308.239372][ T31] audit: type=1400 audit(2308.229:28656): avc: denied { name_bind } for pid=19900 comm="syz.2.3404" src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2308.242775][ T31] audit: type=1400 audit(2308.229:28657): avc: denied { node_bind } for pid=19900 comm="syz.2.3404" saddr=::1 src=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2308.275907][ T31] audit: type=1400 audit(2308.259:28658): avc: denied { allowed } for pid=19900 comm="syz.2.3404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2308.288000][ T31] audit: type=1400 audit(2308.269:28659): avc: denied { create } for pid=19900 comm="syz.2.3404" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2308.294003][ T31] audit: type=1400 audit(2308.279:28660): avc: denied { map } for pid=19900 comm="syz.2.3404" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=43412 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2308.301180][ T31] audit: type=1400 audit(2308.289:28661): avc: denied { read write } for pid=19900 comm="syz.2.3404" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=43412 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2308.311413][ T31] audit: type=1400 audit(2308.299:28662): avc: denied { map } for pid=19900 comm="syz.2.3404" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=43412 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2308.319170][ T31] audit: type=1400 audit(2308.299:28663): avc: denied { read write } for pid=19900 comm="syz.2.3404" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=43412 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2317.071686][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 2317.072795][ T31] audit: type=1400 audit(2317.053:28684): avc: denied { watch } for pid=19918 comm="syz.3.3410" path="/50" dev="tmpfs" ino=263 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2317.389554][ T31] audit: type=1400 audit(2317.374:28685): avc: denied { prog_load } for pid=19922 comm="syz.3.3412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2317.396808][ T31] audit: type=1400 audit(2317.374:28686): avc: denied { bpf } for pid=19922 comm="syz.3.3412" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2317.440025][ T31] audit: type=1400 audit(2317.424:28687): avc: denied { execmem } for pid=19922 comm="syz.3.3412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2317.725182][ T31] audit: type=1400 audit(2317.714:28688): avc: denied { allowed } for pid=19924 comm="syz.2.3413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2317.749048][ T31] audit: type=1400 audit(2317.734:28689): avc: denied { create } for pid=19924 comm="syz.2.3413" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2317.771156][ T31] audit: type=1400 audit(2317.754:28690): avc: denied { name_bind } for pid=19924 comm="syz.2.3413" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2317.776616][ T31] audit: type=1400 audit(2317.764:28691): avc: denied { node_bind } for pid=19924 comm="syz.2.3413" saddr=224.0.0.1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2317.961258][ T31] audit: type=1400 audit(2317.944:28692): avc: denied { read write } for pid=19926 comm="syz.2.3414" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2317.967998][ T31] audit: type=1400 audit(2317.954:28693): avc: denied { read write open } for pid=19926 comm="syz.2.3414" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2322.071717][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 2322.071885][ T31] audit: type=1400 audit(2322.066:28719): avc: denied { map_read map_write } for pid=19944 comm="syz.2.3418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2323.368514][ T31] audit: type=1400 audit(2323.357:28720): avc: denied { read write } for pid=19948 comm="syz.2.3419" name="uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2323.372727][ T31] audit: type=1400 audit(2323.367:28721): avc: denied { read write open } for pid=19948 comm="syz.2.3419" path="/dev/uinput" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2323.386822][ T31] audit: type=1400 audit(2323.377:28722): avc: denied { ioctl } for pid=19948 comm="syz.2.3419" path="/dev/uinput" dev="devtmpfs" ino=697 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2323.558194][ T31] audit: type=1400 audit(2323.547:28723): avc: denied { execmem } for pid=19950 comm="syz.2.