last executing test programs: 14.363808093s ago: executing program 1 (id=6105): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x12, r1, 0x10000000) r2 = socket$nl_rdma(0x10, 0x3, 0x14) r3 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x1, r3}) sendmsg$DCCPDIAG_GETSOCK(r2, &(0x7f00000024c0)={0x0, 0x0, &(0x7f0000002480)={&(0x7f00000011c0)=ANY=[@ANYBLOB="4c000000130000042abd7000fbdbdf25100202074e214e23ffffff7f84000000030000004c0000000104000001010000030000007f000000", @ANYRES32=0x0, @ANYBLOB="080000000000000000e9000000000000"], 0x4c}}, 0x80) 13.929391285s ago: executing program 1 (id=6106): r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="e3fa1441d43212565fd315f52a6296a9b8f5b4c1aac66a800f798bbee65720ab1b7276af65ea3324198e87347ca8da4a4e8f731f51c949376a23a5e7bc1716794ab54e8affd3030f5b38ad33b393364d6dc316e6ff380847cd39a0f220a01d5c1ba25c7140d54669eb3db39dbf1601be623b5603bdfbcc072cfd5399f95ed59b89da7e8e87fb717636c14bd98f78d583fd9cb8b0d3739b908120765d83840d5c1be5d9fa0c0ef2c1ce4ddc15fab9c9f6087a8c250df0878d77bee8b4a9e9541062be0c3d8c3a1bf8", 0xc8, 0xfffffffffffffffc) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @auto=[0x62, 0x36, 0x61, 0x35, 0x36, 0x63, 0x64, 0x66, 0x35, 0x30, 0x31, 0x63, 0x39, 0x65, 0x34, 0x35]}, &(0x7f00000002c0)={0x0, "5688fb179d0fde641576a2cd8e8c61134db134daadf7cbc25fccd29f2b2225e32b7683db7e39ae1bc8fa07add47efc2f3d41b06cbbfaf52d4be1b4595f8090ad", 0x3d}, 0x48, 0xfffffffffffffff9) r2 = request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)=']\x00', r1) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffff9, r1, 0x1) keyctl$link(0x8, r0, r1) keyctl$reject(0x13, r0, 0x8000, 0x7fff, r1) r3 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000340)='rxrpc\x00', &(0x7f0000000380)={'syz', 0x1}, r3) keyctl$link(0x8, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_MOVE(0x1e, r1, r4, r3, 0x1) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='devfreq_monitor\x00', 0xffffffffffffffff, 0x0, 0x7fffffff}, 0x18) close(r5) r6 = openat$sndseq(0xffffff9c, &(0x7f0000000540), 0x100) r7 = getuid() keyctl$get_persistent(0x16, r7, r2) read$FUSE(0xffffffffffffffff, &(0x7f0000000580)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) keyctl$update(0x2, r2, &(0x7f00000025c0)="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", 0x1000) preadv(0xffffffffffffffff, &(0x7f0000004740)=[{&(0x7f00000035c0)=""/4096, 0x1000}, {&(0x7f00000045c0)=""/244, 0xf4}, {&(0x7f00000046c0)=""/44, 0x2c}, {&(0x7f0000004700)=""/29, 0x1d}], 0x4, 0x400, 0x2) r9 = socket$inet_icmp(0x2, 0x2, 0x1) r10 = epoll_create1(0xb126baf4230bd5a5) kcmp$KCMP_EPOLL_TFD(r8, r8, 0x7, r9, &(0x7f0000004780)={r10, r6, 0xffff}) r11 = openat$dlm_plock(0xffffff9c, &(0x7f00000047c0), 0x400800, 0x0) getsockopt$netlink(r11, 0x10e, 0x3, &(0x7f0000004800)=""/125, &(0x7f0000004880)=0x7d) r12 = openat$binfmt(0xffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_elf32(r12, &(0x7f00000048c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x89, 0x3, 0x6, 0x8b2, 0x3, 0x3e, 0xffc, 0x21a, 0x38, 0x1b9, 0x7, 0x7, 0x20, 0x1, 0x8, 0x0, 0xbd39}, [{0x5, 0x1, 0x4, 0x4, 0x0, 0x6f8, 0x9, 0xd}], "e7f481d3fbe3789bfaec4a3976d1bdc91ee0032e514a37b006180da1ce83ae822078834360ef242cb7df009a6b506f1e3a108f58912b891d136c1482e7833556116b4e48428e0069f57502828cda9ac2b646438f0c0eee11c2411e74636d4b8bd17c1a53910366bdf3f0e7b724b90f97967c3756b45382fdfbe14ec249ddfb533e7ad0a1155d071eb360a7", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6e3) openat(r11, &(0x7f0000004fc0)='./file0\x00', 0x200, 0x82) ioctl$sock_inet_SIOCGIFPFLAGS(r11, 0x8935, &(0x7f0000005000)={'vlan0\x00'}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r6, 0x40505331, &(0x7f0000005040)={{0x5}, {0x2, 0xf}, 0x9, 0x0, 0x5}) poll(&(0x7f00000050c0)=[{r9, 0xd024}, {r10, 0x4000}, {r6}], 0x3, 0x5) 13.094963919s ago: executing program 1 (id=6108): r0 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x4}, 0x44080044) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x20000851}, 0x4004080) close_range(r0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffff9c, &(0x7f0000000000), 0x1c1001, 0x0) r2 = dup(r1) ioctl$UI_END_FF_UPLOAD(r2, 0x406055c9, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='comm\x00') exit(0x1f52b4ba) write$FUSE_WRITE(r3, 0x0, 0x0) timer_create(0x0, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f00000001c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x0, @remote, 0x7}, r4}}, 0x30) socket$inet_mptcp(0x2, 0x1, 0x106) 9.688171306s ago: executing program 1 (id=6110): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = memfd_create(&(0x7f0000000100)='\x00e-\xda\x99R\x03\x00\xfc\xfe\x9b#*\xff', 0x0) r1 = epoll_create(0x400) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5450, 0x0) write(r0, &(0x7f00000004c0)="0600", 0x2) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = dup3(r3, r2, 0x0) r5 = accept$unix(r4, 0x0, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r5, 0x5450, 0x0) sendfile(r0, r0, &(0x7f0000001000), 0xffff) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$KDSKBSENT(r6, 0x5452, &(0x7f00000006c0)={0x0, "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"}) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r7 = open(&(0x7f0000000340)='./bus\x00', 0x143142, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r8, 0x5452, &(0x7f0000000680)) write$FUSE_ATTR(r7, 0x0, 0x0) r9 = socket(0x29, 0x2, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) r10 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) close_range(r10, 0xffffffffffffffff, 0x0) openat$ttyS3(0xffffff9c, &(0x7f0000000000), 0x3456c0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r11, 0x8946, &(0x7f0000000340)={'netdevsim0\x00', &(0x7f0000000400)=@ethtool_flash={0x33, 0x4, './file0/file1\x00'}}) socket(0x1d, 0x2, 0x6) 7.904665051s ago: executing program 0 (id=6112): r0 = landlock_create_ruleset(&(0x7f0000000080)={0xc068, 0x2, 0x1}, 0x18, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x5452, &(0x7f00000001c0)={0x0, 0x4005, 0xfffffffe, 0x2, 0x20}) r1 = openat$drirender128(0xffffff9c, &(0x7f0000000000), 0x40002, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000440)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x131242, 0x12d) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r5, 0x0) connect$unix(r4, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = open$dir(&(0x7f0000000040)='./file0\x00', 0x1e3042, 0x0) dup3(r5, r6, 0x0) r7 = accept$packet(r6, 0x0, 0x0) getpeername$packet(r7, 0x0, &(0x7f00000001c0)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x5452, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xffff, @ipv4={'\x00', '\xff\xff', @empty}, 0x200b}}}, 0x30) r8 = openat$pfkey(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r8, 0xffffffffffffffff, 0x0) r9 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) r10 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000000000), 0x68a981, 0x0) ioctl$TCSETSF(r10, 0x5451, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r9, 0xc04064a0, &(0x7f0000000140)={0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r8, 0xc06864a1, &(0x7f0000000140)={0x0, 0x0, r11, 0x0}) r13 = openat2(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000840)={0x80f40, 0xb8}, 0x18) ioctl$PIO_FONTRESET(r13, 0x5450, 0x0) ioctl$DRM_IOCTL_MODE_GETFB(r8, 0xc01c64ad, &(0x7f0000000080)={r12}) ioctl$DRM_IOCTL_DMA(r8, 0xc0286429, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000240)=[0x4, 0x3, 0x80000], &(0x7f0000000300)=[0x9, 0xc, 0x5, 0xd, 0x9fb4], 0x4b, 0x3, 0x2, &(0x7f0000000340)=[0x5, 0x4, 0x15], &(0x7f00000003c0)=[0x7, 0x0, 0x35a0, 0xd8, 0x3, 0x2800000, 0xffffffaa, 0x0, 0x8001]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r1, 0xc01864b1, &(0x7f00000000c0)={r12, 0x2, 0x5, 0x4, &(0x7f0000000040)=[{0x101, 0x2, 0x1, 0x3}, {0x7f, 0xd3b, 0x7, 0x7}, {0x3, 0xe6, 0x7, 0x10a}, {0x81, 0x9, 0x4002, 0xfe99}]}) fchmod(r1, 0x161) 7.028598808s ago: executing program 0 (id=6113): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = openat$incfs(r1, &(0x7f0000000180)='.log\x00', 0x101140, 0x0) ioctl$TCSETAF(r2, 0x5450, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FS_IOC_GETFLAGS(r3, 0x5421, &(0x7f0000000040)) r4 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f00000001c0)={0x3, 0x0, &(0x7f0000000180)=[r3, r3, r3, r4]}, 0x4) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40044}, 0xc884) r5 = openat$selinux_policy(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r5) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000780)={0x644, 0x0, 0x4, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0xffffffff, 0x2f}}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x40}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xcb}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x704f44ec}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2b1}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_CENTER_FREQ1={0x8}], @NL80211_ATTR_CSA_IES={0x5d0, 0xb9, 0x0, 0x1, [@beacon_params=[@NL80211_ATTR_BEACON_HEAD={0x5c4, 0xe, {{{0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x40}, @device_b, @broadcast, @random="4b5743bb4ef6", {0x6, 0x6}, @value=@ver_80211n={0x0, 0x3, 0x1, 0x2, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1}}, 0x2, @random=0xff3b, 0x400, @val={0x0, 0x6, @default_ibss_ssid}, @val={0x1, 0x3, [{0x3}, {0x16, 0x1}, {0xb}]}, @void, @void, @void, @val={0x5, 0xe7, {0x7f, 0x56, 0x40, "11d80f984d3c483edbe18d3e31e242d6bfedd50aeff52129ce92d803f730ab516eb99998193307f7a31970e18c5a8fcb9a3e9d5975efc8bf3768bc16c14bfb635605c84b26de6bf3cc4af337db73050e84d1789e0ca5ff2a913a3d58e8c49755d1d0db9cce2df6c844d68353b90cf2878544d3b666392153a29be621aabb2bb0e90a4e9dfddbfafab509c70b1d10e56575c90125d4ddfc774cd3675cd5c7133272be236a4a3a07a39eeac26138ea3b688aa5dc891f0d2df01bd18320022c85ef73a1100887ff036c6498fda328b789755eb52970738173a6afb729376da820377a23d72b"}}, @val={0x25, 0x3, {0x0, 0x7c, 0xa}}, @val={0x2a, 0x1, {0x0, 0x1}}, @void, @void, @val={0x72, 0x6}, @val={0x71, 0x7, {0x0, 0x1, 0x1, 0x0, 0x2, 0x8, 0x8}}, @void, [{0xdd, 0xc7, "0f97bce55ddfb0593c29b8cc664e93edd8a41de56645f556e5f25f09be031d8e1527e90d4d8db5d14e11724b7e81e16a659ec85a9103f053f2b32b2eb26e18a62bcbeeca09df72e52fa8b7408ff0e0dc5b4e1f45e879da2c6b7136a1f34a5d8ef5edc1fa88af9730d8f8ea368f4426f0218e1c79dd57430668755c9aec8c25bae7389cc6663f151d62e9f1ec4494baaddc0c4987b84499ce92cc608ff9520b87af206ceb97b0d34a311a8e890934383a5ede162e5509e4480d292bcad0971656901404ff7449cd"}, {0xdd, 0xd, "17583ed558e56af762276797be"}, {0xdd, 0x46, "fb63d49b1df79f88b8ca7fcb54cbf1ec333d43ca4ca3f7af3ec8f633593e240f04280cb1b84d3029b54c48051d5a2931b0efa436cec1467c42fb91a0c8cfc54d02c865b38adb"}, {0xdd, 0xc5, "aa239827372ca5e03414adf93eb8e4b9c21045be6023bdca0be397b4e86108b8393b1d5d801e8cf2c887275ee0666233abe0ca2a6e4986ad7f8bb6cf4cd02898127cc4ece03bf043ae40ffef5db88628ff5370742e86a9c9c6d25d721db96565a0cd9664368deeba305053c5470e89d383e710fb40cd4bf33f894170b5a891161193d5547e34079661b4cd2f08fefbf4d4486d78e67ca3d9b1f4546f3fdefcc9d9908ef320b098cf0754efa54347abe588207675535c594b2860c6d45b52ce8f5fca8f4e48"}, {0xdd, 0xcc, "24d3471d909e4e40e201ec7474026c100b688a8f2a798e578861e7fdc61bf9c3d0a4b9501611c7c60232065a6dd00c6028a6947870d38ba9f8ec160b82cdd88b27a6b71b951cbd1ee569a13cf1aaf833ef4744e80a3c9c627b64c3a4f0b8e1550d3fdd4884889d44173e358f851a3fbe7b2816126e782348908a91236698015213ce1ea3a8f0ed0dff57721ad2d29bfa01b25d8e0484a293768c0842c340f8f54747b3c7d8bc81c0f6a3bee956e9b91c6c9e68faf112fc54dd625af62be9848c82306a1ecb03c7d6ff8a6d02"}, {0xdd, 0xfe, "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"}, {0xdd, 0x12, "173900b6eef39cda53c3774d3eb03318e989"}, {0xdd, 0x4e, "ab1fbe49edf90e24faa82eacc66839fef5339a443d940a224a4f3d820f59c0b81750675a5cc3766224308dcfd12cd11c427dade91ef9e192e8ac84bb7da7e7cdc8a6df82450bbbb3486842ea6daf"}, {0xdd, 0x6e, "d3684d3b8566e0a3bf4d18830eff578b0f9ee8b2c153cf99630fc664d259ccb1f7947da0dff3269a39ed0ea7e0544c095db7888b25326f9aeee99e0048be616e1103c641ac841cc2c38eaf1b0e0e3b4075401c9378ca60c617f3d4f72967ace495b30af03cd62dc13fc26f6fe2ee"}]}}], @NL80211_ATTR_CSA_C_OFF_BEACON={0x8, 0xba, [0x401, 0xc6b]}]}, @NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @chandef_params=[@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}]]}, 0x644}, 0x1, 0x0, 0x0, 0x4011}, 0x20040010) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_create(0x0, &(0x7f0000000580)={0x0, 0x3b, 0x2, @tid=r6}, &(0x7f00000005c0)) close_range(r4, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NODE_GET(r7, &(0x7f0000000540)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000500)={&(0x7f0000000280)={0x258, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x34a}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe10}]}, @TIPC_NLA_BEARER={0xe0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x93e1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x80, @local, 0xc0a}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x12}}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x36c6}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, '\x00', 0x2d}, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xc6}]}, @TIPC_NLA_BEARER={0x88, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x9, @mcast1, 0xff}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x8, 0x1, @l2={'ib', 0x3a, '\x00'}}]}, @TIPC_NLA_SOCK={0x64, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x39a}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}]}]}, 0x258}, 0x1, 0x0, 0x0, 0x2404c051}, 0xc020) 6.592806981s ago: executing program 1 (id=6114): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x4, 0xc8040) (async) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0xfffffffc, 0x101040) ioctl$TIOCL_GETSHIFTSTATE(r1, 0x5451, 0x0) (async, rerun: 32) r2 = socket(0x29, 0x2, 0x0) (rerun: 32) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) (async) sendmsg$NFQNL_MSG_CONFIG(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x15}, 0x0) (async, rerun: 64) close_range(r2, r2, 0x0) (rerun: 64) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) (async, rerun: 32) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000c80)) (async) r3 = socket(0x1d, 0x1, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) (async) r5 = openat$hwrng(0xffffff9c, &(0x7f0000000340), 0x3091c1, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) (async) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, 0x0, 0x100, 0x70bd27, 0x25dfdbff}, 0x1c}}, 0x20000800) (async) r6 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000000080)=0x7, 0x4) setsockopt$MRT_ADD_MFC(r1, 0x0, 0x5, &(0x7f0000000240)={@multicast1, @empty, 0xfff9, "c2e7400000008c84aea31700251ab800", 0x96ba, 0x8, 0x7e, 0x6d}, 0x3c) (async, rerun: 64) bind$can_j1939(r3, &(0x7f0000000200)={0x1d, r4, 0x4, {0x2, 0x1, 0x2}, 0xfe}, 0x18) (async, rerun: 64) sendmsg$BATADV_CMD_TP_METER_CANCEL(r3, &(0x7f0000005500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000091c1e7ac62ebb62404274d928d8f701e1ffe64d78966df7a1416c43ee10f06a9c3edd0ff46d5a1f1e514fe9550b7c1267d36c2ce1c6cfb6f900969962997b907377197274ad13929f", @ANYRES16=0x0, @ANYRESOCT=r3], 0x14}, 0x1, 0x0, 0x0, 0x203ed194a16bf5e5}, 0x4008010) (async) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x14}, 0x1, 0x0, 0x0, 0x20004820}, 0x4000) (async, rerun: 32) r7 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000680), 0x0, 0x0) (rerun: 32) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000080)={0x2, 'tunl0\x00', {0x37}, 0x6}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x5451, 0x0) (async) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha1)\x00'}, 0x58) (async) r9 = accept4(r8, 0x0, 0x0, 0x800) sendmsg$TIPC_NL_SOCK_GET(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x11) (async) sendmsg$inet6(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f00000003c0)="05080000", 0x4}], 0x1}, 0x20008000) ioctl$EVIOCGMTSLOTS(r0, 0x5451, 0x0) 4.651442478s ago: executing program 1 (id=6115): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) close_range(r0, r0, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc4000}, 0x8000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) socket$unix(0x1, 0x1, 0x0) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) timer_create(0x6, 0x0, 0x0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000940), r3) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)=ANY=[], 0x1c}}, 0x48840) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg2\x00', 0x0}) r6 = socket(0x29, 0x2, 0x0) sendmsg$NFQNL_MSG_CONFIG(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0xc000) close_range(r6, 0xffffffffffffffff, 0x0) socket(0x1d, 0x2, 0x7) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)=0x0) timer_settime(r7, 0x1, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x3938700}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="a0000000", @ANYRES16=r4, @ANYBLOB="0a0329bd7000fcdbdf250300000064000180080003000300000008000100", @ANYRES32=r5, @ANYBLOB='\t\x00A\x00', @ANYRES32=0x0, @ANYBLOB="140002007369743000000000000000000000000008000100", @ANYRES32=r2, @ANYBLOB="0800030002000000080003000200000008000100", @ANYRES32=r2, @ANYBLOB="1400020076657468305f6d6163767461700000000500020005000000050003007f000000050002001000000005000500020000000500030004000000"], 0xa0}, 0x1, 0x0, 0x0, 0x30008050}, 0x2080) syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), r0) write$dsp(r0, &(0x7f0000000100)="e3190b", 0x3) 3.780038983s ago: executing program 0 (id=6116): r0 = socket$rds(0x15, 0x5, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) getpeername(r0, &(0x7f0000000000)=@l2tp={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x80) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000580)={'syztnl2\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x29, 0x6, 0x1, 0x9, 0x9, @loopback, @local, 0x7, 0x7, 0x7, 0x2}}) sendmsg$inet(r1, &(0x7f0000000640)={&(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000100)="36968154900ac9a5b65c1c87863eb0764d71019e788cc3ddb8cab5b88e76cf2c31c8cb706cbeb67161007f0b76520080f476269a4d7d8e842a2fb04cb2bd188a70520bed1194cc89550169eb8c88ffd871e8362f0e8ee872e8a13852174a6fe2331a91cf3f34149adea8f7dd3793fbd9e85c55c9af36b1f19141eed7ff69de7546cb0be5952717862e844bda2d12c4206b6ec48a28d142a4", 0x98}, {&(0x7f00000001c0)="0ea62c3f3a521e43f542919a36379e4f99eb7c52f6ca6d26ede97d4ed8603f8e24a4d62cb835f228ab170ccddc27007a6a63a239d50de0d2ed320eed149a92ef917bd3dcfc98787a7abe89231a39f32746bc940c79b9c86aaf2428e382a40bd5a91cbe3930c48699d721bb9eb54d50ea58cac1d98dfd35b7f6974efa4500abb657412f348664c82363743d8763b907d80a4a350597bd20b578233ef0ab464560ef2fa29d7f5e613c42af81e94d653b0cfc64f4745fb4c40b44bec7d4124adeae0950e3e37a605d565ab78e83780291d56e3f4fa65d63b484f5f9", 0xda}, {&(0x7f00000002c0)="a6c9e785bd0dbdc0648ad672d3cede7c9517b53bdffc558434b9117d1d12f4b6daf3f035f3c716459479d935d99382f31e7341b2629950d80592e1d5506dd8037957fe50e266c6ee5fdf938b4f88ecee27055e086252cc43e1cd9a5c7d7efaf5950dcf311354dc65c9b41516cc157bab704e2009a05d130439a8fca37723471d0dc677a16f2f08918cfefb87a0f6c041cfac47ce3151abc6de59cbcf84a23912948b05fd878cd2782d202dfc58658c2a269183dbe8f8db4a0fb8748a3514c01e3d46a6aa3734f9", 0xc7}, {&(0x7f00000003c0)="d6fb16ba9483bfdb63b939bcc75c20e3af40a35167a540eb87dea1918dabf535189b4e886c8b6f67653447005a31ec61fbcfe67b6c3b43b84a63e40f7bd7262e25f1b4af0d38c825d45ed7be8eb1368a2524f0625309ab466467f9f787c6d73fa72211e99b49b843de7dbef2a0872ecba8e7c3c2066a9456c658fdd27c83f3976120096408b7ab713535e4dd3f", 0x8d}], 0x4, &(0x7f00000005c0)=[@ip_ttl={{0x10}}, @ip_ttl={{0x10, 0x0, 0x2, 0x8}}, @ip_pktinfo={{0x18, 0x0, 0x8, {r2, @remote, @loopback}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@ra={0x94, 0x4}, @generic={0x89, 0xe, "35e09865237c9d3f3512597f"}]}}}, @ip_ttl={{0x10, 0x0, 0x2, 0xb}}, @ip_pktinfo={{0x18, 0x0, 0x8, {r3, @private=0xa010100, @private=0xa010102}}}], 0x80}, 0x5dad9d8c43f43beb) r4 = syz_open_dev$loop(&(0x7f0000000680), 0x6, 0x80) ioctl$BLKROSET(r4, 0x125d, &(0x7f00000006c0)) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_SET(r5, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x40, r6, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_DEBUG_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x0) r7 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET(r7, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x10, 0x3e8, 0x100, 0x70bd2c, 0x25dfdbfe, "", ["", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x44841}, 0x4) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000980), r5) sendmsg$L2TP_CMD_TUNNEL_DELETE(r5, &(0x7f0000000a40)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x24, r8, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x1d}, @L2TP_ATTR_DEBUG={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x20000811) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000b40)={'syztnl1\x00', &(0x7f0000000a80)={'ip_vti0\x00', r2, 0x40, 0x8000, 0x8, 0x5, {{0x22, 0x4, 0x1, 0xb, 0x88, 0x67, 0x0, 0x2, 0x4, 0x0, @remote, @rand_addr=0x64010100, {[@timestamp_prespec={0x44, 0x3c, 0xe4, 0x3, 0x5, [{@rand_addr=0x64010101, 0x7}, {@loopback, 0x9}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x1}, {@multicast2, 0x9}, {@broadcast}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@broadcast, 0x2}]}, @timestamp_prespec={0x44, 0x14, 0xc, 0x3, 0x9, [{@remote, 0x7}, {@loopback, 0xfffffffb}]}, @rr={0x7, 0x23, 0x89, [@broadcast, @rand_addr=0x64010100, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1, @empty, @broadcast, @broadcast, @empty]}]}}}}}) sendmsg$IPVS_CMD_SET_SERVICE(r5, &(0x7f0000000c80)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x50, 0x0, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x20000081) r10 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r4, 0x4c09, 0x1ff) r11 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000cc0), 0x2, 0x0) ioctl$NS_GET_PARENT(r11, 0xb702, 0x0) r12 = signalfd(r5, &(0x7f0000000d00)={[0x8, 0xfffffffd]}, 0x8) ioctl$BLKGETSIZE64(r12, 0x80041272, &(0x7f0000000d40)) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r11, 0x89f3, &(0x7f0000000e40)={'syztnl1\x00', &(0x7f0000000dc0)={'ip6tnl0\x00', r3, 0x0, 0xf2, 0xa, 0x9, 0x4, @remote, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x80, 0x80, 0x10001, 0xc}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r12, 0x89f3, &(0x7f0000000f00)={'syztnl2\x00', &(0x7f0000000e80)={'ip6gre0\x00', r3, 0x29, 0x5, 0xc, 0x78, 0x41, @dev={0xfe, 0x80, '\x00', 0x41}, @loopback, 0x1, 0x8, 0x9, 0x3}}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r11, &(0x7f0000001100)={&(0x7f0000000d80)={0x10, 0x0, 0x0, 0x80001000}, 0xc, &(0x7f00000010c0)={&(0x7f0000000f40)={0x144, r6, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x40000}, 0x20008001) ioctl$AUTOFS_IOC_READY(r10, 0x9360, 0x5) timer_create(0x6, &(0x7f00000012c0)={0x0, 0xb, 0x2, @thr={&(0x7f0000001140)="34b75630c1aec0eccfbc3e7a7fd1e062d6afcecf334aac0ac3ea1d3a3c57416a10daee3d493007e3bf8e2250bd57df5fd75530582ad5f54f7747413505df45d28541ee606e4e0610ceb58a386cc18ea29a2f9f19e6ce59eef581fda61665915510ef64eb5213d342b748e1c52bf53965e07f36d92701539669bdefc77a85d6d99c5f9fd5362d3f0f60352273d72553c5276ee90264c6b68ff0a6eaedfb17280d6c1694ce4a94eb56b46a18af33beebcc65ee776c4f13459b36359c4f0173d8e68fd90b69", &(0x7f0000001240)="91a5743b01ef5090a715a0993ce8653a2ec82d565b72f154c6ae8a8e50894a5885f97bd4730ef43f2a32dd5a9099774cfd99133f85cdf8dae0ce9b4e5ea4cca3c5cfee70965b2479886349405479a14cf874fc75a13a0528e88b146b14b56fc52b20b83dd0cff2d4a85be8205ed9866d25103eb6098fc4f62deca21552d167"}}, &(0x7f0000001300)=0x0) timer_settime(r15, 0x0, &(0x7f0000001380)={{}, {0x0, 0x989680}}, &(0x7f00000013c0)) 1.800666563s ago: executing program 0 (id=6117): r0 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f00000001c0), 0x1, 0x0) close$binfmt(r0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004) 962.394457ms ago: executing program 0 (id=6118): r0 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0x40000004}) ioctl$IOMMU_VFIO_IOAS$GET(0xffffffffffffffff, 0x3b88, &(0x7f0000000040)={0xc, 0x0}) ioctl$IOMMU_OPTION$IOMMU_OPTION_HUGE_PAGES(0xffffffffffffffff, 0x3b87, &(0x7f0000000080)={0x18, 0x1, 0x0, 0x0, r1, 0xfffffffffffffff7}) sendfile(r0, r0, 0x0, 0x3) r2 = semget$private(0x0, 0x4, 0x2) semctl$SEM_STAT_ANY(r2, 0x4, 0x14, &(0x7f00000000c0)=""/77) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r3 = semget$private(0x0, 0x4, 0x21) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = userfaultfd(0x80800) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) bind$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e22}, 0x6e) r5 = semget(0x2, 0x2, 0x82) semtimedop(r5, &(0x7f0000000280)=[{0x1, 0x1, 0x2800}, {0x1, 0x3, 0x1800}, {0x4, 0x100, 0x1800}, {0x1, 0xf, 0x800}, {0x4, 0x9, 0x1000}, {0x0, 0x8}, {0x3, 0x241b}], 0x7, &(0x7f00000002c0)={0x0, 0x989680}) semctl$GETNCNT(r2, 0x3, 0xe, &(0x7f0000000300)=""/186) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) statx(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x10, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000640)={{0x1, r6, r8, r9, 0xee01, 0x49, 0x3}, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x800}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@private1}}, &(0x7f0000000880)=0xe8) lsetxattr$system_posix_acl(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {0x1, 0x4}, [{0x2, 0x5, r10}, {0x2, 0x5, r6}, {0x2, 0x2, r6}, {0x2, 0x4, r11}, {0x2, 0x1, r9}], {0x4, 0x1}, [{0x8, 0x1, r7}, {0x8, 0x2, r7}, {0x8, 0x2, r7}], {0x10, 0x6}, {0x20, 0x2}}, 0x64, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000000940)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002980)={0x50, 0x0, r12, {0x7, 0x2b, 0xffffff80, 0x25a40005, 0x10, 0x1, 0x40, 0x8, 0x0, 0x0, 0x2, 0x7}}, 0x50) r13 = openat$dlm_plock(0xffffff9c, &(0x7f0000002a00), 0x30000, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r13, 0x4004550d, &(0x7f0000002a40)) r14 = semget(0x3, 0x0, 0x5) semtimedop(r14, &(0x7f0000002a80)=[{0x0, 0x2, 0x1800}], 0x1, &(0x7f0000002ac0)={0x77359400}) 0s ago: executing program 0 (id=6119): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r0, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x80) r1 = userfaultfd(0x80001) cachestat(r1, &(0x7f0000000200)={0x800, 0x6}, &(0x7f0000000240), 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="100028bd7000fbdbdf256600000008000300a8e355fc24e17cae988a588256a5d1db431dab929ba16aeaf5a418446ddf946a72db54a32ab6a60acc48f3e4bc", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x14) kernel console output (not intermixed with test programs): :sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4510.810379][ T29] audit: type=1400 audit(4510.710:71816): avc: denied { ioctl } for pid=27810 comm="syz.0.5883" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4510.876546][ T29] audit: type=1400 audit(4510.780:71817): avc: denied { ioctl } for pid=27810 comm="syz.0.5883" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4510.947198][ T29] audit: type=1400 audit(4510.850:71818): avc: denied { ioctl } for pid=27810 comm="syz.0.5883" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4511.001890][T27144] usb 1-1: new high-speed USB device number 27 using dummy_hcd [ 4511.038933][ T29] audit: type=1400 audit(4510.940:71819): avc: denied { ioctl } for pid=27810 comm="syz.0.5883" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4511.129448][ T29] audit: type=1400 audit(4511.030:71820): avc: denied { write } for pid=27808 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4511.429319][T27144] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 4511.429651][T27144] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has an invalid bInterval 0, changing to 7 [ 4511.484970][T27144] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 4511.485372][T27144] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4511.485533][T27144] usb 1-1: Product: syz [ 4511.485678][T27144] usb 1-1: Manufacturer: syz [ 4511.485817][T27144] usb 1-1: SerialNumber: syz [ 4513.003361][T27144] cdc_ncm 1-1:1.0: bind() failure [ 4513.084507][T27144] cdc_ncm 1-1:1.1: probe with driver cdc_ncm failed with error -71 [ 4513.088057][T27144] cdc_mbim 1-1:1.1: probe with driver cdc_mbim failed with error -71 [ 4513.092409][T27144] usbtest 1-1:1.1: probe with driver usbtest failed with error -71 [ 4513.124131][T27144] usb 1-1: USB disconnect, device number 27 [ 