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2325.894165][ T31] audit: type=1400 audit(2325.888:28724): avc: denied { prog_load } for pid=19950 comm="syz.2.3420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2325.918755][ T31] audit: type=1400 audit(2325.908:28725): avc: denied { bpf } for pid=19950 comm="syz.2.3420" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2325.964115][ T31] audit: type=1400 audit(2325.958:28726): avc: denied { bpf } for pid=19950 comm="syz.2.3420" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.714102][ T31] audit: type=1400 audit(2331.701:28727): avc: denied { prog_load } for pid=19954 comm="syz.2.3421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2331.717001][ T31] audit: type=1400 audit(2331.711:28728): avc: denied { bpf } for pid=19954 comm="syz.2.3421" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.720322][ T31] audit: type=1400 audit(2331.711:28729): avc: denied { perfmon } for pid=19954 comm="syz.2.3421" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.721905][ T31] audit: type=1400 audit(2331.711:28730): avc: denied { perfmon } for pid=19954 comm="syz.2.3421" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.723458][ T31] audit: type=1400 audit(2331.711:28731): avc: denied { perfmon } for pid=19954 comm="syz.2.3421" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.725581][ T31] audit: type=1400 audit(2331.721:28732): avc: denied { perfmon } for pid=19954 comm="syz.2.3421" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.727187][ T31] audit: type=1400 audit(2331.721:28733): avc: denied { bpf } for pid=19954 comm="syz.2.3421" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.730822][ T31] audit: type=1400 audit(2331.721:28734): avc: denied { bpf } for pid=19954 comm="syz.2.3421" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2331.732483][ T31] audit: type=1400 audit(2331.721:28735): avc: denied { prog_run } for pid=19954 comm="syz.2.3421" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2331.847053][T19957] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3422'. [ 2332.071601][ T31] audit: type=1400 audit(2332.061:28736): avc: denied { create } for pid=19960 comm="syz.2.3423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2346.465619][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 2346.466007][ T31] audit: type=1400 audit(2346.468:28749): avc: denied { create } for pid=19966 comm="syz.2.3425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2346.490577][ T31] audit: type=1400 audit(2346.488:28750): avc: denied { write } for pid=19966 comm="syz.2.3425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2346.661694][ T31] audit: type=1400 audit(2346.668:28751): avc: denied { create } for pid=19968 comm="syz.2.3426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2346.682198][ T31] audit: type=1400 audit(2346.688:28752): avc: denied { connect } for pid=19968 comm="syz.2.3426" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2346.692560][ T31] audit: type=1400 audit(2346.698:28753): avc: denied { write } for pid=19968 comm="syz.2.3426" laddr=::1 lport=255 faddr=::1 fport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2346.709866][ T31] audit: type=1400 audit(2346.718:28754): avc: denied { write } for pid=19968 comm="syz.2.3426" laddr=::1 lport=255 faddr=::1 fport=20001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2346.884346][ T31] audit: type=1400 audit(2346.888:28755): avc: denied { create } for pid=19970 comm="syz.2.3427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2346.902715][ T31] audit: type=1400 audit(2346.908:28756): avc: denied { bind } for pid=19970 comm="syz.2.3427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2346.906737][ T31] audit: type=1400 audit(2346.908:28757): avc: denied { module_request } for pid=19970 comm="syz.2.3427" kmod="crypto-ecb(camellia)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2347.173516][ T31] audit: type=1400 audit(2347.178:28758): avc: denied { module_request } for pid=19970 comm="syz.2.3427" kmod="crypto-ecb(camellia)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2347.965483][T19979] IPv6: addrconf: prefix option has invalid lifetime [ 2352.207856][ T31] kauditd_printk_skb: 15 callbacks suppressed [ 2352.208177][ T31] audit: type=1400 audit(2352.211:28774): avc: denied { prog_load } for pid=19991 comm="syz.2.3431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2352.217831][ T31] audit: type=1400 audit(2352.221:28775): avc: denied { bpf } for pid=19991 comm="syz.2.3431" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2352.232999][ T31] audit: type=1400 audit(2352.231:28776): avc: denied { allowed } for pid=19991 comm="syz.2.3431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2352.248621][ T31] audit: type=1400 audit(2352.251:28777): avc: denied { sqpoll } for pid=19991 comm="syz.2.3431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2352.258166][ T31] audit: type=1400 audit(2352.251:28778): avc: denied { create } for pid=19991 comm="syz.2.3431" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2352.261923][ T31] audit: type=1400 audit(2352.261:28779): avc: denied { map } for pid=19991 comm="syz.2.3431" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=43512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2352.272016][ T31] audit: type=1400 audit(2352.271:28780): avc: denied { read write } for pid=19991 comm="syz.2.3431" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=43512 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2352.621872][ T31] audit: type=1400 audit(2352.621:28781): avc: denied { read } for pid=20016 comm="syz.2.3432" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2352.633912][ T31] audit: type=1400 audit(2352.631:28782): avc: denied { read open } for pid=20016 comm="syz.2.3432" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2352.939457][ T31] audit: type=1400 audit(2352.941:28783): avc: denied { create } for pid=20022 comm="syz.2.3434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2361.811258][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 2361.811609][ T31] audit: type=1400 audit(2361.816:28789): avc: denied { module_request } for pid=20036 comm="syz.2.3440" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2362.082089][ T31] audit: type=1400 audit(2362.096:28790): avc: denied { sys_module } for pid=20036 comm="syz.2.3440" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2362.087386][ T31] audit: type=1400 audit(2362.096:28791): avc: denied { module_request } for pid=20036 comm="syz.2.3440" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2362.450336][ T31] audit: type=1400 audit(2362.456:28792): avc: denied { execute } for pid=20041 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2362.450674][ T31] audit: type=1400 audit(2362.456:28793): avc: denied { execute_no_trans } for pid=20041 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2362.456808][ T31] audit: type=1400 audit(2362.466:28794): avc: denied { execute } for pid=20041 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2362.491448][ T31] audit: type=1400 audit(2362.506:28795): avc: denied { execmem } for pid=20041 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2362.540071][ T31] audit: type=1400 audit(2362.546:28796): avc: denied { read } for pid=20045 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2362.540416][ T31] audit: type=1400 audit(2362.546:28797): avc: denied { read open } for pid=20045 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2362.569839][ T31] audit: type=1400 audit(2362.576:28798): avc: denied { mounton } for pid=20045 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2363.451396][T20057] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3445'. [ 2365.710741][T20073] syzkaller0: create flow: hash 2962574680 index 1 [ 2365.804065][T20071] syzkaller0: delete flow: hash 2962574680 index 1 [ 2367.095995][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 2367.096365][ T31] audit: type=1400 audit(2367.108:28861): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="rtnl-link-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2367.804476][ T31] audit: type=1400 audit(2367.819:28862): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2368.109896][ T31] audit: type=1400 audit(2368.129:28863): avc: denied { allowed } for pid=20153 comm="syz.2.3453" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2368.137695][ T31] audit: type=1400 audit(2368.149:28864): avc: denied { create } for pid=20153 comm="syz.2.3453" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2368.282815][ T31] audit: type=1400 audit(2368.299:28865): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2368.381843][ T31] audit: type=1400 audit(2368.399:28866): avc: denied { prog_load } for pid=20156 comm="syz.2.3454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2368.588846][ T31] audit: type=1400 audit(2368.609:28867): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2368.759776][ T31] audit: type=1400 audit(2368.779:28868): avc: denied { create } for pid=20160 comm="syz.2.3455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2368.765017][ T31] audit: type=1400 audit(2368.779:28869): avc: denied { create } for pid=20160 comm="syz.2.3455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2368.782960][ T31] audit: type=1400 audit(2368.799:28870): avc: denied { setopt } for pid=20160 comm="syz.2.3455" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2372.083999][T20045] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2372.109416][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 2372.109774][ T31] audit: type=1400 audit(2372.121:28893): avc: denied { setopt } for pid=20232 comm="syz.2.3459" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2372.112130][ T31] audit: type=1400 audit(2372.121:28894): avc: denied { ioctl } for pid=20232 comm="syz.2.3459" path="socket:[42906]" dev="sockfs" ino=42906 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2372.115362][T20045] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2372.119562][ T31] audit: type=1400 audit(2372.131:28895): avc: denied { module_request } for pid=20232 comm="syz.2.3459" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2372.329078][ T31] audit: type=1400 audit(2372.341:28896): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2372.663071][ T31] audit: type=1400 audit(2372.671:28897): avc: denied { write } for pid=20232 comm="syz.2.3459" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2372.765141][ T31] audit: type=1400 audit(2372.771:28898): avc: denied { sys_module } for pid=20232 