4515.552239][T27442] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4516.059866][ T29] kauditd_printk_skb: 244 callbacks suppressed [ 4516.060302][ T29] audit: type=1400 audit(4515.960:72065): avc: denied { sys_module } for pid=27442 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4516.071487][ T29] audit: type=1400 audit(4515.970:72066): avc: denied { module_request } for pid=27442 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4516.539791][ T29] audit: type=1400 audit(4516.440:72067): avc: denied { search } for pid=27838 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4516.564530][ T29] audit: type=1400 audit(4516.470:72068): avc: denied { read } for pid=27838 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4516.623718][ T29] audit: type=1400 audit(4516.530:72069): avc: denied { read open } for pid=27838 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4516.648269][ T29] audit: type=1400 audit(4516.550:72070): avc: denied { search } for pid=27838 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4516.648700][ T29] audit: type=1400 audit(4516.550:72071): avc: denied { search } for pid=27838 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4516.648919][ T29] audit: type=1400 audit(4516.550:72072): avc: denied { search } for pid=27838 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4516.691579][ T29] audit: type=1400 audit(4516.590:72073): avc: denied { read } for pid=27838 comm="cmp" name="resolv.conf.eth3.link" dev="tmpfs" ino=130 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4516.701635][ T29] audit: type=1400 audit(4516.600:72074): avc: denied { read open } for pid=27838 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=130 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4521.063757][ T29] kauditd_printk_skb: 104 callbacks suppressed [ 4521.064199][ T29] audit: type=1400 audit(4520.970:72179): avc: denied { getattr } for pid=27856 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4521.071908][ T29] audit: type=1400 audit(4520.970:72180): avc: denied { search } for pid=27856 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4521.073759][ T29] audit: type=1400 audit(4520.970:72181): avc: denied { search } for pid=27856 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4521.132670][ T29] audit: type=1400 audit(4521.030:72182): avc: denied { search } for pid=27856 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4521.133079][ T29] audit: type=1400 audit(4521.030:72183): avc: denied { search } for pid=27856 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4521.133296][ T29] audit: type=1400 audit(4521.030:72184): avc: denied { search } for pid=27856 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4521.133493][ T29] audit: type=1400 audit(4521.030:72185): avc: denied { search } for pid=27856 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4521.133685][ T29] audit: type=1400 audit(4521.030:72186): avc: denied { search } for pid=27856 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4521.133894][ T29] audit: type=1400 audit(4521.030:72187): avc: denied { read open } for pid=27856 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4521.292156][ T29] audit: type=1400 audit(4521.180:72188): avc: denied { getattr } for pid=27856 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4526.136637][ T29] kauditd_printk_skb: 173 callbacks suppressed [ 4526.137178][ T29] audit: type=1400 audit(4526.040:72362): avc: denied { search } for pid=27853 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4526.283587][ T29] audit: type=1400 audit(4526.190:72363): avc: denied { module_request } for pid=27442 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4526.767806][ T29] audit: type=1400 audit(4526.670:72364): avc: denied { sys_module } for pid=27442 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4526.777914][ T29] audit: type=1400 audit(4526.680:72365): avc: denied { module_request } for pid=27442 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4526.882753][ T29] audit: type=1400 audit(4526.790:72366): avc: denied { write } for pid=27869 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4526.884905][ T29] audit: type=1400 audit(4526.790:72367): avc: denied { write open } for pid=27869 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4526.961346][ T29] audit: type=1400 audit(4526.860:72368): avc: denied { search } for pid=27869 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4526.962419][ T29] audit: type=1400 audit(4526.860:72369): avc: denied { search } for pid=27869 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4526.968772][ T29] audit: type=1400 audit(4526.860:72370): avc: denied { search } for pid=27869 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4526.969874][ T29] audit: type=1400 audit(4526.860:72371): avc: denied { search } for pid=27869 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.156167][ T29] kauditd_printk_skb: 286 callbacks suppressed [ 4531.156561][ T29] audit: type=1400 audit(4531.060:72658): avc: denied { search } for pid=27884 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.159418][ T29] audit: type=1400 audit(4531.060:72659): avc: denied { search } for pid=27884 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.163327][ T29] audit: type=1400 audit(4531.070:72660): avc: denied { search } for pid=27884 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.165932][ T29] audit: type=1400 audit(4531.070:72661): avc: denied { search } for pid=27884 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.191330][ T29] audit: type=1400 audit(4531.090:72662): avc: denied { search } for pid=27884 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.193269][ T29] audit: type=1400 audit(4531.090:72663): avc: denied { search } for pid=27884 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.194834][ T29] audit: type=1400 audit(4531.090:72664): avc: denied { search } for pid=27884 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.196404][ T29] audit: type=1400 audit(4531.090:72665): avc: denied { read open } for pid=27884 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.198205][ T29] audit: type=1400 audit(4531.090:72666): avc: denied { getattr } for pid=27884 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4531.217752][ T29] audit: type=1400 audit(4531.120:72667): avc: denied { search } for pid=27884 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4535.687111][T27442] veth0_vlan: entered promiscuous mode [ 4535.851110][T27442] veth1_vlan: entered promiscuous mode [ 4536.369552][T27442] veth0_macvtap: entered promiscuous mode [ 4536.485217][T27442] veth1_macvtap: entered promiscuous mode [ 4536.693791][ T29] kauditd_printk_skb: 236 callbacks suppressed [ 4536.694149][ T29] audit: type=1400 audit(4536.600:72904): avc: denied { search } for pid=27900 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4536.704353][ T29] audit: type=1400 audit(4536.610:72905): avc: denied { search } for pid=27900 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4536.705296][ T29] audit: type=1400 audit(4536.610:72906): avc: denied { search } for pid=27900 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4536.707820][ T29] audit: type=1400 audit(4536.610:72907): avc: denied { getattr } for pid=27900 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=134 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4536.747398][ T29] audit: type=1400 audit(4536.650:72908): avc: denied { search } for pid=27900 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4536.791789][ T29] audit: type=1400 audit(4536.690:72909): avc: denied { search } for pid=27900 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4536.792198][ T29] audit: type=1400 audit(4536.690:72910): avc: denied { search } for pid=27900 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4536.792405][ T29] audit: type=1400 audit(4536.690:72911): avc: denied { search } for pid=27900 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4536.811876][ T29] audit: type=1400 audit(4536.710:72912): avc: denied { remove_name search } for pid=27900 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=134 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4536.812333][ T29] audit: type=1400 audit(4536.710:72913): avc: denied { unlink } for pid=27900 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=134 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4537.178998][T27529] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 4537.185407][T27529] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 4537.193456][T27529] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 4537.193842][T27529] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 4541.776168][ T29] kauditd_printk_skb: 278 callbacks suppressed [ 4541.776486][ T29] audit: type=1400 audit(4541.680:73192): avc: denied { read } for pid=27920 comm="syz.1.5890" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4541.776696][ T29] audit: type=1400 audit(4541.680:73193): avc: denied { read open } for pid=27920 comm="syz.1.5890" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4541.800106][ T29] audit: type=1400 audit(4541.700:73194): avc: denied { create } for pid=27920 comm="syz.1.5890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4541.816729][ T29] audit: type=1400 audit(4541.720:73195): avc: denied { write } for pid=27920 comm="syz.1.5890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4541.845375][ T29] audit: type=1400 audit(4541.750:73196): avc: denied { read } for pid=27920 comm="syz.1.5890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4541.954992][ T29] audit: type=1400 audit(4541.860:73197): avc: denied { write } for pid=27918 comm="syz.0.5896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4542.234540][ T29] audit: type=1400 audit(4542.140:73198): avc: denied { search } for pid=27921 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4542.241584][ T29] audit: type=1400 audit(4542.140:73199): avc: denied { search } for pid=27921 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4542.242748][ T29] audit: type=1400 audit(4542.140:73200): avc: denied { search } for pid=27921 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4542.326763][ T29] audit: type=1400 audit(4542.230:73201): avc: denied { search } for pid=27902 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4547.047242][ T29] kauditd_printk_skb: 266 callbacks suppressed [ 4547.047645][ T29] audit: type=1400 audit(4546.950:73468): avc: denied { create } for pid=27945 comm="syz.1.5899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4547.101329][ T29] audit: type=1400 audit(4547.000:73469): avc: denied { write } for pid=27945 comm="syz.1.5899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4547.101823][ T29] audit: type=1400 audit(4547.000:73470): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4547.102120][ T29] audit: type=1400 audit(4547.000:73471): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4547.119104][ T29] audit: type=1400 audit(4547.020:73472): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4547.129354][ T29] audit: type=1400 audit(4547.030:73473): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4547.151582][ T29] audit: type=1400 audit(4547.050:73474): avc: denied { read } for pid=27945 comm="syz.1.5899" dev="nsfs" ino=4026532713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4547.152024][ T29] audit: type=1400 audit(4547.050:73475): avc: denied { read open } for pid=27945 comm="syz.1.5899" path="net:[4026532713]" dev="nsfs" ino=4026532713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4547.152105][ T29] audit: type=1400 audit(4547.050:73476): avc: denied { create } for pid=27945 comm="syz.1.5899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4547.163786][ T29] audit: type=1400 audit(4547.070:73477): avc: denied { read write } for pid=23482 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4548.304078][T27953] FAULT_INJECTION: forcing a failure. [ 4548.304078][T27953] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4548.304654][T27953] CPU: 0 UID: 0 PID: 27953 Comm: syz.0.5901 Not tainted syzkaller #0 PREEMPT [ 4548.304771][T27953] Hardware name: ARM-Versatile Express [ 4548.304803][T27953] Call trace: [ 4548.304844][T27953] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4548.305033][T27953] r7:dfd15e20 r6:00000000 r5:60000013 r4:82252544 [ 4548.305070][T27953] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 4548.305187][T27953] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 4548.305467][T27953] r5:840a0000 r4:8294f590 [ 4548.305506][T27953] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 4548.305631][T27953] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 4548.305880][T27953] r8:00008080 r7:dfd15e20 r6:200003c0 r5:00000000 r4:dfd15f20 [ 4548.305980][T27953] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 4548.306081][T27953] [<80986ef4>] (should_fail_usercopy) from [<815592d8>] (copy_msghdr_from_user+0x50/0x130) [ 4548.306225][T27953] [<81559288>] (copy_msghdr_from_user) from [<81559430>] (___sys_sendmsg+0x78/0xd0) [ 4548.306282][T27953] r8:00008080 r7:00000000 r6:8552e500 r5:dfd15f20 r4:dfd15e64 [ 4548.306328][T27953] [<815593b8>] (___sys_sendmsg) from [<815598ec>] (__sys_sendmsg+0x8c/0xe0) [ 4548.306978][T27953] r10:00000128 r9:840a0000 r8:84923840 r7:00008080 r6:200003c0 r5:84923841 [ 4548.307170][T27953] r4:00000003 [ 4548.307257][T27953] [<81559860>] (__sys_sendmsg) from [<81559954>] (sys_sendmsg+0x14/0x18) [ 4548.307443][T27953] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 4548.307558][T27953] [<81559940>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4548.307608][T27953] Exception stack(0xdfd15fa8 to 0xdfd15ff0) [ 4548.307652][T27953] 5fa0: 00000000 00000000 00000003 200003c0 00008080 00000000 [ 4548.307824][T27953] 5fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fbd0bc [ 4548.307855][T27953] 5fe0: 76fbcec0 76fbceb0 000195a4 00132510 [ 4551.544970][T27969] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5906'. [ 4551.545226][T27969] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5906'. [ 4552.068774][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 4552.069119][ T29] audit: type=1400 audit(4551.970:73606): avc: denied { write } for pid=27967 comm="syz.1.5907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4552.554393][ T29] audit: type=1400 audit(4552.460:73607): avc: denied { read } for pid=27967 comm="syz.1.5907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4552.567418][ T29] audit: type=1400 audit(4552.470:73608): avc: denied { ioctl } for pid=27967 comm="syz.1.5907" path="socket:[67410]" dev="sockfs" ino=67410 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4552.595156][ T29] audit: type=1400 audit(4552.500:73609): avc: denied { read } for pid=27967 comm="syz.1.5907" path="socket:[67410]" dev="sockfs" ino=67410 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4552.611320][ T29] audit: type=1400 audit(4552.510:73610): avc: denied { read } for pid=27967 comm="syz.1.5907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4553.509420][ T29] audit: type=1400 audit(4553.410:73611): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4553.513948][ T29] audit: type=1400 audit(4553.420:73612): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4553.536048][ T29] audit: type=1400 audit(4553.440:73613): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4553.563703][ T29] audit: type=1400 audit(4553.470:73614): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4553.601196][ T29] audit: type=1400 audit(4553.500:73615): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4557.115746][ T29] kauditd_printk_skb: 96 callbacks suppressed [ 4557.116177][ T29] audit: type=1400 audit(4557.020:73712): avc: denied { create } for pid=27990 comm="syz.1.5911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4557.158935][ T29] audit: type=1400 audit(4557.060:73713): avc: denied { write } for pid=27990 comm="syz.1.5911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4557.213304][ T29] audit: type=1400 audit(4557.120:73714): avc: denied { write } for pid=27990 comm="syz.1.5911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4557.270337][ T29] audit: type=1400 audit(4557.170:73715): avc: denied { create } for pid=27992 comm="syz.0.5912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4557.293926][ T29] audit: type=1400 audit(4557.200:73716): avc: denied { create } for pid=27992 comm="syz.0.5912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4557.317478][ T29] audit: type=1400 audit(4557.220:73717): avc: denied { write } for pid=27992 comm="syz.0.5912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4557.321704][T27993] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=27993 comm=syz.0.5912 [ 4557.336532][ T29] audit: type=1400 audit(4557.240:73718): avc: denied { write } for pid=27992 comm="syz.0.5912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4557.393933][ T29] audit: type=1400 audit(4557.300:73719): avc: denied { write } for pid=27992 comm="syz.0.5912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4557.747693][ T29] audit: type=1400 audit(4557.650:73720): avc: denied { create } for pid=27990 comm="syz.1.5911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4557.764802][ T29] audit: type=1400 audit(4557.670:73721): avc: denied { setopt } for pid=27990 comm="syz.1.5911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4561.789127][T28005] binder: 28004:28005 ioctl 400c620e 20000200 returned -22 [ 4561.822260][T28005] binder: 28004:28005 ioctl 8010661b 20000240 returned -22 [ 4562.151513][ T29] kauditd_printk_skb: 108 callbacks suppressed [ 4562.151846][ T29] audit: type=1400 audit(4562.050:73830): avc: denied { ioctl } for pid=28004 comm="syz.1.5917" path="/dev/vcsu1" dev="devtmpfs" ino=17 ioctlcmd=0x4c04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4562.176941][ T29] audit: type=1400 audit(4562.080:73831): avc: denied { create } for pid=28004 comm="syz.1.5917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4562.211191][ T29] audit: type=1400 audit(4562.110:73832): avc: denied { write } for pid=28004 comm="syz.1.5917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4562.216424][ T29] audit: type=1400 audit(4562.120:73833): avc: denied { read } for pid=28004 comm="syz.1.5917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4562.219415][ T29] audit: type=1400 audit(4562.120:73834): avc: denied { read } for pid=28004 comm="syz.1.5917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4562.338317][ T29] audit: type=1400 audit(4562.220:73835): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4562.340383][ T29] audit: type=1400 audit(4562.230:73836): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4562.343847][ T29] audit: type=1400 audit(4562.240:73837): avc: denied { recv } for pid=28007 comm="syz.1.5917" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4562.382231][ T29] audit: type=1400 audit(4562.270:73838): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4562.393100][ T29] audit: type=1400 audit(4562.300:73839): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4566.135255][T28024] ======================================================= [ 4566.135255][T28024] WARNING: The mand mount option has been deprecated and [ 4566.135255][T28024] and is ignored by this kernel. Remove the mand [ 4566.135255][T28024] option from the mount to silence this warning. [ 4566.135255][T28024] ======================================================= [ 4567.177247][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 4567.177846][ T29] audit: type=1400 audit(4567.080:74001): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4567.177975][ T29] audit: type=1400 audit(4567.080:74002): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4567.191581][ T29] audit: type=1400 audit(4567.090:74003): avc: denied { read write } for pid=27442 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4567.192058][ T29] audit: type=1400 audit(4567.090:74004): avc: denied { read write open } for pid=27442 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4567.192291][ T29] audit: type=1400 audit(4567.090:74005): avc: denied { ioctl } for pid=27442 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4567.505461][ T29] audit: type=1400 audit(4567.410:74006): avc: denied { create } for pid=28028 comm="syz.0.5927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4567.513582][ T29] audit: type=1400 audit(4567.420:74007): avc: denied { ioctl } for pid=28028 comm="syz.0.5927" path="socket:[67549]" dev="sockfs" ino=67549 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4567.520303][ T29] audit: type=1400 audit(4567.420:74008): avc: denied { bind } for pid=28028 comm="syz.0.5927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4567.527850][ T29] audit: type=1400 audit(4567.430:74009): avc: denied { write } for pid=28028 comm="syz.0.5927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4567.534506][ T29] audit: type=1400 audit(4567.440:74010): avc: denied { read } for pid=28028 comm="syz.0.5927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4570.765174][T28034] FAULT_INJECTION: forcing a failure. [ 4570.765174][T28034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4570.765418][T28034] CPU: 1 UID: 0 PID: 28034 Comm: syz.0.5929 Not tainted syzkaller #0 PREEMPT [ 4570.765471][T28034] Hardware name: ARM-Versatile Express [ 4570.765486][T28034] Call trace: [ 4570.765510][T28034] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4570.765572][T28034] r7:ea889e20 r6:00000000 r5:60000013 r4:82252544 [ 4570.765584][T28034] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 4570.765611][T28034] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 4570.765640][T28034] r5:84e89800 r4:8294f590 [ 4570.765648][T28034] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 4570.765683][T28034] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 4570.765802][T28034] r8:00000000 r7:ea889e20 r6:20000300 r5:00000000 r4:ea889f20 [ 4570.765832][T28034] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 4570.765898][T28034] [<80986ef4>] (should_fail_usercopy) from [<815592d8>] (copy_msghdr_from_user+0x50/0x130) [ 4570.765966][T28034] [<81559288>] (copy_msghdr_from_user) from [<81559430>] (___sys_sendmsg+0x78/0xd0) [ 4570.766002][T28034] r8:00000000 r7:00000000 r6:837fd180 r5:ea889f20 r4:ea889e64 [ 4570.766052][T28034] [<815593b8>] (___sys_sendmsg) from [<815598ec>] (__sys_sendmsg+0x8c/0xe0) [ 4570.766153][T28034] r10:00000128 r9:84e89800 r8:8531fa80 r7:00000000 r6:20000300 r5:8531fa81 [ 4570.766282][T28034] r4:00000003 [ 4570.766620][T28034] [<81559860>] (__sys_sendmsg) from [<81559954>] (sys_sendmsg+0x14/0x18) [ 4570.766757][T28034] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 4570.766965][T28034] [<81559940>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4570.767001][T28034] Exception stack(0xea889fa8 to 0xea889ff0) [ 4570.767024][T28034] 9fa0: 00000000 00000000 00000003 20000300 00000000 00000000 [ 4570.767044][T28034] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fbd0bc [ 4570.767090][T28034] 9fe0: 76fbcec0 76fbceb0 000195a4 00132510 [ 4572.662932][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 4572.663363][ T29] audit: type=1400 audit(4572.570:74069): avc: denied { create } for pid=28037 comm="syz.0.5931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4572.694809][ T29] audit: type=1400 audit(4572.600:74070): avc: denied { write } for pid=28037 comm="syz.0.5931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4572.821266][ T29] audit: type=1400 audit(4572.710:74071): avc: denied { read } for pid=28037 comm="syz.0.5931" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4572.851582][ T29] audit: type=1400 audit(4572.750:74072): avc: denied { read open } for pid=28037 comm="syz.0.5931" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4573.198270][ T29] audit: type=1400 audit(4573.100:74073): avc: denied { ioctl } for pid=28037 comm="syz.0.5931" path="/dev/mixer" dev="devtmpfs" ino=727 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4573.406455][ T29] audit: type=1400 audit(4573.310:74074): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4573.406946][ T29] audit: type=1400 audit(4573.310:74075): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4573.456196][ T29] audit: type=1400 audit(4573.360:74076): avc: denied { recv } for pid=28030 comm="syz.1.5928" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4573.503345][ T29] audit: type=1400 audit(4573.400:74077): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4573.531582][ T29] audit: type=1400 audit(4573.420:74078): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4578.194431][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 4578.195364][ T29] audit: type=1400 audit(4578.100:74125): avc: denied { create } for pid=28045 comm="syz.0.5934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4578.205850][ T29] audit: type=1400 audit(4578.110:74126): avc: denied { write } for pid=28045 comm="syz.0.5934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4578.272291][ T29] audit: type=1400 audit(4578.170:74127): avc: denied { create } for pid=28045 comm="syz.0.5934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4578.278807][ T29] audit: type=1400 audit(4578.180:74128): avc: denied { write } for pid=28045 comm="syz.0.5934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4578.300205][ T29] audit: type=1400 audit(4578.200:74129): avc: denied { read } for pid=28045 comm="syz.0.5934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4578.372207][ T29] audit: type=1400 audit(4578.270:74130): avc: denied { accept } for pid=28045 comm="syz.0.5934" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 4578.501254][ T29] audit: type=1400 audit(4578.390:74131): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4578.501578][ T29] audit: type=1400 audit(4578.400:74132): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4578.531751][ T29] audit: type=1400 audit(4578.420:74133): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4578.532067][ T29] audit: type=1400 audit(4578.430:74134): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4580.014418][T28056] FAULT_INJECTION: forcing a failure. [ 4580.014418][T28056] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4580.014640][T28056] CPU: 1 UID: 0 PID: 28056 Comm: syz.1.5937 Not tainted syzkaller #0 PREEMPT [ 4580.014687][T28056] Hardware name: ARM-Versatile Express [ 4580.014702][T28056] Call trace: [ 4580.014723][T28056] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4580.014777][T28056] r7:eabade20 r6:00000000 r5:60000013 r4:82252544 [ 4580.014786][T28056] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 4580.014822][T28056] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 4580.014849][T28056] r5:84e89800 r4:8294f590 [ 4580.014856][T28056] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 4580.014887][T28056] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 4580.014915][T28056] r8:24000004 r7:eabade20 r6:20000240 r5:00000000 r4:eabadf20 [ 4580.014923][T28056] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 4580.014944][T28056] [<80986ef4>] (should_fail_usercopy) from [<815592d8>] (copy_msghdr_from_user+0x50/0x130) [ 4580.014970][T28056] [<81559288>] (copy_msghdr_from_user) from [<81559430>] (___sys_sendmsg+0x78/0xd0) [ 4580.015000][T28056] r8:24000004 r7:00000000 r6:837fcc80 r5:eabadf20 r4:eabade64 [ 4580.015008][T28056] [<815593b8>] (___sys_sendmsg) from [<815598ec>] (__sys_sendmsg+0x8c/0xe0) [ 4580.015039][T28056] r10:00000128 r9:84e89800 r8:8531fb40 r7:24000004 r6:20000240 r5:8531fb41 [ 4580.015199][T28056] r4:00000003 [ 4580.015254][T28056] [<81559860>] (__sys_sendmsg) from [<81559954>] (sys_sendmsg+0x14/0x18) [ 4580.015360][T28056] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 4580.015607][T28056] [<81559940>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4580.015804][T28056] Exception stack(0xeabadfa8 to 0xeabadff0) [ 4580.015841][T28056] dfa0: 00000000 00000000 00000003 20000240 24000004 00000000 [ 4580.015988][T28056] dfc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe40bc [ 4580.016060][T28056] dfe0: 76fe3ec0 76fe3eb0 000195a4 00132510 [ 4583.340225][ T29] kauditd_printk_skb: 