comm="syz.2.3459" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2372.778801][ T31] audit: type=1400 audit(2372.791:28899): avc: denied { module_request } for pid=20232 comm="syz.2.3459" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2373.130531][ T31] audit: type=1400 audit(2373.141:28900): avc: denied { sys_module } for pid=20045 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2373.130860][ T31] audit: type=1400 audit(2373.141:28901): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2373.964917][ T31] audit: type=1400 audit(2373.962:28902): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2377.269098][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 2377.269808][ T31] audit: type=1400 audit(2377.283:28911): avc: denied { allowed } for pid=20316 comm="syz.2.3463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2377.299789][ T31] audit: type=1400 audit(2377.313:28912): avc: denied { map_create } for pid=20316 comm="syz.2.3463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2377.691179][ T31] audit: type=1400 audit(2377.704:28913): avc: denied { read write } for pid=20318 comm="syz.2.3464" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2377.796401][ T31] audit: type=1400 audit(2377.814:28914): avc: denied { read write open } for pid=20318 comm="syz.2.3464" path="/dev/urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2377.806675][ T31] audit: type=1400 audit(2377.824:28915): avc: denied { sys_module } for pid=20045 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2377.810138][ T31] audit: type=1400 audit(2377.824:28916): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2377.944880][ T31] audit: type=1400 audit(2377.964:28917): avc: denied { read write } for pid=20318 comm="syz.2.3464" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2377.967939][ T31] audit: type=1400 audit(2377.964:28918): avc: denied { read write open } for pid=20318 comm="syz.2.3464" path="/dev/urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2378.518563][ T31] audit: type=1400 audit(2378.534:28919): avc: denied { allowed } for pid=20321 comm="syz.2.3465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2378.619199][ T31] audit: type=1400 audit(2378.634:28920): avc: denied { create } for pid=20321 comm="syz.2.3465" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2378.653695][T20045] hsr_slave_0: entered promiscuous mode [ 2378.656286][T20045] hsr_slave_1: entered promiscuous mode [ 2380.309715][T20045] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 2380.438282][T20045] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 2380.485106][T20045] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 2380.547619][T20045] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 2382.445148][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 2382.445520][ T31] audit: type=1400 audit(2382.466:28960): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2382.760067][ T31] audit: type=1400 audit(2382.776:28961): avc: denied { allowed } for pid=20446 comm="syz.2.3475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2382.778736][ T31] audit: type=1400 audit(2382.796:28962): avc: denied { sys_module } for pid=20045 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2382.786939][ T31] audit: type=1400 audit(2382.806:28963): avc: denied { prog_load } for pid=20446 comm="syz.2.3475" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2382.788636][ T31] audit: type=1400 audit(2382.806:28964): avc: denied { bpf } for pid=20446 comm="syz.2.3475" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2382.808793][ T31] audit: type=1400 audit(2382.816:28965): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2383.106973][ T31] audit: type=1400 audit(2383.126:28966): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2383.140642][ T31] audit: type=1400 audit(2383.156:28967): avc: denied { execute } for pid=20449 comm="syz.2.3476" path=2F6D656D66643AF365099F9138C07901631F6E7578202864656C6574656429 dev="tmpfs" ino=1243 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2383.497979][ T31] audit: type=1400 audit(2383.517:28968): avc: denied { read } for pid=20452 comm="syz.2.3477" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2383.515475][ T31] audit: type=1400 audit(2383.537:28969): avc: denied { read open } for pid=20452 comm="syz.2.3477" path="/dev/ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2384.282054][T20060] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2384.352802][T20045] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2385.432804][T20060] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2385.512456][T20060] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2385.717007][T20060] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2386.112737][T20060] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2386.129562][T20060] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2386.162707][T20060] bond0 (unregistering): Released all slaves [ 