141 callbacks suppressed [ 4583.340522][ T29] audit: type=1400 audit(4583.240:74276): avc: denied { create } for pid=28070 comm="syz.1.5943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4583.352676][ T29] audit: type=1400 audit(4583.260:74277): avc: denied { write } for pid=28070 comm="syz.1.5943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4583.354834][ T29] audit: type=1400 audit(4583.260:74278): avc: denied { read } for pid=28070 comm="syz.1.5943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4583.406619][ T29] audit: type=1400 audit(4583.310:74279): avc: denied { read } for pid=28070 comm="syz.1.5943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4583.434027][ T29] audit: type=1400 audit(4583.340:74280): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4583.434506][ T29] audit: type=1400 audit(4583.340:74281): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4583.440999][ T29] audit: type=1400 audit(4583.340:74282): avc: denied { recv } for pid=2817 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4583.466054][ T29] audit: type=1400 audit(4583.370:74283): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4583.511437][ T29] audit: type=1400 audit(4583.390:74284): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4583.547810][ T29] audit: type=1400 audit(4583.450:74285): avc: denied { recv } for pid=24236 comm="syz.0.4950" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4588.343073][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 4588.343460][ T29] audit: type=1400 audit(4588.250:74447): avc: denied { ioctl } for pid=28089 comm="syz.1.5952" path="/dev/sequencer" dev="devtmpfs" ino=720 ioctlcmd=0x6418 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4588.369048][ T29] audit: type=1400 audit(4588.270:74448): avc: denied { ioctl open } for pid=28088 comm="syz.0.5951" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4588.388636][ T29] audit: type=1400 audit(4588.270:74449): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4588.389166][ T29] audit: type=1400 audit(4588.280:74450): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4588.389470][ T29] audit: type=1400 audit(4588.280:74451): avc: denied { recv } for pid=26707 comm="syz.0.5680" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4588.389652][ T29] audit: type=1400 audit(4588.290:74452): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4588.389840][ T29] audit: type=1400 audit(4588.290:74453): avc: denied { ioctl } for pid=28088 comm="syz.0.5951" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x540c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4588.396021][ T29] audit: type=1400 audit(4588.300:74454): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4588.404003][ T29] audit: type=1400 audit(4588.310:74455): avc: denied { create } for pid=28088 comm="syz.0.5951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4588.439074][ T29] audit: type=1400 audit(4588.340:74456): avc: denied { recv } for pid=26707 comm="syz.0.5680" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4593.616059][ T29] kauditd_printk_skb: 220 callbacks suppressed [ 4593.616394][ T29] audit: type=1400 audit(4593.520:74677): avc: denied { read } for pid=28127 comm="syz.1.5965" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4593.618725][ T29] audit: type=1400 audit(4593.520:74678): avc: denied { read open } for pid=28127 comm="syz.1.5965" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4593.638111][ T29] audit: type=1400 audit(4593.540:74679): avc: denied { ioctl } for pid=28127 comm="syz.1.5965" path="/dev/mixer" dev="devtmpfs" ino=727 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4593.652719][T28128] FAULT_INJECTION: forcing a failure. [ 4593.652719][T28128] name failslab, interval 1, probability 0, space 0, times 0 [ 4593.653297][T28128] CPU: 1 UID: 0 PID: 28128 Comm: syz.1.5965 Not tainted syzkaller #0 PREEMPT [ 4593.653391][T28128] Hardware name: ARM-Versatile Express [ 4593.653416][T28128] Call trace: [ 4593.653454][T28128] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4593.653594][T28128] r7:00000c40 r6:00000000 r5:60000013 r4:82252544 [ 4593.653683][T28128] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 4593.653887][T28128] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 4593.654007][T28128] r5:84e89800 r4:82918810 [ 4593.654055][T28128] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 4593.654237][T28128] [<80986cb4>] (should_fail_ex) from [<8052efdc>] (should_failslab+0x6c/0x94) [ 4593.654381][T28128] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 4593.654483][T28128] [<8052ef70>] (should_failslab) from [<8050a4c0>] (__kmalloc_noprof+0x9c/0x568) [ 4593.654580][T28128] [<8050a424>] (__kmalloc_noprof) from [<807d3258>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 4593.654763][T28128] r10:84e89800 r9:8339cc00 r8:00000000 r7:8543a880 r6:8531f328 r5:00001000 [ 4593.654886][T28128] r4:00000000 [ 4593.654990][T28128] [<807d321c>] (tomoyo_realpath_from_path) from [<807cf39c>] (tomoyo_path_number_perm+0xcc/0x22c) [ 4593.655106][T28128] r10:84e89800 r9:00000000 r8:8531f300 r7:00008904 r6:00000004 r5:81cd65c8 [ 4593.655174][T28128] r4:8531f328 r3:826c1240 [ 4593.655313][T28128] [<807cf2d0>] (tomoyo_path_number_perm) from [<807d3c7c>] (tomoyo_file_ioctl+0x1c/0x20) [ 4593.655533][T28128] r9:00000004 r8:8531f300 r7:20000080 r6:20000080 r5:00008904 r4:8531f300 [ 4593.655552][T28128] [<807d3c60>] (tomoyo_file_ioctl) from [<80780540>] (security_file_ioctl+0x64/0x1e4) [ 4593.655658][T28128] [<807804dc>] (security_file_ioctl) from [<805787d4>] (sys_ioctl+0x4c/0xba0) [ 4593.655814][T28128] r7:20000080 r6:8531f301 r5:00000000 r4:00008904 [ 4593.655876][T28128] [<80578788>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4593.656011][T28128] Exception stack(0xeb115fa8 to 0xeb115ff0) [ 4593.656079][T28128] 5fa0: 00000000 00000000 00000004 00008904 20000080 00000000 [ 4593.656164][T28128] 5fc0: 00000000 00000000 001304b8 00000036 00300000 00000000 00006364 76fe40bc [ 4593.656217][T28128] 5fe0: 76fe3ec0 76fe3eb0 000195a4 00132510 [ 4593.656322][T28128] r10:00000036 r9:84e89800 r8:8020029c r7:00000036 r6:001304b8 r5:00000000 [ 4593.656385][T28128] r4:00000000 [ 4593.656649][T28128] ERROR: Out of memory at tomoyo_realpath_from_path. [ 4593.721546][ T29] audit: type=1400 audit(4593.600:74680): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4593.721988][ T29] audit: type=1400 audit(4593.620:74681): avc: denied { recv } for pid=26707 comm="syz.0.5680" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4593.752722][ T29] audit: type=1400 audit(4593.650:74682): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4593.786073][ T29] audit: type=1400 audit(4593.690:74683): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4593.808483][ T29] audit: type=1400 audit(4593.710:74684): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4593.875032][ T29] audit: type=1400 audit(4593.780:74685): avc: denied { recv } for pid=26707 comm="syz.0.5680" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4593.878258][ T29] audit: type=1400 audit(4593.780:74686): avc: denied { recv } for pid=26707 comm="syz.0.5680" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4598.649905][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 4598.650418][ T29] audit: type=1400 audit(4598.550:74754): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4598.651700][ T29] audit: type=1400 audit(4598.550:74755): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4598.660196][ T29] audit: type=1400 audit(4598.560:74756): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4598.679360][ T29] audit: type=1400 audit(4598.580:74757): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4598.707226][ T29] audit: type=1400 audit(4598.600:74758): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4598.722542][ T29] audit: type=1400 audit(4598.620:74759): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4598.722987][ T29] audit: type=1400 audit(4598.630:74760): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4598.738078][ T29] audit: type=1400 audit(4598.640:74761): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4598.748886][ T29] audit: type=1400 audit(4598.650:74762): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4598.804859][ T29] audit: type=1400 audit(4598.700:74763): avc: denied { read write } for pid=23482 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4603.706729][ T29] kauditd_printk_skb: 187 callbacks suppressed [ 4603.707432][ T29] audit: type=1400 audit(4603.610:74951): avc: denied { mac_admin } for pid=28175 comm="syz.1.5979" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4603.718377][T28176] SELinux: Context system_u:object_r:apt_var_cache_t:s0 is not valid (left unmapped). [ 4603.721596][ T29] audit: type=1400 audit(4603.620:74952): avc: denied { relabelto } for pid=28175 comm="syz.1.5979" name="vcsu9" dev="devtmpfs" ino=831 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:apt_var_cache_t:s0" [ 4603.744588][ T29] audit: type=1400 audit(4603.650:74953): avc: denied { associate } for pid=28175 comm="syz.1.5979" name="vcsu9" dev="devtmpfs" ino=831 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 srawcon="system_u:object_r:apt_var_cache_t:s0" [ 4603.777710][ T29] audit: type=1400 audit(4603.680:74954): avc: denied { bind } for pid=28175 comm="syz.1.5979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4603.782821][ T29] audit: type=1400 audit(4603.690:74955): avc: denied { create } for pid=28175 comm="syz.1.5979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4603.787673][ T29] audit: type=1400 audit(4603.690:74956): avc: denied { write } for pid=28175 comm="syz.1.5979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4603.816590][ T29] audit: type=1400 audit(4603.720:74957): avc: denied { write } for pid=28175 comm="syz.1.5979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4604.067115][ T29] audit: type=1400 audit(4603.970:74958): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4604.070320][ T29] audit: type=1400 audit(4603.970:74959): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4604.097051][ T29] audit: type=1400 audit(4604.000:74960): avc: denied { recv } for pid=23482 comm="syz-executor" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4609.099087][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 4609.099479][ T29] audit: type=1400 audit(4608.990:75088): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4609.099693][ T29] audit: type=1400 audit(4608.990:75089): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4609.099759][ T29] audit: type=1400 audit(4609.000:75090): avc: denied { read } for pid=28194 comm="syz.1.5984" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4609.099804][ T29] audit: type=1400 audit(4609.000:75091): avc: denied { read open } for pid=28194 comm="syz.1.5984" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4609.112558][ T29] audit: type=1400 audit(4609.020:75092): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4609.119824][ T29] audit: type=1400 audit(4609.020:75094): avc: denied { ioctl } for pid=28194 comm="syz.1.5984" path="/dev/mixer" dev="devtmpfs" ino=727 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4609.120328][ T29] audit: type=1400 audit(4609.020:75093): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4609.149723][ T29] audit: type=1400 audit(4609.050:75095): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4609.181500][ T29] audit: type=1400 audit(4609.080:75096): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4609.191526][ T29] audit: type=1400 audit(4609.090:75097): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4612.243198][T28208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28208 comm=syz.0.5988 [ 4614.124816][ T29] kauditd_printk_skb: 152 callbacks suppressed [ 4614.125280][ T29] audit: type=1400 audit(4614.020:75250): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4614.125551][ T29] audit: type=1400 audit(4614.030:75251): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4614.158092][ T29] audit: type=1400 audit(4614.050:75252): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4614.160536][ T29] audit: type=1400 audit(4614.060:75253): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4614.176225][ T29] audit: type=1400 audit(4614.080:75254): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4614.193808][ T29] audit: type=1400 audit(4614.090:75255): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4614.196039][ T29] audit: type=1400 audit(4614.090:75256): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4614.212313][ T29] audit: type=1400 audit(4614.110:75257): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4614.215268][ T29] audit: type=1400 audit(4614.120:75258): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4614.251919][ T29] audit: type=1400 audit(4614.130:75259): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4616.936462][T28240] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28240 comm=syz.1.5996 [ 4619.136589][ T29] kauditd_printk_skb: 191 callbacks suppressed [ 4619.137006][ T29] audit: type=1400 audit(4619.040:75451): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4619.147014][ T29] audit: type=1400 audit(4619.050:75452): avc: denied { read write } for pid=23482 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4619.151684][ T29] audit: type=1400 audit(4619.060:75453): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4619.154401][ T29] audit: type=1400 audit(4619.060:75454): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4619.160385][ T29] audit: type=1400 audit(4619.060:75455): avc: denied { read write open } for pid=23482 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4619.177448][ T29] audit: type=1400 audit(4619.080:75456): avc: denied { ioctl } for pid=23482 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4619.189749][ T29] audit: type=1400 audit(4619.090:75457): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4619.190069][ T29] audit: type=1400 audit(4619.090:75458): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4619.325371][ T29] audit: type=1400 audit(4619.230:75459): avc: denied { create } for pid=28247 comm="syz.1.6002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4619.407662][ T29] audit: type=1400 audit(4619.310:75460): avc: denied { write } for pid=28247 comm="syz.1.6002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4624.147148][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 4624.147529][ T29] audit: type=1400 audit(4624.050:75526): avc: denied { write } for pid=28258 comm="syz.0.6005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4624.476911][ T29] audit: type=1400 audit(4624.380:75527): avc: denied { create } for pid=28260 comm="syz.1.6006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4624.506291][ T29] audit: type=1400 audit(4624.400:75528): avc: denied { map } for pid=28260 comm="syz.1.6006" path="socket:[68523]" dev="sockfs" ino=68523 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4624.535367][ T29] audit: type=1400 audit(4624.440:75529): avc: denied { read } for pid=28260 comm="syz.1.6006" path="socket:[68523]" dev="sockfs" ino=68523 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 4624.567092][ T29] audit: type=1400 audit(4624.470:75530): avc: denied { create } for pid=28260 comm="syz.1.6006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4624.631154][ T29] audit: type=1400 audit(4624.530:75531): avc: denied { write } for pid=28260 comm="syz.1.6006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4624.677091][ T29] audit: type=1400 audit(4624.580:75532): avc: denied { write } for pid=28260 comm="syz.1.6006" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4624.861327][ T29] audit: type=1400 audit(4624.740:75533): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4624.861824][ T29] audit: type=1400 audit(4624.750:75534): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4624.888924][ T29] audit: type=1400 audit(4624.790:75535): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4629.476353][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 4629.476805][ T29] audit: type=1400 audit(4629.380:75610): avc: denied { create } for pid=28258 comm="syz.0.6005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4629.931255][ T29] audit: type=1400 audit(4629.830:75611): avc: denied { create } for pid=28274 comm="syz.1.6011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4630.183881][ T29] audit: type=1400 audit(4630.090:75612): avc: denied { write } for pid=28274 comm="syz.1.6011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4630.689890][ T29] audit: type=1400 audit(4630.590:75613): avc: denied { write } for pid=28258 comm="syz.0.6005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4631.567109][ T29] audit: type=1400 audit(4631.470:75614): avc: denied { read } for pid=28258 comm="syz.0.6005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4631.677355][ T29] audit: type=1400 audit(4631.580:75615): avc: denied { write } for pid=28274 comm="syz.1.6011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4631.731872][ T29] audit: type=1400 audit(4631.630:75616): avc: denied { read } for pid=28274 comm="syz.1.6011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4631.747472][ T29] audit: type=1400 audit(4631.650:75617): avc: denied { read } for pid=28258 comm="syz.0.6005" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4631.856730][ T29] audit: type=1400 audit(4631.760:75618): avc: denied { write } for pid=28274 comm="syz.1.6011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4631.927783][ T29] audit: type=1400 audit(4631.830:75619): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4634.534858][ T29] kauditd_printk_skb: 93 callbacks suppressed [ 4634.535284][ T29] audit: type=1400 audit(4634.440:75713): avc: denied { create } for pid=28286 comm="syz.0.6015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4634.569609][ T29] audit: type=1400 audit(4634.470:75714): avc: denied { write } for pid=28286 comm="syz.0.6015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4634.603162][ T29] audit: type=1400 audit(4634.510:75715): avc: denied { write } for pid=28286 comm="syz.0.6015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4634.747697][ T29] audit: type=1400 audit(4634.650:75716): avc: denied { create } for pid=28288 comm="syz.1.6016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 4634.778331][ T29] audit: type=1400 audit(4634.680:75717): avc: denied { read } for pid=28288 comm="syz.1.6016" name="nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4634.794397][ T29] audit: type=1400 audit(4634.700:75718): avc: denied { read open } for pid=28288 comm="syz.1.6016" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4634.866606][ T29] audit: type=1400 audit(4634.770:75719): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4634.891972][ T29] audit: type=1400 audit(4634.770:75720): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4634.892199][ T29] audit: type=1400 audit(4634.780:75721): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4634.901345][ T29] audit: type=1400 audit(4634.800:75722): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4636.153253][T28296] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28296 comm=syz.0.6019 [ 4639.601456][ T29] kauditd_printk_skb: 184 callbacks suppressed [ 4639.601704][ T29] audit: type=1400 audit(4639.500:75907): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4639.606138][ T29] audit: type=1400 audit(4639.510:75908): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4639.625655][ T29] audit: type=1400 audit(4639.530:75909): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4639.657788][ T29] audit: type=1400 audit(4639.560:75910): avc: denied { recv } for pid=24477 comm="syz.0.5024" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4639.658137][ T29] audit: type=1400 audit(4639.560:75911): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4639.691860][ T29] audit: type=1400 audit(4639.590:75912): avc: denied { recv } for pid=24477 comm="syz.0.5024" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4639.693958][ T29] audit: type=1400 audit(4639.600:75913): avc: denied { recv } for pid=24477 comm="syz.0.5024" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4639.720474][ T29] audit: type=1400 audit(4639.620:75914): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4639.721232][ T29] audit: type=1400 audit(4639.620:75915): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4639.767128][ T29] audit: type=1400 audit(4639.670:75916): avc: denied { read write } for pid=27442 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4639.921790][T26717] hid (null): unknown global tag 0xc [ 4639.922992][T26717] hid (null): invalid report_size 1770935127 [ 4639.925289][T26717] hid (null): unknown global tag 0xc [ 4639.925607][T26717] hid (null): unknown global tag 0xe [ 4639.934149][T26717] hid_parser_main: 43 callbacks suppressed [ 4639.934389][T26717] hid-generic 0006:224B:0006.0005: unknown main item tag 0x6 [ 4639.934613][T26717] hid-generic 0006:224B:0006.0005: unknown main item tag 0x2 [ 4639.934773][T26717] hid-generic 0006:224B:0006.0005: unknown global tag 0xc [ 4639.934832][T26717] hid-generic 0006:224B:0006.0005: item 0 0 1 12 parsing failed [ 4639.935076][T26717] hid-generic 0006:224B:0006.0005: probe with driver hid-generic failed with error -22 [ 4642.256359][T28325] FAULT_INJECTION: forcing a failure. [ 4642.256359][T28325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 4642.256928][T28325] CPU: 1 UID: 0 PID: 28325 Comm: syz.1.6028 Not tainted syzkaller #0 PREEMPT [ 4642.257018][T28325] Hardware name: ARM-Versatile Express [ 4642.257057][T28325] Call trace: [ 4642.257100][T28325] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4642.257332][T28325] r7:ecfd9e20 r6:00000000 r5:60000013 r4:82252544 [ 4642.257486][T28325] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 4642.257726][T28325] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 4642.257795][T28325] r5:838c8000 r4:8294f590 [ 4642.257852][T28325] [<8021f8bc>] (dump_stack) from [<80986e78>] (should_fail_ex+0x1c4/0x228) [ 4642.258045][T28325] [<80986cb4>] (should_fail_ex) from [<80986ef0>] (should_fail+0x14/0x18) [ 4642.258440][T28325] r8:24004010 r7:ecfd9e20 r6:20000400 r5:00000000 r4:ecfd9f20 [ 4642.258565][T28325] [<80986edc>] (should_fail) from [<80986f10>] (should_fail_usercopy+0x1c/0x20) [ 4642.258623][T28325] [<80986ef4>] (should_fail_usercopy) from [<815592d8>] (copy_msghdr_from_user+0x50/0x130) [ 4642.258794][T28325] [<81559288>] (copy_msghdr_from_user) from [<81559430>] (___sys_sendmsg+0x78/0xd0) [ 4642.259033][T28325] r8:24004010 r7:00000000 r6:837fdb80 r5:ecfd9f20 r4:ecfd9e64 [ 4642.259238][T28325] [<815593b8>] (___sys_sendmsg) from [<815598ec>] (__sys_sendmsg+0x8c/0xe0) [ 4642.259349][T28325] r10:00000128 r9:838c8000 r8:8531fa80 r7:24004010 r6:20000400 r5:8531fa81 [ 4642.259478][T28325] r4:00000003 [ 4642.259545][T28325] [<81559860>] (__sys_sendmsg) from [<81559954>] (sys_sendmsg+0x14/0x18) [ 4642.259700][T28325] r8:8020029c r7:00000128 r6:001304b8 r5:00000000 r4:00000000 [ 4642.259827][T28325] [<81559940>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4642.260048][T28325] Exception stack(0xecfd9fa8 to 0xecfd9ff0) [ 4642.260092][T28325] 9fa0: 00000000 00000000 00000003 20000400 24004010 00000000 [ 4642.260313][T28325] 9fc0: 00000000 00000000 001304b8 00000128 00300000 00000000 00006364 76fe40bc [ 4642.260589][T28325] 9fe0: 76fe3ec0 76fe3eb0 000195a4 00132510 [ 4644.211945][T27225] usb 2-1: new full-speed USB device number 11 using dummy_hcd [ 4644.501378][T27225] usb 2-1: unable to read config index 0 descriptor/start: -71 [ 4644.502394][T27225] usb 2-1: can't read configurations, error -71 [ 4644.624551][ T29] kauditd_printk_skb: 123 callbacks suppressed [ 4644.624920][ T29] audit: type=1400 audit(4644.530:76040): avc: denied { create } for pid=28337 comm="syz.0.6032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4644.638112][ T29] audit: type=1400 audit(4644.540:76041): avc: denied { write } for pid=28337 comm="syz.0.6032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4644.654711][ T29] audit: type=1400 audit(4644.560:76042): avc: denied { ioctl } for pid=28337 comm="syz.0.6032" path="socket:[69699]" dev="sockfs" ino=69699 ioctlcmd=0x8934 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4644.667875][ T29] audit: type=1400 audit(4644.570:76043): avc: denied { write } for pid=28337 comm="syz.0.6032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4644.671663][ T29] audit: type=1400 audit(4644.570:76044): avc: denied { read } for pid=28337 comm="syz.0.6032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4644.678721][ T29] audit: type=1400 audit(4644.580:76045): avc: denied { read } for pid=28337 comm="syz.0.6032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4644.683279][ T29] audit: type=1400 audit(4644.590:76046): avc: denied { write } for pid=28337 comm="syz.0.6032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4644.702641][ T29] audit: type=1400 audit(4644.590:76047): avc: denied { create } for pid=28337 comm="syz.0.6032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4644.703278][ T29] audit: type=1400 audit(4644.600:76048): avc: denied { write } for pid=28337 comm="syz.0.6032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4644.703599][ T29] audit: type=1400 audit(4644.600:76049): avc: denied { module_request } for pid=28337 comm="syz.0.6032" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4649.664073][ T29] kauditd_printk_skb: 156 callbacks suppressed [ 4649.664568][ T29] audit: type=1400 audit(4649.570:76206): avc: denied { read write } for pid=23482 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4649.669786][ T29] audit: type=1400 audit(4649.570:76207): avc: denied { read write open } for pid=23482 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4649.687738][ T29] audit: type=1400 audit(4649.580:76208): avc: denied { ioctl } for pid=23482 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4650.112511][ T29] audit: type=1400 audit(4650.010:76209): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4650.112974][ T29] audit: type=1400 audit(4650.010:76210): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4650.131319][ T29] audit: type=1400 audit(4650.020:76211): avc: denied { recv } for pid=2817 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4650.144094][ T29] audit: type=1400 audit(4650.050:76212): avc: denied { read write } for pid=28367 comm="syz.0.6041" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4650.151124][ T29] audit: type=1400 audit(4650.050:76213): avc: denied { read write open } for pid=28367 comm="syz.0.6041" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4650.151374][ T29] audit: type=1400 audit(4650.050:76214): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4650.162352][ T29] audit: type=1400 audit(4650.060:76215): avc: denied { ioctl } for pid=28367 comm="syz.0.6041" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4651.061665][T27225] usb 1-1: new full-speed USB device number 28 using dummy_hcd [ 4651.453466][T27225] usb 1-1: not running at top speed; connect to a high speed hub [ 4651.552428][T27225] usb 1-1: config 167 has an invalid interface number: 20 but max is 0 [ 4651.553591][T27225] usb 1-1: config 167 has no interface number 0 [ 4651.554602][T27225] usb 1-1: config 167 interface 20 altsetting 9 endpoint 0x7 has invalid wMaxPacketSize 0 [ 4651.555665][T27225] usb 1-1: config 167 interface 20 altsetting 9 endpoint 0xB has invalid maxpacket 1023, setting to 64 [ 4651.556865][T27225] usb 1-1: config 167 interface 20 altsetting 9 has an invalid descriptor for endpoint zero, skipping [ 4651.557872][T27225] usb 1-1: config 167 interface 20 has no altsetting 0 [ 4651.652188][T27225] usb 1-1: New USB device found, idVendor=12d1, idProduct=14f1, bcdDevice=1a.67 [ 4651.653407][T27225] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4651.654487][T27225] usb 1-1: Product: 奌ᝉ떊렵丨嚕ቭ㼁ٕဨ皊ᩔ婂瞖餉჆擥៽ꃩ⽌곍礔搏妴쌆狸심罕鮘苃芜홝曧뀽潔瀵맺ᝋ櫵겹얮寣荁얿苠榲詴䛷朜䳽䖈⫀ⵠ슌偯雎聴㢘묜璐胊䟝랡譈灉縱 [ 4651.656534][T27225] usb 1-1: Manufacturer: ъ [ 4651.657615][T27225] usb 