2386.278675][T20060] hsr_slave_0: left promiscuous mode [ 2386.280071][T20060] hsr_slave_1: left promiscuous mode [ 2386.329176][T20060] veth1_macvtap: left promiscuous mode [ 2386.330326][T20060] veth0_macvtap: left promiscuous mode [ 2386.330615][T20060] veth1_vlan: left promiscuous mode [ 2386.330696][T20060] veth0_vlan: left promiscuous mode [ 2387.538670][ T31] kauditd_printk_skb: 30 callbacks suppressed [ 2387.539033][ T31] audit: type=1400 audit(2387.569:29000): avc: denied { read write } for pid=20487 comm="syz.2.3485" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2387.542281][ T31] audit: type=1400 audit(2387.569:29001): avc: denied { read write open } for pid=20487 comm="syz.2.3485" path="/dev/urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2387.560155][ T31] audit: type=1400 audit(2387.589:29002): avc: denied { module_request } for pid=20045 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2387.693770][T20060] ------------[ cut here ]------------ [ 2387.694301][T20060] WARNING: CPU: 0 PID: 20060 at net/xfrm/xfrm_state.c:3303 xfrm_state_fini+0xd4/0x15c [ 2387.696337][T20060] Modules linked in: [ 2387.700327][T20060] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 2387.701054][T20060] CPU: 0 UID: 0 PID: 20060 Comm: kworker/u8:1 Not tainted syzkaller #0 PREEMPT [ 2387.701402][T20060] Hardware name: ARM-Versatile Express [ 2387.701804][T20060] Workqueue: netns cleanup_net [ 2387.702143][T20060] Call trace: [ 2387.702336][T20060] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 2387.702706][T20060] r7:00000000 r6:8281f77c r5:00000000 r4:82260bc4 [ 2387.702939][T20060] [<80201b08>] (show_stack) from [<8021fbe4>] (dump_stack_lvl+0x54/0x7c) [ 2387.703263][T20060] [<8021fb90>] (dump_stack_lvl) from [<8021fc24>] (dump_stack+0x18/0x1c) [ 2387.703635][T20060] r5:00000000 r4:82a77d18 [ 2387.703816][T20060] [<8021fc0c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 2387.704127][T20060] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 2387.704453][T20060] r7:81801454 [ 2387.704611][T20060] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 2387.704911][T20060] r3:8280c684 r2:00000001 r1:822475e0 r0:8224f05c [ 2387.705150][T20060] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 2387.705471][T20060] [<80254a44>] (__warn) from [<80254d44>] (warn_slowpath_fmt+0x178/0x1f4) [ 2387.705824][T20060] r8:00000009 r7:8243ecd0 r6:dfb01dd4 r5:83300000 r4:00000000 [ 2387.706090][T20060] [<80254bd0>] (warn_slowpath_fmt) from [<81801454>] (xfrm_state_fini+0xd4/0x15c) [ 2387.706484][T20060] r10:00000001 r9:00000001 r8:829dd028 r7:829eee90 r6:829dd028 r5:857dbb00 [ 2387.707102][T20060] r4:857dbb00 [ 2387.707303][T20060] [<81801380>] (xfrm_state_fini) from [<817f2600>] (xfrm_net_exit+0x2c/0x40) [ 2387.708004][T20060] r5:857dbb00 r4:857dbb00 [ 2387.708225][T20060] [<817f25d4>] (xfrm_net_exit) from [<81564d40>] (ops_undo_list+0xe8/0x238) [ 2387.708622][T20060] r5:857dbb00 r4:dfb01e98 [ 2387.708941][T20060] [<81564c58>] (ops_undo_list) from [<81566f04>] (cleanup_net+0x20c/0x384) [ 2387.709291][T20060] r10:00000000 r9:ffffffd4 r8:857d8ec0 r7:829dd00c r6:829dcfe4 r5:82c1e640 [ 2387.709581][T20060] r4:857dbb20 [ 2387.709717][T20060] [<81566cf8>] (cleanup_net) from [<8027a398>] (process_one_work+0x1b4/0x4f4) [ 2387.710085][T20060] r10:8300f270 r9:8301c615 r8:83300000 r7:8300e600 r6:8301c600 r5:829dcffc [ 2387.710379][T20060] r4:85f70680 [ 2387.710540][T20060] [<8027a1e4>] (process_one_work) from [<8027afe0>] (worker_thread+0x1fc/0x3d8) [ 2387.710976][T20060] r10:61c88647 r9:83300000 r8:85f706ac r7:82804d40 r6:8300e600 r5:8300e620 [ 2387.711284][T20060] r4:85f70680 [ 2387.711441][T20060] [<8027ade4>] (worker_thread) from [<80281fcc>] (kthread+0x12c/0x280) [ 2387.711833][T20060] r10:00000000 r9:85f70680 r8:8027ade4 r7:dfd01e60 r6:85c97a80 r5:83300000 [ 2387.712144][T20060] r4:00000001 [ 2387.712300][T20060] [<80281ea0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 2387.712640][T20060] Exception stack(0xdfb01fb0 to 0xdfb01ff8) [ 2387.713853][T20060] 1fa0: 00000000 00000000 00000000 00000000 [ 2387.714588][T20060] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 2387.714916][T20060] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 2387.715217][T20060] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ea0 [ 2387.715607][T20060] r4:85c7cac0 [ 2387.717857][T20060] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:48:49 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82260bc4 R02=00000000 R03=81a3b630 R04=00000006 R05=828f7888 R06=00000000 R07=828f7880 R08=83300000 R09=00000028 R10=828f7888 R11=dfb01bc4 R12=dfb01bc8 R13=dfb01bb8 R14=8033d98c R15=81a3b640 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=dfae997c R01=60000013 R02=802011b0 R03=0000e8d8 R04=857b8000 R05=dfae997c R06=82adb0d4 R07=00000301 R08=82adbcd8 R09=8078caa8 R10=82adbcdc R11=dfae99dc R12=dfae9958 R13=dfae99b8 R14=8078d32c R15=8028ef60 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000