1-1: SerialNumber: ф [ 4652.291708][T28368] SELinux: Context system_u:object_r:ld_so_t:s0 is not valid (left unmapped). [ 4652.529566][T26717] usb 1-1: USB disconnect, device number 28 [ 4655.061348][ T29] kauditd_printk_skb: 173 callbacks suppressed [ 4655.061720][ T29] audit: type=1400 audit(4654.950:76389): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4655.061950][ T29] audit: type=1400 audit(4654.950:76390): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4655.088084][ T29] audit: type=1400 audit(4654.990:76391): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4655.090089][ T29] audit: type=1400 audit(4654.990:76392): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4655.115393][ T29] audit: type=1400 audit(4655.020:76393): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4655.153130][ T29] audit: type=1400 audit(4655.060:76394): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4655.155450][ T29] audit: type=1400 audit(4655.060:76395): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4655.230037][ T29] audit: type=1400 audit(4655.130:76396): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4655.235361][ T29] audit: type=1400 audit(4655.140:76397): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4655.262022][ T29] audit: type=1400 audit(4655.160:76398): avc: denied { read write } for pid=27442 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4660.079951][ T29] kauditd_printk_skb: 80 callbacks suppressed [ 4660.080375][ T29] audit: type=1400 audit(4659.980:76479): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4660.083319][ T29] audit: type=1400 audit(4659.990:76480): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4660.170657][ T29] audit: type=1400 audit(4660.070:76481): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4660.181518][ T29] audit: type=1400 audit(4660.080:76482): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4660.246858][ T29] audit: type=1400 audit(4660.150:76483): avc: denied { read write } for pid=27442 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4660.263987][ T29] audit: type=1400 audit(4660.150:76484): avc: denied { read write open } for pid=27442 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4660.291847][ T29] audit: type=1400 audit(4660.190:76485): avc: denied { ioctl } for pid=27442 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4660.450023][ T29] audit: type=1400 audit(4660.350:76486): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4660.454304][ T29] audit: type=1400 audit(4660.360:76487): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4660.491542][ T29] audit: type=1400 audit(4660.380:76488): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4665.516734][ T29] kauditd_printk_skb: 131 callbacks suppressed [ 4665.517303][ T29] audit: type=1400 audit(4665.420:76620): avc: denied { read } for pid=28441 comm="syz.0.6061" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4665.541660][ T29] audit: type=1400 audit(4665.440:76621): avc: denied { read open } for pid=28441 comm="syz.0.6061" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4665.570507][ T29] audit: type=1400 audit(4665.470:76622): avc: denied { write } for pid=28441 comm="syz.0.6061" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4665.581546][ T29] audit: type=1400 audit(4665.480:76623): avc: denied { write open } for pid=28441 comm="syz.0.6061" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4665.589499][ T29] audit: type=1400 audit(4665.490:76624): avc: denied { read } for pid=28440 comm="syz.1.6062" name="mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4665.589734][ T29] audit: type=1400 audit(4665.490:76625): avc: denied { read open } for pid=28440 comm="syz.1.6062" path="/dev/mixer" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4665.618174][ T29] audit: type=1400 audit(4665.520:76626): avc: denied { ioctl } for pid=28441 comm="syz.0.6061" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4665.640446][ T29] audit: type=1400 audit(4665.540:76627): avc: denied { ioctl } for pid=28440 comm="syz.1.6062" path="/dev/mixer" dev="devtmpfs" ino=727 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4665.653441][ T29] audit: type=1400 audit(4665.560:76628): avc: denied { ioctl } for pid=28441 comm="syz.0.6061" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4665.695446][ T29] audit: type=1400 audit(4665.600:76629): avc: denied { create } for pid=28440 comm="syz.1.6062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4670.813438][ T29] kauditd_printk_skb: 112 callbacks suppressed [ 4670.813675][ T29] audit: type=1400 audit(4670.720:76742): avc: denied { create } for pid=28463 comm="syz.0.6068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4670.882950][ T29] audit: type=1400 audit(4670.790:76743): avc: denied { write } for pid=28463 comm="syz.0.6068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4670.947509][ T29] audit: type=1400 audit(4670.850:76744): avc: denied { write } for pid=28463 comm="syz.0.6068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4670.997393][ T29] audit: type=1400 audit(4670.890:76745): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4670.997821][ T29] audit: type=1400 audit(4670.900:76746): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4671.008988][ T29] audit: type=1400 audit(4670.910:76747): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4671.027962][ T29] audit: type=1400 audit(4670.930:76748): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4671.062950][ T29] audit: type=1400 audit(4670.970:76749): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4671.087417][ T29] audit: type=1400 audit(4670.990:76750): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4671.087965][ T29] audit: type=1400 audit(4670.990:76751): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4675.823948][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 4675.824343][ T29] audit: type=1400 audit(4675.720:76838): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4675.824550][ T29] audit: type=1400 audit(4675.720:76839): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4675.888472][ T29] audit: type=1400 audit(4675.790:76840): avc: denied { create } for pid=28486 comm="syz.0.6073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4675.898196][ T29] audit: type=1400 audit(4675.800:76841): avc: denied { write } for pid=28486 comm="syz.0.6073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4675.931541][ T29] audit: type=1400 audit(4675.830:76842): avc: denied { write } for pid=28486 comm="syz.0.6073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4676.168401][ T29] audit: type=1400 audit(4676.070:76843): avc: denied { create } for pid=28488 comm="syz.1.6074" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4676.183232][ T29] audit: type=1400 audit(4676.090:76844): avc: denied { append } for pid=28488 comm="syz.1.6074" name="dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4676.188253][ T29] audit: type=1400 audit(4676.090:76845): avc: denied { append open } for pid=28488 comm="syz.1.6074" path="/dev/dlm-monitor" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4676.225139][ T29] audit: type=1400 audit(4676.130:76846): avc: denied { read } for pid=28488 comm="syz.1.6074" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4676.234638][ T29] audit: type=1400 audit(4676.140:76847): avc: denied { read open } for pid=28488 comm="syz.1.6074" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4677.423528][T28495] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=257 sclass=netlink_route_socket pid=28495 comm=syz.0.6076 [ 4680.834425][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 4680.834920][ T29] audit: type=1400 audit(4680.730:77009): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4680.835054][ T29] audit: type=1400 audit(4680.740:77010): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4680.847119][ T29] audit: type=1400 audit(4680.750:77011): avc: denied { read write } for pid=23482 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4680.881452][ T29] audit: type=1400 audit(4680.780:77012): avc: denied { read write open } for pid=23482 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4680.881958][ T29] audit: type=1400 audit(4680.780:77013): avc: denied { ioctl } for pid=23482 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4680.966053][ T29] audit: type=1400 audit(4680.870:77014): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4680.969532][ T29] audit: type=1400 audit(4680.870:77015): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4681.428815][ T29] audit: type=1400 audit(4681.330:77016): avc: denied { read } for pid=28509 comm="syz.1.6079" dev="nsfs" ino=4026532713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4681.444643][ T29] audit: type=1400 audit(4681.350:77017): avc: denied { read open } for pid=28509 comm="syz.1.6079" path="net:[4026532713]" dev="nsfs" ino=4026532713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4681.470082][ T29] audit: type=1400 audit(4681.370:77018): avc: denied { create } for pid=28509 comm="syz.1.6079" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4681.685825][T28512] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=28512 comm=syz.0.6080 [ 4685.961996][ T29] kauditd_printk_skb: 97 callbacks suppressed [ 4685.962369][ T29] audit: type=1400 audit(4685.860:77116): avc: denied { sys_module } for pid=28521 comm="syz.1.6084" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4685.962612][ T29] audit: type=1400 audit(4685.860:77117): avc: denied { module_request } for pid=28521 comm="syz.1.6084" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4686.221398][ T29] audit: type=1400 audit(4686.120:77118): avc: denied { allowed } for pid=28529 comm="syz.0.6086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4686.297323][ T29] audit: type=1400 audit(4686.200:77119): avc: denied { create } for pid=28529 comm="syz.0.6086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4686.329205][ T29] audit: type=1400 audit(4686.230:77120): avc: denied { module_request } for pid=28529 comm="syz.0.6086" kmod="net-pf-2-proto-215-type-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4686.701724][ T29] audit: type=1400 audit(4686.590:77121): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.702130][ T29] audit: type=1400 audit(4686.600:77122): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.711674][ T29] audit: type=1400 audit(4686.610:77123): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.712137][ T29] audit: type=1400 audit(4686.610:77124): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4686.834656][ T29] audit: type=1400 audit(4686.740:77125): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4691.527878][ T29] kauditd_printk_skb: 92 callbacks suppressed [ 4691.528382][ T29] audit: type=1400 audit(4691.430:77218): avc: denied { create } for pid=28548 comm="syz.0.6090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4691.567719][ T29] audit: type=1400 audit(4691.470:77219): avc: denied { read } for pid=28548 comm="syz.0.6090" name="audio1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4691.584094][ T29] audit: type=1400 audit(4691.490:77220): avc: denied { read open } for pid=28548 comm="syz.0.6090" path="/dev/audio1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4691.721466][ T29] audit: type=1400 audit(4691.620:77221): avc: denied { create } for pid=28548 comm="syz.0.6090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4691.735527][ T29] audit: type=1400 audit(4691.640:77222): avc: denied { ioctl } for pid=28548 comm="syz.0.6090" path="socket:[70009]" dev="sockfs" ino=70009 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4691.758839][ T29] audit: type=1400 audit(4691.660:77223): avc: denied { bind } for pid=28548 comm="syz.0.6090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4691.796283][ T29] audit: type=1400 audit(4691.700:77224): avc: denied { write } for pid=28548 comm="syz.0.6090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4691.818044][ T29] audit: type=1400 audit(4691.720:77225): avc: denied { create } for pid=28548 comm="syz.0.6090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4691.819265][ T29] audit: type=1400 audit(4691.720:77226): avc: denied { ioctl } for pid=28548 comm="syz.0.6090" path="socket:[70010]" dev="sockfs" ino=70010 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4691.820408][ T29] audit: type=1400 audit(4691.720:77227): avc: denied { module_request } for pid=28548 comm="syz.0.6090" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4696.541514][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 4696.541862][ T29] audit: type=1400 audit(4696.440:77297): avc: denied { ioctl } for pid=23482 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4696.948332][ T29] audit: type=1400 audit(4696.850:77298): avc: denied { read } for pid=28561 comm="syz.1.6093" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4696.971815][ T29] audit: type=1400 audit(4696.850:77299): avc: denied { read open } for pid=28561 comm="syz.1.6093" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4697.022247][ T29] audit: type=1400 audit(4696.900:77300): avc: denied { read } for pid=28561 comm="syz.1.6093" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4697.095745][ T29] audit: type=1400 audit(4697.000:77301): avc: denied { read open } for pid=28561 comm="syz.1.6093" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4697.146812][ T29] audit: type=1400 audit(4697.050:77302): avc: denied { create } for pid=28562 comm="syz.0.6094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4697.237950][ T29] audit: type=1400 audit(4697.140:77303): avc: denied { write } for pid=28562 comm="syz.0.6094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4697.302636][ T29] audit: type=1400 audit(4697.210:77304): avc: denied { ioctl } for pid=28561 comm="syz.1.6093" path="/dev/fb0" dev="devtmpfs" ino=616 ioctlcmd=0x9402 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4697.334693][ T29] audit: type=1400 audit(4697.240:77305): avc: denied { write } for pid=28562 comm="syz.0.6094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4697.366294][ T29] audit: type=1400 audit(4697.270:77306): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4701.728320][ T29] kauditd_printk_skb: 93 callbacks suppressed [ 4701.729811][ T29] audit: type=1400 audit(4701.630:77400): avc: denied { create } for pid=28571 comm="syz.1.6097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4701.946267][ T29] audit: type=1400 audit(4701.850:77401): avc: denied { write } for pid=28573 comm="syz.0.6098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4702.027993][ T29] audit: type=1400 audit(4701.920:77402): avc: denied { write } for pid=28573 comm="syz.0.6098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4702.439833][ T29] audit: type=1400 audit(4702.340:77403): avc: denied { read } for pid=28573 comm="syz.0.6098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4702.469010][ T29] audit: type=1400 audit(4702.370:77404): avc: denied { read } for pid=28573 comm="syz.0.6098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4703.112386][ T29] audit: type=1400 audit(4702.990:77405): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4703.112878][ T29] audit: type=1400 audit(4703.000:77406): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4703.171151][ T29] audit: type=1400 audit(4703.040:77407): avc: denied { recv } for pid=2908 comm="klogd" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4703.178753][ T29] audit: type=1400 audit(4703.080:77408): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4703.208659][ T29] audit: type=1400 audit(4703.110:77409): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.012557][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 4707.013026][ T29] audit: type=1400 audit(4706.910:77442): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.013270][ T29] audit: type=1400 audit(4706.920:77443): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.051377][ T29] audit: type=1400 audit(4706.950:77444): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.063709][ T29] audit: type=1400 audit(4706.970:77445): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.117065][ T29] audit: type=1400 audit(4707.020:77446): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.146773][ T29] audit: type=1400 audit(4707.050:77447): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.147445][ T29] audit: type=1400 audit(4707.050:77448): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.307583][ T29] audit: type=1400 audit(4707.210:77450): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.308195][ T29] audit: type=1400 audit(4707.210:77451): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4707.321976][ T29] audit: type=1400 audit(4707.180:77449): avc: denied { read write } for pid=23482 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4709.341499][T28598] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28598 comm=syz.0.6102 [ 4712.023659][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 4712.024139][ T29] audit: type=1400 audit(4711.930:77505): avc: denied { bpf } for pid=28599 comm="syz.0.6103" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4712.035958][ T29] audit: type=1400 audit(4711.940:77506): avc: denied { map_create } for pid=28599 comm="syz.0.6103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4712.084856][ T29] audit: type=1400 audit(4711.990:77507): avc: denied { map_create } for pid=28599 comm="syz.0.6103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4712.094267][ T29] audit: type=1400 audit(4712.000:77508): avc: denied { perfmon } for pid=28599 comm="syz.0.6103" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4712.117504][ T29] audit: type=1400 audit(4712.020:77509): avc: denied { prog_load } for pid=28599 comm="syz.0.6103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4712.181597][ T29] audit: type=1400 audit(4712.070:77510): avc: denied { bpf } for pid=28599 comm="syz.0.6103" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4712.194522][ T29] audit: type=1400 audit(4712.100:77511): avc: denied { perfmon } for pid=28599 comm="syz.0.6103" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4712.199291][ T29] audit: type=1400 audit(4712.100:77512): avc: denied { perfmon } for pid=28599 comm="syz.0.6103" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4712.204557][ T29] audit: type=1400 audit(4712.110:77513): avc: denied { perfmon } for pid=28599 comm="syz.0.6103" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4712.213517][ T29] audit: type=1400 audit(4712.120:77514): avc: denied { perfmon } for pid=28599 comm="syz.0.6103" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4717.718501][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 4717.719139][ T29] audit: type=1400 audit(4717.620:77626): avc: denied { create } for pid=28613 comm="syz.0.6109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4718.018776][ T29] audit: type=1400 audit(4717.920:77627): avc: denied { write } for pid=28613 comm="syz.0.6109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 4718.038586][ T29] audit: type=1400 audit(4717.940:77628): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4718.038804][ T29] audit: type=1400 audit(4717.940:77629): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4718.068193][ T29] audit: type=1400 audit(4717.970:77630): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4718.079142][ T29] audit: type=1400 audit(4717.980:77631): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4718.094080][ T29] audit: type=1400 audit(4717.990:77632): avc: denied { recv } for pid=2908 comm="klogd" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4718.094556][ T29] audit: type=1400 audit(4717.990:77633): avc: denied { recv } for pid=2904 comm="syslogd" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4718.110512][ T29] audit: type=1400 audit(4718.010:77634): avc: denied { recv } for pid=24236 comm="syz.0.4950" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4718.141501][ T29] audit: type=1400 audit(4718.040:77635): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4722.135836][T28632] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28632 comm=syz.0.6113 [ 4722.739559][ T29] kauditd_printk_skb: 119 callbacks suppressed [ 4722.739934][ T29] audit: type=1400 audit(4722.640:77755): avc: denied { bind } for pid=28629 comm="syz.1.6114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4722.829907][ T29] audit: type=1400 audit(4722.730:77756): avc: denied { accept } for pid=28629 comm="syz.1.6114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4722.883327][ T29] audit: type=1400 audit(4722.790:77757): avc: denied { write } for pid=28629 comm="syz.1.6114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4722.985442][ T29] audit: type=1400 audit(4722.880:77758): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4722.986078][ T29] audit: type=1400 audit(4722.890:77759): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4723.019528][ T29] audit: type=1400 audit(4722.920:77760): avc: denied { recv } for pid=3091 comm="syz-executor" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4723.033257][ T29] audit: type=1400 audit(4722.940:77761): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4723.065333][ T29] audit: type=1400 audit(4722.970:77762): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4723.141708][ T29] audit: type=1400 audit(4723.030:77763): avc: denied { recv } for pid=2904 comm="syslogd" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4723.142204][ T29] audit: type=1400 audit(4723.040:77764): avc: denied { recv } for pid=2904 comm="syslogd" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4727.788176][ T29] kauditd_printk_skb: 83 callbacks suppressed [ 4727.788865][ T29] audit: type=1400 audit(4727.690:77848): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4727.789171][ T29] audit: type=1400 audit(4727.690:77849): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4727.826820][ T29] audit: type=1400 audit(4727.730:77850): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=54080 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4727.828087][ T29] audit: type=1400 audit(4727.730:77851): avc: denied { recv } for pid=3090 comm="sshd-session" saddr=127.0.0.1 src=54080 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4727.889428][ T29] audit: type=1400 audit(4727.790:77852): avc: denied { read write } for pid=23482 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4727.904497][ T29] audit: type=1400 audit(4727.810:77853): avc: denied { read write open } for pid=23482 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4727.944311][ T29] audit: type=1400 audit(4727.850:77854): avc: denied { recv } for pid=27442 comm="syz-executor" saddr=10.0.2.2 src=40910 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 4727.952017][ T29] audit: type=1400 audit(4727.850:77855): avc: denied { ioctl } for pid=23482 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4728.548555][ T29] audit: type=1400 audit(4728.450:77856): avc: denied { create } for pid=28647 comm="syz.0.6119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4728.580433][ T29] audit: type=1400 audit(4728.480:77857): avc: denied { create } for pid=28647 comm="syz.0.6119" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4729.057672][T27153] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4729.116255][T27153] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4729.214546][T27153] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4729.330524][T27153] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 4729.722363][T27153] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 4729.729544][T27153] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 4729.733417][T27153] bond0 (unregistering): Released all slaves [ 4729.892865][T27153] hsr_slave_0: left promiscuous mode [ 4729.902341][T27153] hsr_slave_1: left promiscuous mode [ 4729.928133][T27153] veth1_macvtap: left promiscuous mode [ 4729.928640][T27153] veth0_macvtap: left promiscuous mode [ 4729.928913][T27153] veth1_vlan: left promiscuous mode [ 4729.929028][T27153] veth0_vlan: left promiscuous mode [ 4730.822081][T27153] ------------[ cut here ]------------ [ 4730.822557][T27153] WARNING: CPU: 0 PID: 27153 at net/xfrm/xfrm_state.c:3306 xfrm_state_fini+0xd4/0x15c [ 4730.824129][T27153] Modules linked in: [ 4730.829362][T27153] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 4730.829923][T27153] CPU: 0 UID: 0 PID: 27153 Comm: kworker/u8:4 Not tainted syzkaller #0 PREEMPT [ 4730.830294][T27153] Hardware name: ARM-Versatile Express [ 4730.830835][T27153] Workqueue: netns cleanup_net [ 4730.831060][T27153] Call trace: [ 4730.831239][T27153] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 4730.831642][T27153] r7:822407e0 r6:840abc00 r5:00000000 r4:82252544 [ 4730.831962][T27153] [<80201b08>] (show_stack) from [<8021f894>] (dump_stack_lvl+0x54/0x7c) [ 4730.832370][T27153] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 4730.832943][T27153] r5:00000000 r4:82a78d18 [ 4730.833200][T27153] [<8021f8bc>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 4730.833512][T27153] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 4730.834326][T27153] r7:81820860 [ 4730.834535][T27153] [<80202800>] (panic) from [<80252948>] (get_taint+0x0/0x1c) [ 4730.835406][T27153] r3:8280c684 r2:00000001 r1:82238d44 r0:822407e0 [ 4730.835952][T27153] [<802528d0>] (check_panic_on_warn) from [<80252aac>] (__warn+0x80/0x188) [ 4730.836883][T27153] [<80252a2c>] (__warn) from [<80252d2c>] (warn_slowpath_fmt+0x178/0x1f4) [ 4730.837650][T27153] r8:00000009 r7:8242ef08 r6:dfd31dd4 r5:840abc00 r4:00000000 [ 4730.838304][T27153] [<80252bb8>] (warn_slowpath_fmt) from [<81820860>] (xfrm_state_fini+0xd4/0x15c) [ 4730.839133][T27153] r10:00000001 r9:00000001 r8:829de39c r7:829f04d0 r6:829de39c r5:85108000 [ 4730.839798][T27153] r4:85108000 [ 4730.840083][T27153] [<8182078c>] (xfrm_state_fini) from [<81812cd4>] (xfrm_net_exit+0x2c/0x40) [ 4730.840971][T27153] r5:85108000 r4:85108000 [ 4730.841199][T27153] [<81812ca8>] (xfrm_net_exit) from [<815773e8>] (ops_undo_list+0xe8/0x238) [ 4730.841635][T27153] r5:85108000 r4:dfd31e98 [ 4730.841883][T27153] [<81577300>] (ops_undo_list) from [<81579580>] (cleanup_net+0x220/0x3a0) [ 4730.842413][T27153] r10:00000000 r9:ffffffd4 r8:859dbc00 r7:829de380 r6:829de358 r5:82c2c240 [ 4730.842594][T27153] r4:85108020 [ 4730.842803][T27153] [<81579360>] (cleanup_net) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 4730.843128][T27153] r10:8300f470 r9:8301c815 r8:840abc00 r7:8300e600 r6:8301c800 r5:829de370 [ 4730.843654][T27153] r4:85d83380 [ 4730.843759][T27153] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 4730.844318][T27153] r10:61c88647 r9:840abc00 r8:85d833ac r7:82804d40 r6:8300e600 r5:8300e620 [ 4730.844583][T27153] r4:85d83380 [ 4730.844815][T27153] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 4730.845219][T27153] r10:00000000 r9:85d83380 r8:80278fec r7:ec1e1e60 r6:85d83080 r5:840abc00 [ 4730.845879][T27153] r4:00000001 [ 4730.845967][T27153] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4730.846354][T27153] Exception stack(0xdfd31fb0 to 0xdfd31ff8) [ 4730.846714][T27153] 1fa0: 00000000 00000000 00000000 00000000 [ 4730.847137][T27153] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4730.847597][T27153] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4730.848018][T27153] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 4730.848478][T27153] r4:8489f900 [ 4730.850115][T27153] Rebooting in 86400 seconds.. VM DIAGNOSIS: 15:37:50 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=82252544 R02=00000001 R03=81a612f0 R04=00000008 R05=828f7e48 R06=00000000 R07=828f7e40 R08=840abc00 R09=00000028 R10=828f7e48 R11=df801eb4 R12=df801eb8 R13=df801ea8 R14=8033dd04 R15=81a61300 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=7efde500 R02=ffffffec R03=00000000 R04=00000000 R05=b5403587 R06=2e920000 R07=000000ad R08=00000000 R09=84e8b000 R10=000000ad R11=00000000 R12=dfce9fb0 R13=dfce9f38 R14=8022b8bc R15=81a329cc PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000